RustHound : A Cross-Platform BloodHound Collector Tool

0

In the realm of cybersecurity and network reconnaissance, RustHound emerges as a versatile hero. This cross-platform BloodHound collector tool, built with Rust, breaks down the barriers between operating systems, making it a go-to solution for collecting critical network data. Join us on a journey to explore the power and potential of RustHound in enhancing your cybersecurity arsenal. Summary Limitation Description How to compile...

POSTDump – Evading Detection And Safely Dumping LSASS Memory

0

Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# / .NET implementation of the ReactOS minidump function (like nanodump), thus avoiding call to the Windows API MiniDumpWriteDump function. The dump logic code is saved under the POSTMinidump project, feel free to use it for your own projects. Such as NanoDump, you can...

Mastering WificraK – Unveiling the Power of Advanced Wi-Fi Exploits

0

Introduction The majority of WPA2-PSK and WEP encryption attacks can be carried out using the WificraK tool. Using crunch or a wordlist, the tool enables you to open previously captured files. The tool has been tested on Kali Linux and Parrot OS. With the Alfa AWUS036NHA antenna, all of these attacks perform admirably. Attacks Deauthentication Attack Authentication Attack Beacon Flood Attack PMKID Attack Passive Attack Pixie Dust Attack Null Pin...

Guide-CEH-Practical-Master – Tools, Techniques And Exam Mastery

0

Welcome to the 'Guide-CEH-Practical-Master', your essential roadmap to mastering the Certified Ethical Hacker (Practical) exam. Dive deep into the tools, techniques, and insights necessary for success. Let's embark on this journey to achieve professional cybersecurity prowess together Exame Details Exam Title: Certified Ethical Hacker (Practical) Number of Practical Challenges: 20 Duration: 6 hours Availability: Aspen – iLabs Test Format: Cyber Range Passing Score: Min 15 Questions Exam...

GhostRecon – An In-depth Guide To A Compact OSINT Tool For Linux

0

In the vast world of Linux tools, GhostRecon stands out as a streamlined solution for research and OSINT (Open Source Intelligence) tasks. Originally developed by mZzgamer and later taken over by DR34M-M4K3R, this tool promises efficiency and user-friendliness. This guide delves into the features, installation process, and effective usage of GhostRecon, ensuring you harness its full potential. Dive in...

LatLoader – Evading Elastic EDR In Lateral Movement

0

LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this project is to help others learn BOF and Havoc module development. This project can also help others understand basic EDR rule evasions, particularly when performing lateral movement. The sideload subcommand is the full-featured PoC of this module. It will attempt to...

Telegram Explorer (TEx) – The Ultimate Toolkit for Telegram Data Analysis

0

TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the Huge Amount of Data Generated from Criminal, Fraud, Security and Others Telegram Groups. BETA VERSION Please note that this project has been in beta for a few weeks, so it is possible that you may encounter bugs that have not yet...

HackSys Extreme Vulnerable Driver – A Deep Dive into HEVD Exploitation

0

The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills in kernel-level exploitation. HEVD offers a range of vulnerabilities, from simple stack buffer overflows to more complex issues such as use-after-free, pool buffer overflows, and race conditions. This allows researchers to explore exploitation techniques for each implemented vulnerability. ...

OSGINT – A Deep Dive Into GitHub User Information Retrieval

0

In the vast realm of GitHub, the ability to glean information about users can be invaluable for various purposes. 'OSGINT: A Deep Dive into GitHub User Information Retrieval' introduces an innovative tool that harnesses the power of open-source intelligence to extract detailed profiles from GitHub usernames and emails. Join us as we explore the features, requirements, and mechanics of...

Rolling Shells – Login to Unprotected Shells Randomly Using SHODAN

0

What are open shells? An "open shell" is a term often used in cybersecurity to refer to a remote shell that is unintentionally left open or exposed by a system or device.  This vulnerability can occur due to various factors, including misconfigurations, weak security settings, or software bugs.  Malicious actors often exploit open shells to gain unauthorized access to a system or...