Sshimpanzee – Unleashing Advanced Reverse SSH Tunnels For Security Professionals

0

Sshimpanzee allows you to build a static reverse ssh server. Instead of listening on a port and waiting for connections, the ssh server will initiate a reverse connect to attacker's ip, just like a regular reverse shell.  Sshimpanzee allows you to take advantage of every features of a regular ssh connection, like port forwards, dynamic socks proxies, or FTP server. More importantly, if a direct connection from the victim...

Awesome Cybersecurity Handbooks – A Comprehensive Guide And Resource Repository

0

A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are living documents and I updated or add to them relatively often. DISCLAIMER: Please note that these documents are only provided for legal purposes. Please do not use the content for illigal actions. HOW TO USE: I designed the structure of the handbooks based to the Kali Linux menu...

WolfPack – Scaling Red Team Redirectors

0

WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale. This tool enables security professionals to efficiently scale out the creation and management of Apache redirectors, which mimic authentic websites. These redirectors act as a bridge, seamlessly redirecting incoming traffic to a controlled C2 infrastructure. WolfPack simplifies the process of setting up and...

Cameradar – Your Comprehensive Guide To RTSP Stream Access And Security

0

In the age of digital surveillance and connectivity, access to RTSP (Real-Time Streaming Protocol) streams plays a pivotal role in both security and exploration. Enter Cameradar, a versatile tool designed to detect open RTSP hosts, identify streaming devices, and even launch automated dictionary attacks to secure access. In this comprehensive guide, we delve into the world of Cameradar, exploring...

Elitewolf – Critical Infrastructure Security Insights

0

This repository contains various ICS/SCADA/OT focused signatures and analytics. The end goal is to enable Critical Infrastructure Defenders, Intrusion Analysts, and others to implement continuous and vigilant system monitoring. WARNING: These signatures/analytics aren't necessarily malicious activity. They require follow on analysis to truly determine if this activity is malicious or not. Background Cyber actors have demonstrated their continued willingness to conduct...

SubCat – A Fast And Efficient Subdomain Enumeration Tool

0

SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. SubCat is built for doing one thing only - passive subdomain enumeration, and it does that very well. We have designed SubCat to comply with all passive sources licenses, and usage restrictions, as...

LinikatzV2 – Unveiling UNIX Secrets in Active Directory Environments

0

LinikatzV2 is a bash script based on the Linikatz tool developed by time-machine (link). It allows post-exploitation tasks on UNIX computers joined to Active Directory, using various methods for credential mining. This tool needs root privileges to be run on the host system. It allows extraction of : Hashed stored in files for offline connection (SHA-512 format) Kerberos tickets (user & machine) Clear passwords in RAM NTLM...

How To Use a Box Plot To Analyze Data

0

The vast field of data visualization is adorned by many intriguing elements and techniques that help in representing abstract, complex data into easily digestible, interpretive graphical formats. One such significant element in data visualization is the box plot. In this article, we will delve deep into the realm of box plots and look at their applications and importance in...

CVE-2023-22515 Scanner – Detecting Atlassian Confluence Vulnerability

0

This is simple scanner for CVE-2023-22515, a critical vulnerability in Atlassian Confluence Data Center and Server that is actively being exploited in the wild by threat actors in order "to create unauthorized Confluence administrator accounts and access Confluence instances". The vulnerability was initially described as a "privilege escalation" issue, but Atlassian later changed the classification to "broken access control" in...

Msprobe – On-Prem Microsoft Solutions Discovery For Security

0

Discovering and securing on-premises Microsoft solutions is paramount in today's cybersecurity landscape. In this article, we delve into 'msprobe,' a powerful tool designed to aid in the identification of on-prem Microsoft products. With its versatile modules, 'msprobe' empowers security professionals to pinpoint and assess potential vulnerabilities, ensuring robust protection for organizations. About Installing Usage Examples Coming Soon Acknowledgements About  Finding all things on-prem Microsoft for password spraying...