SlackEnum – Mastering User Enumeration On Slack

0

A specialized tool designed for user enumeration on the Slack platform. This powerful utility aids in identifying active users within a Slack workspace, enhancing both security testing and network analysis. Learn how to set up and deploy SlackEnum effectively with our step-by-step guide. Setup Clone this repository and install the necessary dependencies with the commands below. git clone https://github.com/Wh1t3Rh1n0/SlackEnum cd SlackEnum python3 -m pip...

Operation Archive – Documenting The Dark Web’s Takedown

0

This repository will be used to add documents, pictures, etc on LEA efforts; Indictments, Seizure Warrants, Raids with photos/video, Online Seizures.. the juicy stuff we all want to see, not the boring stuff. This archive is run by Dark Web Informer (darkwebinformer.com) A dedicated repository showcasing the relentless efforts of law enforcement agencies in dismantling illicit activities on the dark web....

Java Deserialization Cheat Sheet – Detecting And Exploiting Vulnerabilities

0

A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries. Please, use #javadeser hash tag for tweets. Table Of Content Java Native Serialization (binary) Overview Main talks & presentations & docs Payload generators Exploits Detect Vulnerable apps (without public sploits/need more info) Protection For Android XMLEncoder (XML) XStream (XML/JSON/various) Kryo (binary) Hessian/Burlap (binary/XML) Castor (XML) json-io (JSON) Jackson (JSON) Fastjson (JSON) Genson (JSON) Flexjson (JSON) Jodd (JSON) Red5 IO AMF (AMF) Apache Flex BlazeDS (AMF) Flamingo AMF (AMF) GraniteDS...

RedELK – Enhancing Red Team Operations And Blue Team Detection Through Centralized SIEM

0

Short: a Red Team's SIEM. Longer: a Red Team's SIEM that serves two main goals: Enhanced usability and overview for the red team operators by creating a central location where all relevant operational logs from multiple teamservers are collected and enriched. This is great for historic searching within the operation as well as giving a read-only view on the operation (e.g....

SharpTerminator – A Guide To Automating AV/EDR Disruption With C# Port

0

C# port of ZeroMemoryEx's Terminator, so all hail goes to him. Usage You can download the driver from a remote URL using SharpTerminator and load it to terminate AV/EDR processes, or you can directly load it to the disk to perform the same operation. When using Remote URL, the driver is downloaded to "C:WindowsTemp" and then loaded from there. In fact, there is...

RedELK Server – DeploymentEssential Configuration Variables Overview

0

We delve into the process of setting up a RedELK server, focusing on the critical configuration variables required for successful deployment. As the traditional method becomes obsolete, we transition towards the use of an Ansible role specifically designed for this purpose. Discover how to customize your RedELK environment to meet specific security and monitoring needs. Variables The following variables can be...

RedELK-Client : Deploying Cybersecurity Monitoring With Ansible

0

The RedELK client components using Ansible, a powerful automation tool that streamlines the installation and management of cybersecurity monitoring systems. As RedELK enhances the capabilities of red teaming operations by aggregating data and providing insightful analytics, mastering its deployment is crucial for effective cybersecurity defenses. We'll detail the necessary configurations, dependencies, and steps to successfully integrate RedELK into your...

Crawl4AI – The Future Of Asynchronous Web Crawling For AI

0

Crawl4AI simplifies asynchronous web crawling and data extraction, making it accessible for large language models (LLMs) and AI applications. Looking for the synchronous version? Check out README.sync.md. You can also access the previous version in the branch V0.2.76. Try It Now! ✨ Play around with this ✨ Visit our Documentation Website Features 🆓 Completely free and open-source 🚀 Blazing fast performance, outperforming many paid...

OXO Scan Orchestration Engine – A Comprehensive Guide To Scalable Security Assessments

0

OXO is a security scanning framework built for modularity, scalability and simplicity. OXO Engine combines specialized tools to work cohesively to find vulnerabilities and perform actions like recon, enumeration, fingerprinting ... Documentation Agents Store CLI Manual Examples RequirementsDocker is required to run scans locally. To install docker, please follow these instructions.InstallingOXO ships as a Python package on pypi. To install it, simply run the following...

Nullinux – The Comprehensive SMB Enumeration Tool For Penetration Testing

0

Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB. If no username and password are provided in the command line arguments, an anonymous login, or null session, is attempted. Nullinux acts as a wrapper around the Samba tools smbclient & rpcclient to enumerate...