Invoke-PSObfuscation : An In-Depth Approach To Obfuscating the PowerShell Payload On Windows Or Kali Linux
Invoke-PSObfuscation is an in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux. Traditional obfuscation techniques tend to add layers to encapsulate standing code, such as base64 or compression. These payloads do continue to have a varied degree of success, but they have become trivial to extract the intended payload and some...
Cybersecurity 101: Understanding the Basics of Online Security
With the rise of technology connecting the world, the importance of online security has never been more imperative. Cybersecurity refers to the safeguarding of electronic devices, networks, and confidential data against undesired access, theft, or harm. This article will present an overview of cybersecurity fundamentals and vital guidelines to ensure your online protection. Passwords Building strong passwords is an essential component...
Blackbird – OSINT Tool to Find Accounts Using Username
Blackbird is a user name enumeration tool developed by Cyber Hunter Lab. This is one of the OSINT tools to find usernames across social media websites. What is OSINT? Open-source intelligence (OSINT) methods involve collecting, analyzing, and disseminating publicly available information to address specific intelligence requirements. This information is gathered from diverse sources and distributed to the appropriate audience at the appropriate...
GPT_Vuln-analyzer : Uses ChatGPT API To Create Vulnerability Reports Based On Nmap Scan
GPT_Vuln-analyzer uses ChatGPT API and Python-Nmap module to use the GPT3 model to create vulnerability reports based on Nmap scan data. This is a Proof Of Concept application demonstrating how AI can generate accurate results for vulnerability analysis and allows further utilization of the already super helpful ChatGPT. The tool supports both Windows and Linux. Requirements Python 3.10 All the packages mentioned in...
Ator : Authentication Token Obtain and Replace Extender
The plugin is created to help automated scanning using Burp in the following scenarios: Access/Refresh token Token replacement in XML,JSON body Token replacement in cookiesThe above can be achieved using complex macro, session rules or Custom Extender in some scenarios. The rules become tricky and do not work in scenarios where the replacement text is either JSON, XML. Key advantages: We have also achieved...
Fingerprintx – Tool to Fingerprint Services Running on Ports
Fingerprintx is a port scanner tool that helps to find the open ports and to fingerprintx the services running in the port. What is the Open Port Scanner? The open port scanner examines the external IP address and detects open ports on the connection. It aims to identify if port forwarding is correctly configured or if a firewall obstructs server applications. Common Ports 20...
NimPlant : A Light-Weight First-Stage C2 Implant Written In Nim
NimPlant is a light first-stage C2 implant written in Nim and Python Feature Overview Lightweight and configurable implant written in the Nim programming language Pretty web GUI that will make you look cool during all your ops Encryption and compression of all traffic by default, obfuscates static strings in implant artefacts Support for several implant types, including native binaries (exe/dll), shellcode or self-deleting executables Wide...
Tool-X – Single Click Installer For 70 Hacking Tools on Android
Tool-x is a recently developed installation tool for Android that functions in conjunction with the Termux emulator. The installer can deploy almost 70 different security tools by simply clicking once. Termux Emulator This no-cost, open-source application enables the Linux command shell to function through the Android terminal. You can add extra packages to enhance the functionalities using a terminal emulator. It is...
Subfinder – A New Tool to Discover Subdomains for Websites
Today, we will present a new tool for gathering information to identify subdomains linked to a particular domain. The subdomains that should be "blog.kalilinuxtutorials.com" and "store.kalilinuxtutorials.com" are subdomains of the "kalilinuxtutorials.com" domain. What is Subdomain? Subdomains are created as subsets of the primary domain name to help organize and navigate different website sections. The primary use of subdomains for site owners is to...
Hunxploit04 – A new OSINT Tools for Information Gathering
Gathering information is essential in ethical hacking, as it entails accumulating extensive data regarding the targeted system or organization. The significance of this phase lies in the greater the amount of information an ethical hacker possesses, the more equipped they are to recognize vulnerabilities and possible avenues of attack. Open Source Intelligence (OSINT) OSINT involves the process of collecting data from sources...