Eyes: Email-Centric OSINT Uncovered

0

Eyes is an OSINT tool that focuses on extracting information related to an email address. Whether you’re a cybersecurity professional, a private investigator, or just a curious individual, Eyes can provide insights into the digital footprint associated with a specific email. It scours various platforms and databases to fetch data, making your investigation process smoother and more comprehensive. Installation Guide: Getting...

Villain – Elevating C2 OperationsVillain

0

A groundbreaking C2 framework designed for modern cybersecurity challenges. With its advanced TCP & HoaxShell capabilities, Villain is set to redefine command and control operations, offering unparalleled versatility and precision in the realm of cyber operations. Purpose Villain is a high level C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands,...

Cloud Katana – Serverless Security for Multi-Cloud

0

The cutting-edge toolset designed for the modern cloud landscape. Born from a dire need to streamline security evaluations in multi-cloud and hybrid cloud setups, this event-driven application embodies the future of serverless computing. Built atop Azure Functions, it not only accelerates research in Azure environments but also promises expansion to other cloud platforms. Dive in to discover how Cloud...

MaldevAcademyLdr.1 – Advanced EXE Loader Unveiled

0

It is our latest innovation in cybersecurity tools. This EXE loader goes beyond conventional designs, offering advanced features for robust system interactions. With a focus on enhanced security and sophisticated integration capabilities, it's set to revolutionize the way users interface with executable files. Quick Links Maldev Academy Home Maldev Academy Syllabus Maldev Academy Pricing EXE Loader Maldev Academy's October update saw several...

Cartographer – Advanced Code Coverage Mapping in Ghidra

0

Introduction There’s no doubt that reverse engineering can be a very complex and confusing matter, even for those that love doing it. Jumping into a program and being greeted with tons of assembly and weirdly-named functions and variables is hardly what most would call a fun time. Not to mention that identifying specific functionality in a program can be an...

GitHub Copilot Chat – Simplifying Code with AI

0

In July, we introduced a public beta of GitHub Copilot Chat, a pivotal component of our vision for the future of AI-powered software development, for all GitHub Copilot for Business users. Today, we’re thrilled to take the next step forward in our GitHub Copilot X journey by releasing a public beta of GitHub Copilot Chat for all GitHub Copilot individual users across...

Dark Web Archives – Unveiling Hidden Marketplaces & Scams

0

All public/Privately leaked Dark Web Marketplace (DNM) Scripts, Source codes and information. This archive will be a place for researchers, law enforcemet and etc to study DNMs, Fraud Markets and Common Dark Web Scams without the need to venture to Tor/I2P to find them, do research and etc. We'll do that for you. In this archive you can find everything found...

Mshikaki – Advanced Shellcode Injection Tool for Bypassing AMSI

0

"Mshikaki - kebab (skewered meat, especially beef)" yum yum. In the realm of cybersecurity, stealth and efficiency are paramount. Enter 'Mshikaki', an advanced shellcode injection tool that stands out for its ability to seamlessly bypass the Antimalware Scan Interface (AMSI). Designed for both security researchers and penetration testers, Mshikaki ensures that your code remains undetected while achieving its objectives. Overview Mshikaki is...

Nessusploitable – Targeting Exploitable Nessus Vulnerabilities

0

Do you need to filter Nessus scan results and zero in on exploitable vulnerabilities? When you're on a penetration test or vulnerability assessment and you have to review Nessus scan results, you can filter using Nessus or you can export a Nessus .nessus file for distrubution or offline parsing. Nessusploitable parses .nessus files for exploitable vulnerabilities and outputs a...

AttackGen – Tailored Cyber Incident Response Testing

0

AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details. Table Of Contents Star the Repo Features Releases Requirements Installation Data Setup Running AttackGen Usage Contributing Licence Star The Repo If you find AttackGen useful, please consider starring the repository on GitHub. This...