Cortex-XDR-Config-Extractor : Cortex XDR Config Extractor
Cortex-XDR-Config-Extractor tool is meant to be used during Red Team Assessments and to audit the XDR Settings. With this tool its possible to parse the Database Lock Files of the Cortex XDR Agent by Palo Alto Networks and extract Agent Settings, the Hash and Salt of the Uninstall Password, as well as possible Exclusions. Supported Extractions Uninstall Password Hash & Salt Excluded Signer...
APKHunt : Comprehensive Static Code Analysis Tool For Android Apps That Is Based On The OWASP MASVS Framework
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code. With APKHunt, mobile software architects or developers can conduct thorough code reviews to...
IpGeo : Tool To Extract IP Addresses From Captured Network Traffic File
IpGeo is a python tool to extract IP addresses from captured network traffic file (pcap/pcapng) and generate csv report containing details about the geolocation of each ip in the packets. The report contains: Country: Country Code. Region Region Name City Zip Latitude Longitude Timezone Isp Org Ip Installation Use the package manager pip3 to install required modules. pip3 install colorama pip3 install requests pip3 install pyshark If you are not using Kali or ParrotOs or any other penetration...
SXDork : A Tool That Utilizes The Technique Of Google Dorking To Search For Specific Information On The Internet
SXDork is a powerful tool that utilizes the technique of google dorking to search for specific information on the internet. Google dorking is a method of using advanced search operators and keywords to uncover sensitive information that is publicly available on the internet. SXDork offers a wide range of options to search for different types of dorks, such as...
CVE-Vulnerability-Information-Downloader : Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And Combines Them Into One List
CVE-Vulnerability-Information-Downloader downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created. CVE Vulnerability Information Downloader Common Vulnerability Scoring System (CVSS) is a free...
Gmailc2 : A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions
Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions. Note: This RAT communicates Via Gmail SMTP (or u can use any other smtps as well) but Gmail SMTP is valid because most of the companies block unknown traffic so gmail traffic is valid and allowed...
Tracgram : Use Instagram location features to track an account
Trackgram Use Instagram location features to track an account. Usage At this moment the usage of Trackgram is extremly simple: 1. Download this repository 2. Go through the instalation steps 3. Change the parameters in the tracgram main method directly: + Mandatory: - NICKNAME: your username on Instagram ...
Probable_Subdomains : Subdomains Analysis And Generation Tool
Probable_Subdomains is a Subdomains Analysis And Generation Tool Online tool: https://weakpass.com/generate/domains TL;DR During bug bounties, penetrations tests, red teams exercises, and other great activities, there is always a room when you need to launch amass, subfinder, sublister, or any other tool to find subdomains you can use to break through - like test.google.com, dev.admin.paypal.com or staging.ceo.twitter.com. Within this repository, you will...
Where to get knowledge and information about the World of Warcraft for beginners
Despite the fact that World of Warcraft has more than 10 years of history of active development, the project still remains difficult for players to master, who are just arriving on the servers of Azeroth. WoW, of course, has a built-in training system from developers and a phased development with an introduction to the main mechanics, quests, raids, professions and...
Reverseip_Py : Domain Parser For IPAddress.com Reverse IP Lookup
Reverseip_py is a Domain parser for IPAddress.com Reverse IP Lookup. Written in Python 3. What is Reverse IP? Reverse IP refers to the process of looking up all the domain names that are hosted on a particular IP address. This can be useful for a variety of reasons, such as identifying all the websites that are hosted on a shared hosting...