MANSPIDER – Advanced SMB Crawling For Sensitive Data Detection
textract, one of manspider's upstream dependencies, is no longer being updated. For this reason, you may run into problems when installing with pip. The recommended installation method is now Docker docker run --rm -v ./manspider:/root/.manspider blacklanternsecurity/manspider --help Note there is also a helper script manspider.sh which will automatically mount volumes for manspider's loot and logs directories, making it a bit more...
EDR-Antivirus-Bypass-To-Gain-Shell-Access
This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique. The code executes shellcode that spawns a reverse shell, successfully evading detection by various security mechanisms. Description This project demonstrates how to bypass EDR and antivirus protection using Windows API functions such as VirtualAlloc, CreateThread, and WaitForSingleObject. The payload is injected directly into the...
GShark – A Comprehensive Guide To Sensitive Information Management System Deployment
The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please refer to articles and videos. For now, all the scans are only targeted to the public environments, not local environments. For the usage of GShark, please refer to the wiki. Features Support multiple platforms, such as GitLab, GitHub, Searchcode, and...
C2 Server Installation – A Comprehensive Guide For Red Team Operations
Setting up a Command and Control (C2) server is a critical step in establishing a robust red team infrastructure. This guide provides a detailed walkthrough on how to install and configure your C2 server, ensuring seamless integration with tools like Filebeat and RedELK. Follow these essential steps to enhance your cybersecurity testing capabilities. In Short extract c2servers.tgz on your C2 server. Run...
Redirector Installation – A Comprehensive Guide For Red Team Operations
Installing and configuring redirectors as part of your red team infrastructure. Follow these step-by-step instructions to deploy and optimize redirectors using tools like Filebeat and RedELK, enhancing your ability to manage logs and security measures effectively. Learn how to tackle common installation challenges and modify logging formats for different server types to suit your operational needs. In Short extract redirs.tgz Run: install-redir.sh...
Generating Keys And Packages – A Guide To Securing RedELK Server Communications
This step generates TLS key pairs. This is used for encrypting the filebeat traffic between redirectors/C2servers and the RedELK server. It can be run on any unix based system. But it makes sense completely sense to run this from your dedicated RedELK system. In Short modify ./certs/config.cnf run initial-setup.sh ./certs/config.cnf copy c2servers.tgz, redirs.tgz and elkserver.tgz to relevant systems In Detail Adjust ./certs/config.cnf to include the right...
enum4linux-ng : The Next-Generation Tool For Windows And Samba Enumeration
enum4linux-ng.py is a rewrite of Mark Lowe's (former Portcullis Labs now Cisco CX Security Labs) enum4linux.pl, a tool for enumerating information from Windows and Samba systems, aimed for security professionals and CTF players. The tool is mainly a wrapper around the Samba tools nmblookup, net, rpcclient and smbclient. I made it for educational purposes for myself and to overcome issues...
Interactive PDF Analysis – A Deep Dive Into Secure PDF Examination
Interactive PDF Analysis (also called IPA) allows any researcher to explore the inner details of any PDF file. PDF files may be used to carry malicious payloads that exploit vulnerabilities, and issues of PDF viewer, or may be used in phishing campaigns as social engineering artefacts. The goal of this software is to let any analyst go deep on...
zDocker-cobaltstrike : A Comprehensive Guide To Setting Up Cobalt Strike With Docker
A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be seamlessly integrated into Docker to enhance security testing with scalability and ease of deployment. This article provides step-by-step instructions on building and running a Cobalt Strike Docker container, including how to set environment variables and expose necessary...
ConfuserEx2 String Decryptor – A Guide To Deobfuscating .NET Applications
ConfuserEx2 is the latest version from the Confuser family → An open-source, free protector for .NET applications. ConfuserEx2_String_Decryptor deobfuscates constants protection, targeting string objects and char arrays. This tool was tested on the vanilla version of ConfuserEx2 (ConfuserEx 1.6.0+-), but it should also handle some customized versions. Description ConfuserEx2_String_Decryptor is a simple C# console application that uses: AsmResolver - .NET Assembly Manipulation (modification of...