Tweet-Machine : Hidden Twitter Histories With Advanced OSINT Capabilities

0

Tweet-Machine is an Open-Source Intelligence (OSINT) tool designed to retrieve deleted tweets and replies from any Twitter user, even if their account has been suspended. This tool is particularly useful for researchers, investigators, and anyone interested in analyzing historical Twitter data. Purpose And Functionality Tweet-Machine is built to provide comprehensive access to Twitter data that would otherwise be inaccessible due to...

2025-03-04 (Tuesday) : Group Claiming To Be BianLian Sends Paper-Based Extortion Letters via Postal Service

0

On March 4, 2025, a group claiming to be the notorious threat actor BianLian began sending paper-based extortion letters to executives at U.S.-based organizations. These letters demand ransom payments in Bitcoin to prevent the alleged disclosure of sensitive data, with amounts ranging from $200,000 to $500,00013. However, several factors suggest that these letters may not be from the actual...

Blindsight : Advanced Techniques In Red Teaming And LSASS Memory Exploitation

0

Blindsight is a red teaming tool designed to dump LSASS (Local Security Authority Subsystem Service) memory on Windows systems, bypassing basic countermeasures. It utilizes the Transactional NTFS (TxF API) to transparently scramble the memory dump, which helps avoid triggering antivirus, endpoint detection and response (EDR), and extended detection and response (XDR) systems. Functionality LSASS Memory Dumping: Blindsight allows users to dump...

Hiphp : Mastering Remote Management Of PHP Websites

0

Hiphp, developed by Yasserbdj96, is an open-source tool designed to create a backdoor for controlling PHP-based websites. It operates via HTTP/HTTPS protocols and leverages the POST/GET methods on port 80, enabling users to remotely manage their sites. This tool offers functionalities such as file downloading, editing, and connecting to Tor networks for added security. Core Features Of Hiphp Remote Website Management: Hiphp...

PowerShell-Hunter : A Comprehensive Toolset For Threat Hunting

0

PowerShell-Hunter is a robust collection of PowerShell-based tools designed to aid security analysts in detecting and investigating malicious activities within Windows environments. This project leverages PowerShell's native capabilities to provide flexible and powerful tools for threat hunting. Key Tools And Features PowerShell 4104 Event Analysis Smart Pattern Detection: Identifies common attack techniques through pre-configured patterns. Risk Scoring: Prioritizes investigations using a weighted scoring...

DE-TH-Aura : Detection Engineering And Threat Hunting By SecurityAura

0

DE-TH-Aura, an initiative by SecurityAura, focuses on enhancing detection engineering and threat hunting capabilities using KQL (Kusto Query Language). This effort is primarily aimed at leveraging the Microsoft Defender XDR suite and logs ingested through Microsoft Sentinel, such as Windows Security Event Logs. The project is hosted on a GitHub repository where SecurityAura shares queries developed from various sources,...

MassVulScan : A Comprehensive Network Scanning Tool

0

MassVulScan is a powerful network scanning tool designed for pentesters and system administrators to identify open ports and potential security vulnerabilities across large-scale networks. It leverages the capabilities of masscan for rapid port scanning and nmap for detailed service analysis, making it an efficient tool for network security assessments. Key Features Fast Port Scanning: Utilizes masscan to quickly detect open TCP/UDP...

The-XSS-Rat : A Comprehensive Guide To Cross-Site Scripting Tools And Strategies

0

The-XSS-Rat, an experienced ethical hacker, provides valuable insights into the world of cross-site scripting (XSS) through comprehensive guides and strategies. This article will delve into the tools and techniques used by The-XSS-Rat to identify and exploit XSS vulnerabilities. Understanding XSS XSS is a cyberattack method where malicious code is executed as part of a vulnerable web application. It comes in several...

NimPlant C2 : A Position Independent Code (PIC) Beacon

0

NimPlant C2 is a minimal Proof-of-Concept (PoC) beacon written in C, designed to operate as truly Position Independent Code (PIC) without relying on reflective loaders. Developed by Tijme Gommers, this project showcases a beacon that is significantly smaller in size compared to traditional NimPlant beacons with reflective loaders, weighing in at approximately 30KB versus 800KB. Key Features Position Independent Code (PIC):...

EUD : Exploring Qualcomm’s Embedded USB Debugger

0

The Embedded USB Debugger (EUD) is a sophisticated tool developed by Qualcomm to enhance the debugging and development processes for embedded systems. It functions as a mini High-Speed USB on-chip hub, providing USB-based debug and trace capabilities. EUD is particularly useful for diagnosing and resolving issues in complex embedded systems by leveraging the widely supported USB interface. Functionality Of EUD EUD...