FarsightAD : PowerShell Script That Aim To Help Uncovering (Eventual) Persistence Mechanisms

0

FarsightAD is a PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise. The script produces CSV / JSON file exports of various objects and their attributes, enriched with timestamps from replication metadata. Additionally, if executed with replication privileges, the Directory Replication Service (DRS) protocol is leveraged to detect...

Tethering Your Smartphone To A Linux Desktop – What You Should Know?

0

Using your phone’s internet on your Linux PC is fairly straightforward, and similar to that of Windows or Mac, with a few subtle differences to know about.  If you want to take your Linux computer online, but don’t have any wireless or ethernet network nearby, the best solution is tethering your smartphone. Having emerged during the primitive age of 2G,...

Havoc : Modern and malleable post-exploitation command and control framework

0

Havoc is a modern and malleable post-exploitation command and control framework, created by @C5pider. ⚠️Havoc is in an early state of release. Breaking changes may be made to APIs/core structures as the framework matures. Support Consider supporting C5pider on Patreon/Github Sponsors. Additional features are planned for supporters in the future, such as custom agents/plugins/commands/etc. Quick Start Please see the Wiki for complete documentation. Havoc works...

OFRAK : Unpack, Modify, And Repack Binaries

0

OFRAK (Open Firmware Reverse Analysis Konsole) is a binary analysis and modification platform. OFRAK combines the ability to: Identify and Unpack many binary formats Analyze unpacked binaries with field-tested reverse engineering tools Modify and Repack binaries with powerful patching strategies OFRAK supports a range of embedded firmware file formats beyond userspace executables, including: Compressed filesystems Compressed & checksummed firmware Bootloaders RTOS/OS kernels OFRAK equips users with: A Graphical User...

Autobloody : Tool To Automatically Exploit Active Directory Privilege Escalation Paths Shown By BloodHound

0

Autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the AD privesc between two AD objects, the source (the one we own) and the target (the one we want) if a privesc path exists in BloodHound database. The automation is composed of two steps: Finding the optimal path for privesc using bloodhound...

S3Crets Scanner : Hunting For Secrets Uploaded To Public S3 Buckets

0

S3cret Scanner tool designed to provide a complementary layer for the Amazon S3 Security Best Practices by proactively hunting secrets in public S3 buckets. Can be executed as scheduled task or On-Demand. Automation Workflow The automation will perform the following actions: List the public buckets in the account (Set with ACL of Public or objects can be public)List the textual or sensitive files...

Pen Andro – An Automated Android Penetration Testing Tool

0

Introduction Pen-Andro Script will automate the process of installing all necessary tools & tasks for Android Pentesting i.e Moving Burpsuite Certificate,Installing Adb frida server, APKs like proxy toggle, proxydroid, adbwifi. Usage Open Terminal Run below command curl -sL https://tinyurl.com/pen-Android | sudo bash Preconditions Burpsuite proxy Running at 127.0.0.1:8080 Rooted Android device connected via adb (Only one device should be connected) Magisk App (It will make installation easy...

ZPhisher : Automated Phishing Tool For Pentesters

0
ZPhisher : Automated Phishing Tool

Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish. But I have not fully copied it. I have upgraded it & cleared the Unnecessary Files. It has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal. It also has 4 Port Forwarding Tools . Installation apt updateapt install git php openssh...

The Hackingsage/Hacktronian – A Pentesting Tool for Linux and Android

0

Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications. Hacktronian has different modules such as information gathering, and password attacks. Hacktronian is a complete package of different hacking tools/modules such as  Setoolkit, Nmap, Host To IP Conversion, WAScan module, CMS Scanner module, and...

Juicy Potato : A Sugared Version Of RottenPotatoNG, With A Bit Of Juice

0
Juicy Potato : A Sugared Version Of RottenPotatoNG, With A Bit Of Juice

Juicy Potato is a sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITYSYSTEM. Summary RottenPotatoNG and its variants leverages the privilege escalation chain based on BITS service having the MiTM listener on 127.0.0.1:6666 and when you have SeImpersonate or SeAssignPrimaryToken privileges. During a Windows build review we found a setup where BITS was intentionally disabled and port 6666 was taken. We decided to weaponize RottenPotatoNG: Say hello to...