NetLlix : Tool To Emulate & Test Exfiltration Of Data Over Different Network Protocols

0

NetLlix is a project created with an aim to emulate and test exfiltration of data over different network protocols. The emulation is performed w/o the usage of native API's. This will help blue teams write correlation rules to detect any type of C2 communication or data exfiltration. Currently, this project can help generate HTTP/HTTPS traffic (both GET and POST) using...

Squarephish : OAuth Device Code Authentication Flow & QR codes

0

SquarePhish is an advanced phishing tool that uses a technique combining the OAuth Device code authentication flow and QR codes. See PhishInSuits for more details on using OAuth Device Code flow for phishing attacks. _____ ...

HTTPLoot : An Automated Tool Which Can Simultaneously Crawl, Fill Forms, Trigger Error/Debug Pages

0

HTTPLoot is a automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code of sites. Usage To use the tool, you can grab any one of the pre-built binaries from the Releases section of the repository. If you want to build the source code yourself, you will need Go > 1.16 to...

What Is SASE and What Security Threats Can it Prevent?

0

SASE, which stands for Secure Access Service Edge, is a cloud-based network security model. SASE uses a technology called software-defined networking, which allows software to manage networks and combine them with network security features. SASE simplifies network infrastructure and security management by providing organizations with a single service provider. This cloud-based security model was proposed by Gartner in August 2019....

Kali Linux 2022.4 : Penetration Testing and Ethical Hacking Linux Distribution

0

Time for another Kali Linux release! – Kali Linux 2022.4. This release has various impressive updates. A summary of the changelog since August’s 2022.3 release: Microsoft Azure - We are back on the Microsoft Azure store More Platforms - Generic Cloud, QEMU VM image & Vagrant libvirt Social Networks - New homes, keeping in touch & press packs Kali NetHunter Pro - Announcing the...

Shennina : Automating Host Exploitation With AI

0

Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence. Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. This was developed by Mazin Ahmed and...

laZzzy : Shellcode Loader, Developed Using Different Open-Source Libraries, That Demonstrates Different Execution Techniques

0

laZzzy is a shellcode loader that demonstrates different execution techniques commonly employed by malware. laZzzy was developed using different open-source header-only libraries. Features Direct syscalls and native (Nt*) functions (not all functions but most) Import Address Table (IAT) evasion Encrypted payload (XOR and AES) Randomly generated key Automatic padding (if necessary) of payload with NOPS (x90) Byte-by-byte in-memory decryption of payload XOR-encrypted strings PPID spoofing Blocking of non-Microsoft-signed DLLs (Optional)...

Octosuite : Advanced Github OSINT Framework

0

Octosuite is a framework fro gathering osint on GitHub users, repositories and organization. Features Fetches an organization's profile informationFetches an oganization's eventsReturns an organization's repositoriesReturns an organization's public membersFetches a repository's informationReturns a repository's contributorsReturns a repository's languagesFetches a repository's stargazersFetches a repository's forksFetches a repository's releasesReturns a list of files in a specified path of a repositoryFetches a user's...

How to Separate Pages in PDFwithUPDF – the First-Rate PDF Software

0

Do you know how to separate pages in PDF? It is high time to explore the best ways to perform it efficiently. Surf the below content to get valuable insights on it. In certain scenarios, splitting the pages in PDF is required to extract specific content in the file. It is high time to learn how to separate pages in...

Codecepticon : .NET Application That Allows You To Obfuscate C#, VBA/VB6 (Macros), And PowerShell Source Code

0

Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams. What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically for AV/EDR evasion. Codecepticon allows you to obfuscate and rewrite...