Kubeeye : Tool To Find Various Problems On Kubernetes

0

KubeEye is an inspection tool for Kubernetes. It discovers whether Kubernetes resources (by using OPA ), cluster components, cluster nodes (by using Node-Problem-Detector), and other configurations comply with best practices and makes modification suggestions accordingly. KubeEye supports custom inspection rules and plugin installation. With KubeEye Operator, you can intuitively view the inspection results and modification suggestions on the web console. Architecture KubeEye...

MSMAP : Memory WebShell Generator

0

Msmap is a Memory WebShell Generator. Compatible with various Containers, Components, Encoder, WebShell / Proxy / Killer and Management Clients. Function Dynamic Menu Automatic Compilation Generate Script Lite Mode Graphical Interface Container Java Tomcat7 Tomcat8 Tomcat9 Tomcat10 Resin3 Resin4 WebSphere GlassFish WebLogic JBoss Spring* Netty JVM* .NET IIS PHP Python *: SpringHandler only support for JDK8+ *: Default support for Linux Tomcat 8/9, more versions can be adapted according to the advanced guide. WebShell / Proxy / Killer WebShell CMD / SH AntSword JSPJS Behinder Godzilla No need for modularity Proxy: Neo-reGeorg, wsproxy Killer: java-memshell-scanner, ASP.NET-Memshell-Scanner Decoder...

SharpSCCM : A C# Utility For Interacting With SCCM

0

SharpSCCM is a post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager (a.k.a. ConfigMgr, formerly SCCM) for lateral movement and credential gathering without requiring access to the SCCM administration console GUI. SharpSCCM was initially created to execute user hunting and lateral movement functions ported from PowerSCCM (by @harmj0y, @jaredcatkinson, @enigma0x3, and @mattifestation) and now contains additional functionality to gather credentials...

Octopii : An AI-powered Personal Identifiable Information (PII) Scanner

0

Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs, passports, photos and signatures in a directory. Working Octopii uses Tesseract's Optical Character Recognition (OCR) and Keras' Convolutional Neural Networks (CNN) models to detect various forms of personal identifiable information that may be leaked on a publicly facing location. This is...

Scrcpy : Display And Control Your Android Device

0

Scrcpy application provides display and control of Android devices connected via USB or over TCP/IP. It does not require any root access. It works on GNU/Linux, Windows and macOS. It focuses on: lightness: native, displays only the device screen performance: 30~120fps, depending on the device quality: 1920×1080 or above low latency: 35~70ms low startup time: ~1 second to display the first image non-intrusiveness: nothing is left...

Ox4Shell : Deobfuscate Log4Shell Payloads With Ease

0

Ox4Shell is a tool for deobfuscate Log4Shell payloads with ease. Description Since the release of the Log4Shell vulnerability (CVE-2021-44228), many tools were created to obfuscate Log4Shell payloads, making the lives of security engineers a nightmare. This tool intends to unravel the true contents of obfuscated Log4Shell payloads. We recommend running Ox4Shell with a provided file (-f) rather than an inline payload (-p), because...

Is This App Download Safe? A Guide To Secure Your Mobile Device

0

It’s easier than ever to download apps onto your mobile devices. Unfortunately, it’s also become more likely that you could encounter malware along the way. In the first half of 2020, the number of malware variants exceeded 28 million.  With so many different threats out there, how can you be sure your app download is secure? Let’s dive into the primary questions...

Stegowiper : A Powerful And Flexible Tool To Apply Active Attacks For Disrupting Stegomalware

0

Over the last 10 years, many threat groups have employed stegomalware or other steganography-based techniques to attack organizations from all sectors and in all regions of the world. Some examples are: APT15/Vixen Panda, APT23/Tropic Trooper, APT29/Cozy Bear, APT32/OceanLotus, APT34/OilRig, APT37/ScarCruft, APT38/Lazarus Group, Duqu Group, Turla, Vawtrack, Powload, Lokibot, Ursnif, IceID, etc. Our research (see APTs/) shows that most groups are...

Sandbox Scryer : Tool For Producing Threat Hunting And Intelligence Data From Public Sandbox Detonation Output

0

The Sandbox Scryer is an open-source tool for producing threat hunting and intelligence data from public sandbox detonation output The tool leverages the MITRE ATT&CK Framework to organize and prioritize findings, assisting in the assembly of IOCs, understanding attack movement and in threat hunting By allowing researchers to send thousands of samples to a sandbox for building a profile...

Wodat : Windows Oracle Database Attack Toolkit

0

Wodat is a simple port of the popular Oracle Database Attack Tool (ODAT) to C# .Net Framework. Credit to https://github.com/quentinhardy/odat as lots of the functionality are ported from his code. Perform password based attacks e.g. username as password, username list against given password, password list against given username, username:pass combolist. Test if a credential/connection string is working against target Brute force attacks...