Ator : Authentication Token Obtain and Replace Extender

0

The plugin is created to help automated scanning using Burp in the following scenarios: Access/Refresh token Token replacement in XML,JSON body Token replacement in cookiesThe above can be achieved using complex macro, session rules or Custom Extender in some scenarios. The rules become tricky and do not work in scenarios where the replacement text is either JSON, XML. Key advantages: We have also achieved...

Fingerprintx – Tool to Fingerprint Services Running on Ports

0
Fingerprintx

Fingerprintx is a port scanner tool that helps to find the open ports and to fingerprintx the services running in the port. What is the Open Port Scanner? The open port scanner examines the external IP address and detects open ports on the connection. It aims to identify if port forwarding is correctly configured or if a firewall obstructs server applications. Common Ports 20...

NimPlant : A Light-Weight First-Stage C2 Implant Written In Nim

0

NimPlant is a light first-stage C2 implant written in Nim and Python Feature Overview Lightweight and configurable implant written in the Nim programming language Pretty web GUI that will make you look cool during all your ops Encryption and compression of all traffic by default, obfuscates static strings in implant artefacts Support for several implant types, including native binaries (exe/dll), shellcode or self-deleting executables Wide...

Tool-X – Single Click Installer For 70 Hacking Tools on Android

0
Tool-X

Tool-x is a recently developed installation tool for Android that functions in conjunction with the Termux emulator. The installer can deploy almost 70 different security tools by simply clicking once. Termux Emulator This no-cost, open-source application enables the Linux command shell to function through the Android terminal. You can add extra packages to enhance the functionalities using a terminal emulator. It is...

Subfinder – A New Tool to Discover Subdomains for Websites

0
subfinder

Today, we will present a new tool for gathering information to identify subdomains linked to a particular domain. The subdomains that should be "blog.kalilinuxtutorials.com" and "store.kalilinuxtutorials.com" are subdomains of the "kalilinuxtutorials.com" domain. What is Subdomain? Subdomains are created as subsets of the primary domain name to help organize and navigate different website sections. The primary use of subdomains for site owners is to...

Hunxploit04 – A new OSINT Tools for Information Gathering

0

Gathering information is essential in ethical hacking, as it entails accumulating extensive data regarding the targeted system or organization. The significance of this phase lies in the greater the amount of information an ethical hacker possesses, the more equipped they are to recognize vulnerabilities and possible avenues of attack. Open Source Intelligence (OSINT) OSINT involves the process of collecting data from sources...

KJ33D-Things you have to know about Home Automation in Apartments

0

Things you have to know about home automation in apartments. Home automation has become a buzzword in the real estate industry. With the advent of modern technology, home automation has made life more convenient, efficient, and comfortable. Home automation is a smart solution that can turn an ordinary apartment into a smart living space. For those who are new to the concept...

FindUncommonShares A Python Equivalent Of PowerView’s Invoke-ShareFinder.ps1 Allowing To Quickly Find Uncommon Shares In Vast Windows Domains

0

FindUncommonShares.py is a Python equivalent of PowerView's Invoke-ShareFinder.ps1 allowing to quickly find uncommon shares in vast Windows Domains. Features Only requires a low privileges domain user account. Automatically gets the list of all computers from the domain controller's LDAP. Ignore the hidden shares (ending with $) with --ignore-hidden-shares. Multithreaded connections to discover SMB shares. Export results in JSON with IP, name, comment, flags and UNC...

CertVerify : A Scanner That Files With Compromised Or Untrusted Code Signing Certificates

0

CertVerify is a scanner that files with compromised or untrusted code signing certificates written in python. The CertVerify is a tool designed to detect executable files (exe, dll, sys) that have been signed with untrusted or leaked code signing certificates. The purpose of this tool is to identify potentially malicious files that have been signed using certificates that have been...

CertWatcher : A Tool For Capture And Tracking Certificate Transparency Logs, Using YAML Templates Based DSL

0

CertWatcher is a tool for capture and tracking certificate transparency logs, using YAML templates based DSL. CertWatcher is a tool for capture and tracking certificate transparency logs, using YAML templates. The tool helps to detect and analyze phishing websites and regular expression patterns, and is designed to make it easy to use for security professionals and researchers. Certwatcher continuously monitors the...