FullBypass : A Tool For AMSI And PowerShell CLM Bypass

0

FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained Language Mode (CLM). By doing so, it enables the execution of unrestricted PowerShell commands, providing a FullLanguage reverse shell. While such tools can be used for legitimate penetration testing and security research, their unethical use is prohibited and may violate laws. How FullBypass Works AMSI Bypass:AMSI...

Carseat : A Python Implementation Of Seatbelt

0

Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool, Seatbelt. It includes nearly all modules from Seatbelt, focusing on remote execution capabilities. Designed for cybersecurity professionals, Carseat is particularly useful for gathering system information and assessing security configurations on target hosts. However, privileged access is typically required to execute its modules effectively. Carseat relies...

Pyda : A Tool For Dynamic Binary Analysis

0

Pyda is an innovative tool designed to simplify dynamic binary analysis by allowing developers to write analysis tools in Python. Built on top of Dynamorio-based instrumentation, Pyda integrates seamlessly with a CPython interpreter, enabling users to inject Python code into x86/ARM64 Linux processes without relying on traditional debugging methods like GDB or ptrace. Key Features Of Pyda Instruction Hooks: Pyda allows...

AMDVLK : The Power Of Vulkan On AMD GPUs For Linux

0

The AMD Open Source Driver for Vulkan® (AMDVLK) is a powerful, open-source Vulkan driver developed by AMD for Radeon™ graphics adapters on Linux®. Designed to optimize the performance of Vulkan-based applications, AMDVLK leverages AMD's Platform Abstraction Library (PAL) to provide a consistent experience across platforms. Below, we explore its tools and functions. Key Functions And Features Vulkan API Support:AMDVLK supports Vulkan...

Atomic Red Team : Mastering Threat Simulations For Advanced Security Testing

0

The Atomic Red Team is an open-source framework designed to help security teams emulate adversarial tactics and techniques in alignment with the MITRE ATT&CK® framework. Developed by Red Canary, it provides a library of small, portable detection tests, known as "atomics," that can be executed to assess the effectiveness of security controls and incident response processes. Core Features And Functionality MITRE...

SCCMHunter : A Comprehensive Tool For SCCM Asset Exploitation

0

SCCMHunter is a Python-based post-exploitation tool designed for security professionals to identify, profile, and exploit System Center Configuration Manager (SCCM) assets within an Active Directory (AD) domain. Developed by Garrett Foster, it serves as a powerful resource for penetration testing and security assessments by uncovering vulnerabilities in SCCM environments. Core Functions Asset Discovery: SCCMHunter queries LDAP using its find module to locate...

eBPF File Creation Blocker : Enhancing Linux Security

0

The eBPF File Creation Blocker is a cutting-edge security module designed to prevent file creation in specified directories using the Eunomia eBPF Runtime. Leveraging the Linux Security Module (LSM) framework and eBPF technology, this tool offers an efficient and lightweight solution for enforcing directory-specific file creation policies. Key Features Directory Restriction: Blocks file creation attempts specifically within the /etc/test/ directory. Efficient Enforcement:...

DeepSeek-Vulnerability-Analyzer : Enhancing Burp Suite With AI-Powered Analysis

0

The DeepSeek-Vulnerability-Analyzer is an innovative extension for Burp Suite that leverages AI-driven capabilities to enhance vulnerability detection and analysis. By integrating the DeepSeek API, this tool allows security researchers to identify vulnerabilities such as XSS and SQL injection with greater precision and efficiency. Key Features And Setup Instructions Custom Payload Integration: Create two files, xss.txt and sqli.txt, in the plugin's directory. Store your...

NFCToolsGUI : A Comprehensive NFC Management Tool

0

NFCToolsGUI is a versatile, cross-platform program designed to interact with PN532 NFC modules, supporting Windows, Linux, and macOS. It simplifies NFC tag management and offers a wide range of functionalities for developers, researchers, and hobbyists. Key Features NFCToolsGUI provides robust features for NFC tag operations: Crack Card Using MFOC: Perform Mifare Classic card cracking. Write and Format Cards: Easily write data or format...

GraphRunner : The Dual-Use Toolset For Microsoft 365 Security

0

GraphRunner is a powerful post-exploitation toolset designed for interacting with the Microsoft Graph API, enabling red teams and attackers to perform reconnaissance, persistence, and data exfiltration from Microsoft Entra ID (Azure AD) accounts. Developed by Beau Bullock and Steve Borosh of Black Hills Information Security, GraphRunner provides a streamlined approach to exploiting vulnerabilities within Microsoft 365 environments. Key Components GraphRunner is...