MrKaplan : Tool Aimed To Help Red Teamers To Stay Hidden By Clearing Evidence Of Execution
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution. It works by saving information such as the time it ran, snapshot of files and associate each evidence to the related user. This tool is inspired by MoonWalk, a similar tool for Unix machines. You can read more about it in the wiki page. Features Stopping event logging.Clearing files...
BlackStone : Pentesting Reporting Tool
BlackStone project or "BlackStone Project" is a tool created in order to automate the work of drafting and submitting a report on audits of ethical hacking or pentesting. In this tool we can register in the database the vulnerabilities that we find in the audit, classifying them by internal, external audit or wifi, in addition, we can put your description...
Smap : A Drop-In Replacement For Nmap Powered By Shodan.Io
Smap is a port scanner built with shodan.io's free API. It takes same command line arguments as Nmap and produces the same output which makes it a drop-in replacament for Nmap. Features Scans 200 hosts per secondDoesn't require any account/api keyVulnerability detectionSupports all nmap's output formatsService and version fingerprintingMakes no contact to the targets Installation Binaries You can download a pre-built binary from here and use...
Pict : Post-Infection Collection Toolkit
Pict, this set of scripts is designed to collect a variety of data from an endpoint thought to be infected, to facilitate the incident response process. This data should not be considered to be a full forensic data collection, but does capture a lot of useful forensic information. If you want true forensic data, you should really capture a full memory dump...
Peetch : An eBPF Playground
peetch is a collection of tools aimed at experimenting with different aspects of eBPF to bypass TLS protocol protections. Currently, peetch includes two subcommands. The first called dump aims to sniff network traffic by associating information about the source process with each packet. The second called tls allows to identify processes using OpenSSL to extract cryptographic keys. Combined, these two commands make it possible to decrypt...
Cirrusgo : A Fast Tool To Scan SAAS, PAAS App Written In Go
Cirrusgo is a fast tool to scan SAAS,PAAS App written in Go SAAS App Support : salesforcecontentful (next version) Note flag -o output not working install : golang 1.18Ver go install -v github.com/Ph33rr/cirrusgo/cmd/cirrusgo@latestorgo install -v github.com/Ph33rr/CirrusGo/cmd/cirrusgo@latest Help cirrusgo --help _ _ / /() _ _ / // / / // // // / / // // / / _ / / / // / / / / //...
Kage : Graphical User Interface For Metasploit Meterpreter And Session Handler
Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads.For now it only supports windows/meterpreter & android/meterpreter. Getting Started Please follow these instructions to get a copy of Kage running on your local machine without any problems. Prerequisites Metasploit-framework must be installed and in your PATH:MsfrpcdMsfvenomMsfdb Installing You can install Kage binaries from here. for developers to run the app from source code: Download source...
SaaS security: Achieving a clean IAM System Audit
Identity and access management (IAM) is a set of regulations, which make it easier to oversee electronic or digital identities. It is essentially the basis of Cloud Identity Governance for SaaS and IaaS environments To ensure that these online identities are effectively managed, modern automated Cloud Identity Governance solutions exist as part of Cloud Infrastructure Entitlements Management solutions. These solutions monitor IAM identities...
PR-DNSd : Passive-Recursive DNS Daemon
PR-DNSd is a Passive-Recursive DNS daemon. Quickstart go get github.com/korc/PR-DNSdsudo setcap cap_net_bind_service,cap_sys_chroot=ep go/bin/PR-DNSdgo/bin/PR-DNSd -upstream 9.9.9.9:53 -listen 127.0.0.1:53echo nameserver 127.0.0.1 | sudo tee /etc/resolv.confdig google.comdig -x $(dig +short google.com) Use cases run as local host DNS service, to fix your netstat/tcpview/lsof etc. outputas enterprise-internal DNS server, to also be able to do meaningful EDR/IR and log analysisas cloud service, to also collect Passive DNS data from...
SilentHound : Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups, Etc.
SilentHound Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc. Created by Nick Swink from Layer 8 Security. Installation Using pipenv (recommended method) sudo python3 -m pip install --user pipenvgit clone https://github.com/layer8secure/SilentHound.gitcd silenthoundpipenv install From requirements.txt (legacy) This method is not recommended because python-ldap can cause many dependency errors. Install dependencies with pip: python3 -m pip install -r requirements.txtpython3 silenthound.py -h Usage $ pipenv run python silenthound.py -husage:...