DuplicateDump : Dumping LSASS With A Duplicated Handle From Custom LSA Plugin

0

DuplicateDump is a fork of MirrorDump with following modifications: DInovke implementationLSA plugin DLL written in C++ which could be clean up after dumping LSASS. MirrorDump compile LSA plugin as .NET assembly which would not be unloaded by LSASS process. That's why MirrorDump failed to delete the plugin.PID of dump process (i.e., DuplicateDump) is shared to LSA plugin through named pipePassing value "0"...

Chlonium : Chromium Cookie Import / Export Tool

0

Chlonium is an application designed for cloning Chromium Cookies. From Chromium 80 and upwards, cookies are encrypted using AES-256 GCM, with a state key which is stored in the Local State file. This state key is encrypted using DPAPI. This is a change from older versions, which used DPAPI to encrypt each cookie item in the cookie database. What this...

NodeSecurityShield : A Developer And Security Engineer Friendly Package For Securing NodeJS Applications

0

NodeSecurityShield is a Developer and Security Engineer friendly package for Securing NodeJS Applications. Inspired by the log4J vulnerability (CVE-2021-44228) which can be exploited because an application can make arbitrary network calls. We felt there is an need for an application to declare what privileges it can have so that exploitation of such vulnerabilities becomes harder. To achieve this, NSS (Node Security Shield) has Resource Access...

BWASP : BoB Web Application Security Project

0

BWASP is BoB Web Application Security Project (BWASP) is an open-source, analysis tool to support for Web Vulnerability Manual Analysis hackers. The BWASP tool basically provides predicted information through vulnerability analysis without proceeding with an attack. BWASP supports performing automated analysis and manual analysis. The BWASP Project supports: Find Attack vector automatically. (e.g. SQL Injection, Cross-site Scripting)Detect website technology.Log4J vulnerability scan (Partially supports java...

RogueAssemblyHunter : Rogue Assembly Hunter Is A Utility For Discovering ‘Interesting’ .NET CLR Modules

0

Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes. Background .NET is a very powerful and capable development platform and runtime framework for building and running .NET managed applications. Over the last several years, .NET has been adopted by Red Teams (and likes thereof) for instrumenting tradecraft to support offensive operations. In particular, the shift...

Process_Overwriting : Yet Another Variant Of Process Hollowing

0

Process Overwriting is a PE injection technique, closely related to Process Hollowing and Module Overloading Process Hollowing (aka RunPE) is an old and popular PE injection technique. It comes in has variety of flavors, but there are some steps in common: Start by creating a process in a suspended stateWrite our own PE module in its memoryRedirect to the new moduleResume the thread Process Hollowing...

Heyserial : Programmatically Create Hunting Rules For Deserialization Exploitation

0

Heyserial will Programmatically create hunting rules for deserialization exploitation with multiple keywords (e.g. cmd.exe)gadget chains (e.g. CommonsCollection)object types (e.g. ViewState, Java, Python Pickle, PHP)encodings (e.g. Base64, raw)rule types (e.g. Snort, Yara) Usage Help: python3 heyserial.py -h Examples: python3 heyserial.py -c 'ExampleChain::condition1+condition2' -t JavaObjpython3 heyserial.py -k cmd.exe whoami 'This file cannot be run in DOS mode'python3 heyserial.py -k Process.Start -t NETViewState -e base64 "base64+utf16le" Utils utils/checkyoself.py This is a...

Kubeclarity : Tool For Detection And Management Of Software Bill Of Materials

0

KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. It scans both runtime K8s clusters and CI/CD pipelines for enhanced software supply chain security. SBOM & vulnerability detection challenges Effective vulnerability scanning requires an accurate Software Bill Of Materials (SBOM) detection:Various programming languages and package managersVarious OS distributionsPackage dependency...

SSOh-No : User Enumeration And Password Spraying Tool For Testing Azure AD

0

SSOh-No is designed to enumerate users, password spray and perform brute force attacks against any organisation that utilises Azure AD or O365. Generally, this endpoint provides extremely verbose errors which can be leveraged to enumerate users and validate their passwords via brute force/spraying attacks, while also failing to log any failed authentication attempts. This tool is a weaponised version of a...

AutoResponder : Carbon Black Response IR Tool

0

AutoResponder is a tool aimed to help people to carry out their Incident Response tasks WITH the help of Carbon Black Response's awesome capabilities and WITHOUT much bothering IT/System/Network Teams What can it do? Module✔️ / ❌Delete Files✔️Delete Registry Values✔️Delete Win32 Service Entries✔️Delete Scheduled Task Entries✔️Detailed Sensor List Export✔️Find Files✔️Find Registry Values✔️Download Files✔️Download A list of Win32 Service Entries✔️Download A list of Scheduled...