Spring4Shell-POC : Dockerized Spring4Shell (CVE-2022-22965) PoC Application And Exploit
Spring4Shell-POC is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965). Full Java source for the war is provided and modifiable, the war will get re-built whenever the docker image is built. The built WAR will then be loaded by Tomcat. There is nothing special about this application, it's a simple hello world that's based off Spring tutorials. Requirements DockerPython3...
CVE-Tracker : With The Help Of This Automated Script, You Will Never Lose Track Of Recently Released CVEs
CVE-Tracker, With the help of this automated script, you will never lose track of newly released CVEs. What does this powershell script do is exactly running the Microsoft Edge at system startup, navigate to 2 URLs ,and then put the browser in to full screen mode. As ethical hackers, it's vital that we keep track of the recently released CVEs...
GoSH : Golang Reverse/Bind Shell Generator
GoSH is a tool that generates a Go binary that launches a shell of the desired type on the targeted host. The shell binary can be compiled for multiple platforms, supports partial polymorphism (unique functions' names) and can use UDP protocol instead of the default TCP. If you send a DELETE command over the established connection, the shell binary removes itself from...
Email-Prediction-Asterisks : Script That Allows You To Identify The Emails Hidden Behind Asterisks
Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application for osint analysts and security forces. It allows to intelligently predict, using Intelx leaks, which emails are related to the person we are looking for. It also allows you to automatically obtain information from emails for manual analysis through...
PEzor-Docker : With The Help Of This Docker Image, You Can Easily Access PEzor On Your System!
PEzor-Docker, With the help of this incredible tool, you can create FUD malwares that are capable of bypassing most of the well-known AVs. For instance, you can pack the "mimikatz" executable file with the help of PEzor and then run it against victim's system for a full mem dump without any problem! How to use docker pull https://hub.docker.com/r/4d0niis/pezor_included_kali:1.0 docker run -it 4d0niis/pezor_included_kali:1.0...
Graphql-Threat-Matrix : GraphQL Threat Framework Used By Security Professionals
graphql-threat-matrix was built for bug bounty hunters, security researchers and hackers to assist with uncovering vulnerabilities across multiple GraphQL implementations. The differences in how GraphQL implementations interpret and conform to the GraphQL specification may lead to security gaps and unique attack vectors. By analyzing and comparing the factors that drive the security risks across different implementations the GraphQL ecosystem can make...
Malicious-Pdf : Generate A Bunch Of Malicious Pdf Files With Phone-Home Functionality
Malicious-Pdf Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh Used for penetration testing and/or red-teaming etc. I created this tool because i needed a third party tool to generate a bunch of PDF files with various links. Usage python3 malicious-pdf.py burp-collaborator-url Output will be written as: test1.pdf, test2.pdf, test3.pdf etc in the current directory. Do not use the...
Hybrid Cloud Solutions Made Simple
Hybrid cloud solutions are the future. It is a solution that merges public cloud and private cloud services or public cloud services with proprietary software. The goal is to enable communication between every distinct service. Hybrid cloud strategies will give your business a higher level of flexibility. They transfer workloads between cloud solutions to match your changing costs and needs. Hybrid...
Cliam : Multi Cloud IAM Permissions Enumeration Tool
Cliam is a simple cloud permissions identifier. There are two main components to the CLI. Most of the enumerated permissions are list, describe or get permissions. Only permissions that does not require a specific resource are tested. enumerate which can be used to enumerate specific permissions (recommended)Some service providers have service groups that can check for permissions for a specific subset...
LDAPFragger : Command And Control Tool That Enables Attackers To Route Cobalt Strike Beacon Data
LDAPFragger is a Command and Control tool that enables attackers to route Cobalt Strike beacon data over LDAP using user attributes. For background information, read the release blog: http://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes Dependencies and installation Compiled with .NET 4.0, but may work with older and newer .NET frameworks as well Usage _ _ _ | | | | / || | | | _ _ _ | | _...