Searpy : Search Engine Toolkit

0

Searpy, as its name implies, search engine optimization is the practice of optimizing websites and web pages for discovery in search engines. Install git clone https://github.com/j3ers3/Searpypip install -r requirement.txt配置API及账号 ./config.pypython Searpy -h Help Searpy Engine Tookitoptional arguments:-h, --help show this help message and exitENGINE:--baidu Using baidu Engine--google Using google Engine--so Using 360so Engine--bing Using bing Engine--shodan Using shodan Engine--fofa Using fofa Engine--zoomeye Using zoomeye Engine--goo Using...

CAPEv2 : Malware Configuration And Payload Extraction

0

CAPEv2 is a malware sandbox. It was derived from Cuckoo with the goal of adding automated malware unpacking and config extraction - hence its name is an acronym: 'Config And Payload Extraction'. Automated unpacking allows classification based on Yara signatures to complement network (Suricata) and behavior (API) signatures. There is a free community instance online which anyone can use: https://capesandbox.com Although config...

BruteShark : Network Analysis Tool

0

BruteShark is a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to...

Latest Cyber Security Trends in 2022

0

Cyber-attacks have been increasing with the evolution of modern technologies and the digital transformation of the world. Most organizations have moved their business models to remote. Since then, cybercriminals are now able to obtain and disclose your personal information. Furthermore, they can interfere with your business operations by exposing confidential information. In 2021, 47 percent of respondents indicated that cyber...

DRAKVUF Sandbox : Automated Hypervisor-Level Malware Analysis System

0

DRAKVUF Sandbox is an automated black-box malware analysis system with DRAKVUF engine under the hood, which does not require an agent on guest OS. This project provides you with a friendly web interface that allows you to upload suspicious files to be analyzed. Once the sandboxing job is finished, you can explore the analysis result through the mentioned interface and get an...

Checkov : Prevent Cloud Misconfigurations During Build-Time For Terraform

0

Checkov is a static code analysis tool for infrastructure-as-code. It scans cloud infrastructure provisioned using Terraform, Terraform plan, Cloudformation, AWS SAM, Kubernetes, Helm charts, Kustomize, Dockerfile, Serverless, Bicep or ARM Templates and detects security and compliance misconfigurations using graph-based scanning. Checkov also powers Bridgecrew, the developer-first platform that codifies and streamlines cloud security throughout the development lifecycle. Bridgecrew identifies, fixes, and prevents misconfigurations in cloud resources and infrastructure-as-code files. Features Over 1000 built-in policies cover security and compliance...

StayKit : Cobalt Strike Kit For Persistence

0

StayKit is an extension for Cobalt Strike persistence by leveraging the execute_assembly function with the Sharp Stay .NET assembly. The aggressor script handles payload creation by reading the template files for a specific execution type. IMPORTANT: To use the script a user will only need to load the StayKit.cna aggressor script. Additionally, the SharpStay assembly will need to be compiled and placed into the...

Katoolin3 : Get Your Favourite Kali Linux Tools On Debian/Ubuntu/Linux Mint

0

Katoolin3 brings all programs available in Kali Linux to Debian and Ubuntu. This program is a port of katoolin from LionSec to python3. Katoolin3 offers several improvements over katoolin: Up to date packagesThe old katoolin uses an outdated package list. Katoolin3 always keeps its package list up to date.(Last updated: 18 Feb 2020)Improved handling of missing packagesThe old katoolin breaks if a package isn't available...

NTLMRecon : Enumerate Information From NTLM Authentication Enabled Web Endpoints

0

NTLMRecon is a fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find out information about NTLM endpoints when working with a large set of potential IP addresses and domains. NTLMRecon is built with flexibilty in mind. Need to run recon on a single URL, an IP address, an entire CIDR range or combination of all of it...

JNDI-Injection-Exploit : A Tool Which Generates JNDI Links Can Start Several Servers

0

JNDI-Injection-Exploit is a tool for generating workable JNDI links and provide background services by starting RMI server, LDAP server and HTTP server. RMI server and LDAP server are based on marshals and modified further to link with HTTP server. Using this tool allows you get JNDI links, you can insert these links into your POC to test vulnerability. For example, this is a Fastjson vul-poc: {"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"rmi://127.0.0.1:1099/Object","autoCommit":true} We...