Moonwalk : Cover Your Tracks During Linux Exploitation By Leaving Zero Traces
moonwalk is a 400 KB single-binary executable that can clear your traces while penetration testing a Unix machine. It saves the state of system logs pre-exploitation and reverts that state including the filesystem timestamps post-exploitation leaving zero traces of a ghost in the shell. Features Small Executable: Get started quickly with a curl fetch to your target machine.Fast: Performs all session commands including logging, trace clearing, and filesystem operations...
Nanodump : A Crappy LSASS Dumper With No ASCII Art
Nanodump, a flexible tool that creates a minidump of the LSASS process. Features It uses syscalls (with SysWhispers2) for most operations.Syscalls are called from an ntdll address to bypass some syscall detections.It sets the syscall callback hook to NULL.Windows APIs are called using dynamic invoke.You can choose to download the dump without touching disk or write it to a file.The minidump by default has...
BackupOperatorToDA : From An Account Member Of The Group Backup Operators To Domain Admin
BackupOperatorToDA, From An Account Member Of The Group Backup Operators To Domain Admin Without RDP Or WinRM On The Domain Controller. If you compromise an account member of the group Backup Operators you can become the Domain Admin without RDP or WinRM on the Domain Controller. All credit from filip_dragovic with his inital POC ! I build this project because I wanted to have...
Requests-Ip-Rotator : A Python Library To Utilize AWS API Gateway’s Large IP Pool
Requests-Ip-Rotator is a Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing. This library will allow the user to bypass IP-based rate-limits for sites and services. X-Forwarded-For headers are automatically randomised and applied unless given. This is because otherwise, AWS will send the client's true IP address...
Dora : Find Exposed API Keys Based On RegEx And Get Exploitation Methods
Dora, a tool to Find Exposed API Keys Based On RegEx And Get Exploitation Methods For Some Of Keys That Are Found Features Blazing fast as we are using ripgrep in backendExploit/PoC steps for many of the API key, allowing to write a good report for bug bounty huntingUnlike many other API key finders, dora also shows the path to the file and the line...
Lupo : Malware IOC Extractor. Debugging Module For Malware Analysis Automation
Lupo is a Debugging module for Malware Analysis Automation. Working on security incidents that involve malware, we come across situations on a regular basis where we feel the need to automate parts of the analysis process as complete manual analysis is, more often than not, not possible for every case due to many factors (time, skills, scale etc.). I wrote...
Osinteye : Username Enumeration And Reconnaisance Suite
Osinteye is a tool used for Username enumeration & reconnaisance suite. Supported sites PyPI Github TestPypi About.me Instagram DockerHub Installation Clone project: $ git clone https://github.com/rly0nheart/osinteye.git $ cd osinteye $ pip install -r requirements.txt Usage $ python osinteye Or give osintEye execution permission: $ chmod +x osinteye $ ./osinteye Example 1.1; $ python osinteye --instagram Example 1.2; $ ./osinteye --instagram Optional Arguments FlagUsage--pypiget target's information from pypi--testpypiget target's information from testpypi--aboutget target's information from about.me--instagramget target's...
Rip Raw : Small Tool To Analyse The Memory Of Compromised Linux Systems
Rip Raw is a small tool to analyse the memory of compromised Linux systems. It is similar in purpose to Bulk Extractor, but particularly focused on extracting system Logs from memory dumps from Linux systems. This enables you to analyse systems without needing to generate a profile. This is not a replacement for tools such as Rekall and Volatility which...
IOSSecuritySuite : iOS Platform Security And Anti-Tampering Swift Library
iOS Security Suite is an advanced and easy-to-use platform security & anti-tampering library written in pure Swift! If you are developing for iOS and you want to protect your app according to the OWASP MASVS standard, chapter v8, then this library could save you a lot of time. What ISS detects: Jailbreak (even the iOS 11+ with brand new indicators! Attached debugger If an...
BITB : Browser In The Browser (BITB) Templates
BITB is a Browser templates for Browser In The Browser (BITB) attack. Usage Each folder has a index.html file which has 4 variables that must be modified: XX-TITLE-XX - The title that shows up for the page (e.g. Sign in to your account now)XX-DOMAIN-NAME-XX - Domain name you're masquerading as. (e.g. gmail.com)XX-DOMAIN-PATH-XX - Domain path (e.g. /auth/google/login)XX-PHISHING-LINK-XX - Phishing link which will be embedded into the iFrame (e.g. https://example.com) Furthermore,...