modifyCertTemplate : ADCS Cert Template Modification And ACL Enumeration
modifyCertTemplate tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can be leveraged for privilege escalation (and then reset the template to its previous state afterwards). This is specifically designed for a scenario where WriteProperty rights over a template have been compromised, but the operator is unsure which properties the right applies...
Melody : A Transparent Internet Sensor Built For Threat Intelligence
Melody is a transparent internet sensor built for threat intelligence and supported by a detection rule framework which allows you to tag packets of interest for further analysis and threat monitoring. Features Here are some key features of Melody : Transparent captureWrite detection rules and tag specific packets to analyze them at scaleMock vulnerable websites using the builtin HTTP/S serverSupports the main...
Maat : Open-source Symbolic Execution Framework
Maat is an open-source Dynamic Symbolic Execution and Binary Analysis framework. It provides various functionalities such as symbolic execution, taint analysis, constraint solving, binary loading, environment simulation, and leverages Ghidra's sleigh library for assembly lifting: https://maat.re Key Features Fast & Portable: Designed to scale to real-world applications. Fully written in C++ for good runtime performance. There are hardly any runtime dependencies, and...
Presshell : Quick And Dirty WordPress Command Execution Shell
Presshell is a tool for Quick & dirty Wordpress Command Execution Shell. Execute shell commands on your wordpress server. Uploaded shell will probably be at <your-host>/wp-content/plugins/shell/shell.php Installation To install the shell, we are assuming you have administrative rights to Wordpress and can install plugins since transferring a PHP file to the media library shouldn't work anyway. Otherwise, you have a bigger problem. Simply...
NimPackt-v1 : Nim-based Assembly Packer And Shellcode Loader For Opsec And Profit
NimPackt-v1 is among the worst code I have ever written (I was just starting out learning Nim). Because of this, I started on a full rewrite of NimPackt, dubbed 'NimPackt-NG' (currently still private). With this re-write, I decided to open-source the old branch ("NimPackt-v1"). As such, this branch is no longer maintained and comes without any form of warranty...
Wholeaked : A File-Sharing Tool That Allows You To Find The Responsible Person In Case Of A Leakage
Wholeaked is a file-sharing tool that allows you to find the responsible person in case of a leakage. It's written in Go. How? wholeaked gets the file that will be shared and a list of recipients. It creates a unique signature for each recipient and adds it to the file secretly. After then, it can automatically send files to the corresponding...
EvilSelenium : A Tool That Weaponizes Selenium To Attack Chromium Based Browsers
EvilSelenium is a new project that weaponizes Selenium to abuse Chromium-based browsers. The current features right now are: Steal stored credentials (via autofill)Steal cookiesTake screenshots of websitesDump Gmail/O365 emailsDump WhatsApp messagesDownload & exfiltrate filesAdd SSH keys to GitHub Or extend the existing functionality to suit your needs (e.g. Download files from the user's GDrive/OneDrive). Usage EvilSelenium.exe /?/help - Show this help menu.SETUP:/install - Install chromedriver...
LDAP shell : AD ACL Abuse
LDAP shell repository contains a small tool inherited from ldap_shell. Installation These tools are only compatible with Python 3.5+. Clone the repository from GitHub, install the dependencies and you should be good to go: git clone https://github.com/z-Riocool/ldap_shell.gitcd ldap_shellpython3 setup.py install Usage Connection options ldap_shell domain.local/user:passwordldap_shell domain.local/user:password -dc-ip 192.168.1.2ldap_shell domain.local/user -hashes aad3b435b51404eeaad3b435b51404ee:aad3b435b51404eeaad3b435b51404e1export KRB5CCNAME=/home/user/ticket.ccacheldap_shell -k -no-pass domain.local/user Functionality Get Infodump - Dumps the domain.search query - Search users...
Poro : Scan Publicly Accessible Assets On Your AWS Cloud Environment
Poro is a tool to Scan for publicly accessible assets on your AWS environment Services covered by this tool: AWS ELBAPI GatewayS3 BucketsRDS DatabasesEC2 instancesRedshift Databases Poro also check if a tag you specify is applied to identified public resources using --tag-key and --tag-value arguments. Prequisites AWS account with Read Only Access to services listed above.Python 3.Xrequests>=2.22.0boto3>=1.20botocore>= 1.20enlighten>=1 Usage Clone this repositoryConfigure your envionment with active...
Uncover : Quickly Discover Exposed Hosts On The Internet Using Multiple Search Engine
Uncover is a go wrapper using APIs of well known search engines to quickly discover exposed hosts on the internet. It is built with automation in mind, so you can query it and utilize the results with your current pipeline tools. Currently, it supports shodan,shodan-internetdb, censys, and fofa search API. Features Simple and Handy utility to query multiple search engineMultiple Search engine support (Shodan, Censys, Fofa, Shodan-InternetDB)Automatic key/credential randomizationstdin / stdout support...