Hcltm : Documenting Your Threat Models With HCL

0

Hcltm is a tool for Documenting Your Threat Models With HCL. There are many different ways in which a threat model can be documented. From a simple text file, to more in-depth word documents, to fully instrumented threat models in a centralized solution. Two of the most valuable attributes of a threat model are being able to clearly document...

KNX-Bus-Dump : A Tool To Listen On A KNX Bus Via TPUART And The Calimero Project Suite

0

KNX-Bus-Dump is a popular building automation protocol and is used to interconnect sensors, actuators and other components of a smart building together. Our KNX Bus Dump tool uses the Calimero java library, which we contributed to for the sake of this tool, to record the telegrams sent over a KNX bus. Particularly, our tool accesses the KNX bus through...

ScheduleRunner : A C# Tool With More Flexibility To Customize Scheduled Task

0

ScheduleRunner is a Scheduled task is one of the most popular attack technique in the past decade and now it is still commonly used by hackers/red teamers for persistence and lateral movement. A number of C# tools were already developed to simulate the attack using scheduled task. I have been playing around with some of them but each of them...

Tiktok-Scraper : TikTok Scraper. Download Video Posts, Collect User/Trend/Hashtag/Music Feed Metadata

0

Tiktok-Scraper is used to Scrape and download useful information from TikTok. This is not an official API support and etc. This is just a scraper that is using TikTok Web API to scrape media and related meta information. Features Download unlimited post metadata from the User, Hashtag, Trends, or Music-Id pagesSave post metadata to the JSON/CSV filesDownload media with and without the watermark and save...

Fennec : Artifact Collection Tool For *Nix Systems

0

Fennec is an artifact collection tool written in Rust to be used during incident response on *nix based systems. fennec allows you to write a configuration file that contains how to collect artifacts. Features   A single statically compiled binary Execute any osquery SQL query Execute system commands Parse any text file using regex Ability to collect system logs and files Return data in structured manner Support multiple...

ICMP-TransferTools : Transfer Files To And From A Windows Host Via ICMP In Restricted Network Environments

0

ICMP-TransferTools is a set of scripts designed to move files to and from Windows hosts in restricted network environments. This is accomplished using a total of 4 different files, consisting of a python server and powershell client for each transfer direction (Download & Upload). The only dependency required is Impacket for one of the python scripts. It can be installed via pip...

Covert-Control : Google Drive, OneDrive And Youtube As Covert-Channels – Control Systems Remotely By Uploading Files To Google Drive, OneDrive, Youtube Or Telegram

0

Covert-Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram using Python to create the files and the listeners. It allows to create text files, images, audio or videos, with the commands in cleartext or encrypted using AES. covert-googledrive.py - Control systems uploading files to a public folder in Google Drive.covert-onedrive.py - Control systems uploading files to...

FormatFuzzer : A Framework For High-Efficiency, High-Quality Generation And Parsing Of Binary Inputs

0

FormatFuzzer is a framework for high-efficiency, high-quality generation and parsing of binary inputs. It takes a binary template that describes the format of a binary input and generates an executable that produces and parses the given binary format. From a binary template for GIF, for instance, FormatFuzzer produces a GIF generator - also known as GIF fuzzer. Generators produced by FormatFuzzer are highly efficient, producing thousands of valid test inputs per second...

Live-Forensicator : Powershell Script To Aid Incidence Response And Live Forensics

0

Live Forensicator is part of the Black Widow Toolbox, its aim is to assist Forensic Investigators and Incidence responders in carrying out a quick live forensic investigation. It achieves this by gathering different system information for further review for anomalous behaviour or unexpected data entry, it also looks out for unusual files or activities and points it out to the...

Phantun : Transforms UDP Stream Into (Fake) TCP Streams That Can Go Through Layer 3 &Amp

0

Phantun is a project that obfuscated UDP packets into TCP connections. It aims to achieve maximum performance with minimum processing and encapsulation overhead. It is commonly used in environments where UDP is blocked/throttled but TCP is allowed through. Phantun simply converts a stream of UDP packets into obfuscated TCP stream packets. The TCP stack used by Phantun is designed to pass...