log4j-Scan : A Fully Automated, Accurate & Extensive Scanner For Finding Vulnerable log4j Hosts
log4j-scan is a fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts. Features Support for lists of URLs.Fuzzing for more than 60 HTTP request headers (not only 3-4 headers as previously seen tools).Fuzzing for HTTP POST Data parameters.Fuzzing for JSON data parameters.Supports DNS callback for vulnerability discovery and validation.WAF Bypass payloads. Announcement There is a patch bypass on Log4J v2.15.0 that...
Log4J-Detector : Detects Log4J versions on your file-system within any application that are vulnerable to CVE-2021-44228 and CVE-2021-45046
Log4J-Detector is a Scanner that detects vulnerable Log4J versions to help teams assess their exposure to CVE-2021-44228 (CRITICAL), CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832. Can search for Log4J instances by carefully examining the complete file-system, including all installed applications. It is able to find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! Introduction Currently reports log4j-core versions 2.3.2,...
Jektor : A Windows User-Mode Shellcode Execution Tool That Demonstrates Various Techniques That Malware Uses
Jektor utility focuses on shellcode injection techniques to demonstrate methods that malware may use to execute shellcode on a victim system Dynamically resolves API functions to evade IAT inclusion Includes usage of undocumented NT Windows API functions Supports local shellcode execution via CreateThread Supports remote shellcode execution via CreateRemoteThread Supports local shellcode injection via QueueUserAPC Supports local shellcode injection via EnumTimeFormatsEx Supports local shellcode injection via...
Haptyc : Test Generation Framework
Haptyc is a python library which was built to add payload position support and Sniper/Clusterbomb/Batteringram/Pitchfork attack types into Turbo Intruder. While Haptyc accomplishes these goals fairly well it also introduces a simpler way to express test sequences in general. While this library was meant to target Turbo Intruder it has no hard dependencies on Turbo Intruder and can be...
FiddleZAP : A Simplified Version Of EKFiddle For OWASP ZAP
FiddleZAP is a simplified version of EKFiddle for OWASP ZAP. With ZAP as your web proxy, you are able to flag malicious traffic based on predefined regular expressions. Example: Alert, highlighting and tagging when a regex matches on a string within the HTML source code of a compromised website Installation Download and install ZAP: https://www.zaproxy.org/download/Download or clone the FiddleZAP directory into your Documents folder. It should have...
CloudSpec : An Open Source Tool For Validating Your Resources In Your Cloud Providers Using A Logical Language
CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language that everybody can understand. With its reasonably simple syntax, you can validate the configuration of your cloud resources, avoiding mistakes that can lead to availability or confidentiality issues. Introduction With CloudSpec you validate resources in your cloud provider. A resource can be anything,...
ADenum : A Pentesting Tool That Allows To Find Misconfiguration Through The The Protocol LDAP And Exploit Some Of Those Weaknesses With Kerberos
ADenum is a pentesting tool that allows to find misconfiguration through the protocol LDAP and exploit some of those weaknesses with Kerberos. Requirement Impacket (https://github.com/SecureAuthCorp/impacket)John (https://github.com/openwall/john)Python 3If you are using debian or ubuntu $ sudo apt-get install libsasl2-dev python-dev libldap2-dev libssl-dev If you are using kali $ sudo apt-get install libsasl2-dev python2-dev libldap2-dev libssl-dev pip3 $ pip3 install -r requirements.txt Features and Functionality LDAP Enum Domain Admin usersEnum Domain ControllersEnum Domain users with Password...
How To Safely Use Public Wi-Fi And How To Secure Your Home Wi-Fi
It’s not important what you do for a living or how old you are, if you have a computer or a smartphone, wi-fi connections are a part of your daily routine. That’s especially true if you love to work from various coffee shops where you have to connect to public wi-fi networks. There is a popular belief that public...
Tarian : Antivirus for Kubernetes
Tarian is a tool to protect your applications running on Kubernetes from malicious attacks by pre-registering your trusted processes and trusted file signatures. Tarian will detect unknown processes and changes to the registered files, then it will send alerts and take an automated action. Save your K8s environment from Ransomware! We want to maintain this as an open-source project to...
DInjector : Collection Of Shellcode Injection Techniques Packed In A D/Invoke Weaponized DLL
DInjector repository is an accumulation of my code snippets for various shellcode injection techniques using fantastic D/Invoke API by @TheWover and @FuzzySecurity. Features: Fully ported to D/Invoke APIEncrypted payloads which can be invoked from a URL or passed in base64 as an argumentBuilt-in AMSI bypassPPID spoofing and block non-Microsoft DLLs (stolen from TikiTorch, write-up is here)Sandbox detection & evasion ℹ️ Based on my testings the DInvoke NuGet package itself is being flagged by many...