Raven : Advanced Cyber Threat Map (Simplified, Customizable, Responsive)

0

Raven - Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries, ~100,000 cities, and can be used in an isolated environment without external lookups!. Features Uses D3.js (Not Anime.js)Active threat map (Live and replay)IP, country, city, and port info for each attackAttacks stats for countries (Only known attacks)Responsive interface (Move, drag, zoom in and...

Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes

0

Scemu is a x86 32bits emulator, for securely emulating shellcodes Features  rust safety, good for malware.All dependencies are in rust.zero unsafe{} blocks. very fast emulation (much faster than unicorn)3,000,000 instructions/second100,000 instructions/second printing every instruction -vv.powered by iced-x86 rust disassembler awesome library.iteration detector.memory and register tracking.colorized.stop at specific moment and explore the state or modify it.174 instructions implemented.112 winapi implemented of 5 dlls.all...

Wifi-Framework : For Creating Proof-Of-Concepts, Automated Experiments, Test Suites, Fuzzers, And More…

0

Wifi-Framework is a framework to more easily perform Wi-Fi experiments. It can be used to create fuzzers, implement new attacks, create proof-of-concepts to test for vulnerabilities, automate experiments, implement test suites, and so on. The main advantage of the framework is that it allows you to reuse Wi-Fi functionality of Linux to more easily implement attacks and/or tests. For instance, the...

RAUDI : A Repo To Automatically Generate And Keep Updated A Series Of Docker Images

0

RAUDI (Regularly and Automatically Updated Docker Images) automatically generates and keep updated a series of Docker Images through GitHub Actions for tools that are not provided by the developers. What is RAUDI RAUDI is what will save you from creating and managing a lot of Docker Images manually. Every time a software is updated you need to update the Docker Image if you want to use the...

SpoofThatMail : Bash Script To Check If A Domain Or List Of Domains Can Be Spoofed Based In DMARC Records

0

SpoofThatMail is a Bash script to check if a domain or list of domains can be spoofed based in DMARC records File with domains: sh SpoofThatMail.sh -f domains.txt One single domain: sh SpoofThatMail.sh -d domain The script may not work if sp param is before p param (currently working on this) Test manually using nslookup -type=txt _dmarc.domain.com Download

WannaRace : WebApp Intentionally Made Vulnerable To Race Condition For Practicing Race Condition

0

WannaRace is a WebApp intentionally made vulnerable to Race Condition Description Race Condition vulnerability can be practiced in the developed WebApp. Task is to buy a Mega Box using race condition that costs more than available vouchers. Two challenges are made for practice. Challenge B is to be solved when PHPSESSID cookie is present, cookie is auto created when user is...

PasteMonitor : Scrape Pastebin API To Collect Daily Pastes, Setup A Wordlist And Be Alerted By Email When You Have A Match

0

PasteMonitor is a Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match. Description The PasteMonitor tool allows you to perform two main actions (for educational purposes only): Download daily new public pastes Send automatic email alert You can setup a wordlist and be alerted by email when you have a match If your paste...

LACheck : Multithreaded C# .NET Assembly Local Administrative Privilege Enumeration

0

LACheck is a Multithreaded C# .NET Assembly Local Administrative Privilege Enumeration. Arguments ./LACheck.exe help _ _ _ | | / / | | | || | / | | | |_ _ | | | | / / | | | '_ / _ / | |/ / | | / | || | | | /...

Shellcode-Encryptor : A Simple Shell Code Encryptor/Decryptor/Executor To Bypass Anti Virus

0

Shellcode-Encryptor is a simple shell code encryptor/decryptor/executor to bypass anti virus. Note: I have completely redone the work flow for creating the bypass, I have found injecting the binary into memory using PowerShell as the most effective method. Purpose To generate a .Net binary containing base64 encoded, AES encrypted shellcode that will execute on a Windows target, bypassing anti-virus. Instructions Use the meterpreter_encryptor.py to create the encrypted...

Mortar : Evasion Technique To Defeat And Divert Detection And Prevention Of Security Products (AV/EDR/XDR)

0

Mortar is a red teaming evasion technique to defeat and divert detection and prevention of security products. Mortar Loader performs encryption and decryption of selected binary inside the memory streams and execute it directly with out writing any malicious indicator into the hard-drive. Mortar is able to bypass modern anti-virus products and advanced XDR solutions and it has been...