Tor-Rootkit : A Python 3 Standalone Windows 10 / Linux Rootkit Using Tor
Tor-Rootkit is a Python 3 standalone Windows 10 / Linux Rootkit. The networking communication get's established over the tor network. How To Use Clone the repo and change directory: git clone https://github.com/emcruise/TorRootkit.gitcd ./tor-rootkit Build docker container: docker build -t listener . Run docker container: docker run -v $(pwd)/executables:/executables/ -it listener Deploy the executables: When the listener is up and running it generates a "executables" directory containing different...
PyRDP : RDP Monster-In-The-Middle (Mitm) And Library For Python With The Ability To Watch Connections Live Or After The Fact
PyRDP is a Python Remote Desktop Protocol (RDP) Monster-in-the-Middle (MITM) tool and library. It features a few tools: RDP Monster-in-the-MiddleLogs credentials used when connectingSteals data copied to the clipboardSaves a copy of the files transferred over the networkCrawls shared drives in the background and saves them locallySaves replays of connections so you can look at them laterRuns console commands or PowerShell...
Androidqf : (Android Quick Forensics) Helps Quickly Gathering Forensic Evidence From Android Devices, In Order To Identify Potential Traces Of Compromise
Androidqf (Android Quick Forensics) is a portable tool to simplify the acquisition of relevant forensic data from Android devices. It is the successor of Snoopdroid, re-written in Go and leveraging official adb binaries. androidqf is intended to provide a simple and portable cross-platform utility to quickly acquire data from Android devices. It is similar in functionality to mvt-android. However, contrary to MVT,...
If You Need Academic Help, Here’s Where You Can Get It
I cannot believe I'm in year 3 what I'm don't qualify this time next year anyway. This is something for everyone to take away from if you're 18 even alright up to what however mature of a student you are there. We go this is what everyone so this video is basically as you talk in the title, if...
How to Protect Small and Medium-Sized Businesses From Cyberattacks
Many small and medium-sized business owners mistakenly believe that their businesses will not fall victim to cyberattacks due to low turnover and a small amount of data. They believe that only large companies are exposed to such threats. However, most often in any company, it is employees who neglect security measures that pose a threat. As a result, the personal...
LDAPmonitor : Monitor Creation, Deletion And Changes To LDAP Objects Live During Your Pentest Or System Administration!
LDAPmonitor is a Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! With this tool you can quickly see if your attack worked and if it changed LDAP attributes of the target object. Features FeaturePython (.py)CSharp (.exe)Powershell (.ps1)LDAPS support✔️✔️✔️Random delay in seconds between queries✔️✔️✔️Custom delay in seconds between queries✔️✔️✔️Save output to logfile✔️✔️✔️Colored or not colored output...
TIWAP : Totally Insecure Web Application Project
TIWAP is a web security testing lab made using Flask for budding security enthusiasts to learn about various web vulnerabilities. Inspired by DVWA, the contributors have tried their best to regenerate various web vulnerabilities The application is solely made for educational purpose and to learn web hacking in a legal environment. Setup and Installation To keep the installation and setup easy, we...
Cybersecurity Tips For Startups
Large Corporations, well-established government agencies, and non-governmental agencies have invested in cybersecurity to build more threat-resilient networks and systems. The case is different with business startups. Most startups lack the resources to invest in proper security measures. As such, hackers have always had a downhill task breaching startups. This is the reason why you have to be extra-vigilant to secure your...
HandleKatz : PIC Lsass Dumper Using Cloned Handles
HandleKatz tool was implemented as part of our Brucon2021 conference talk and demonstrates the usage of cloned handles to Lsass in order to create an obfuscated memory dump of the same. It compiles down to an executable living fully in its text segment. Thus, the extracted .text segment of the PE file is fully position independent code (=PIC), meaning that it can be...
aDLL : Adventure of Dynamic Link Library
aDLL is a binary analysis tool focused on the automatic discovery of DLL Hijacking vulnerabilities. The tool analyzes the image of the binary loaded in memory to search for DLLs loaded at load-time and makes use of the Microsoft Detours library to intercept calls to the Load Library/Load LibraryEx functions to analyze the DLLs loaded at run-time. The purpose...