Kerberoast : Kerberoast Attack -Pure Python-

0

Kerberoast attack toolkit -pure python Install pip3 install kerberoast Prerequirements Python 3.6 See requirements.txt For the impatient IMPORTANT: the accepted target url formats for LDAP and Kerberos are the following<ldap_connection_url> : <protocol>+<auth-type>://<domain><user>:<password>@<ip_or_hostname>/?<param1>=<value1><kerberos_connection_url>: <protocol>+<auth-type>://<domain><user>:<password>@<ip_or_hostname>/?<param1>=<value1> Steps -with SSPI-: kerberoast auto <DC_ip> Steps -SSPI not used-: Look for vulnerable users via LDAPkerberoast ldap all <ldap_connection_url> -o ldapenumUse ASREP roast against users in the ldapenum_asrep_users.txt filekerberoast asreproast <DC_ip> -t ldapenum_asrep_users.txtUse SPN roast against users in the ldapenum_spn_users.txt filekerberoast spnroast <kerberos_connection_url>...

ShonyDanza : A Customizable, Easy-To-Navigate Tool For Researching, Pen Testing, And Defending With The Power Of Shodan

0

ShonyDanza is a customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you can: Obtain IPs based on search criteriaAutomatically exclude honeypots from the results based on your pre-configured thresholdsPre-configure all IP searches to filter on your specified net range(s)Pre-configure search limitsUse build-a-search to craft searches with easy building blocksUse stock searches and pre-configure...

XC : A Small Reverse Shell For Linux And Windows

0

XC is a Netcat like reverse shell for Linux & Windows. Features Windows Usage:└ Shared Commands: !exit!upload uploads a file to the target!downloaddownloads a file from the target!lfwdlocal portforwarding (like ssh -L)!rfwdremote portforwarding (like ssh -R)!lsfwdlists active forwards!rmfwdremoves forward by index!pluginslists available plugins!pluginexecute a plugin!spawnspawns another client on the specified port!shellruns /bin/sh!runasrestart xc with the specified user!metconnects to a x64/meterpreter/reverse_tcp listener └ OS...

ZipExec : A Unique Technique To Execute Binaries From A Password Protected Zip

0

ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then base64 encoded into a string that is rebuilt on disk. This encoded string is then loaded into a JScript file that when executed, would rebuild the password-protected zip file on disk and execute it. This is done programmatically by...

What Does It Take to Be a Cybersecurity Expert?

0

We live in a digital world in which many companies are leveraging technologies to connect users, devices, data, goods, and services. These are new models of connectivity and information exchange. And to be able to respond to these, it is also necessary to have networks of resources that are managed through the Internet, such as, for example, the cloud. The...

Kit_Hunter : A Basic Phishing Kit Scanner For Dedicated And Semi-Dedicated Hosting

0

Kit_Hunter is a personal project to learn Python, and a basic scanning tool that will search directories and locate phishing kits based on established markers. As detection happens, a report is generated for administrators. By default the script will generate a report that shows the files that were detected as potentially problematic, list the markers that indicated them as problematic...

Digital-Forensics-Lab : Free Hands-On Digital Forensics Labs For Students And Faculty

0

Digital-Forensics-Lab is a Free Hands-On Digital Forensics Labs For Students And Faculty. Features Of Repository Hands-on Digital Forensics Labs: designed for Students and FacultyLinux-based lab: All labs are purely based on Kali LinuxLab screenshots: Each lab has PPTs with instruction screenshotsComprehensive: Cover many topics in digital forensicsFree: All tools are open sourceUpdated: The project is funded by DOJ and will keep updatingTwo...

How to Make Your Software Lifecycle Development Process Secure?

0

It’s important to have a carefully managed and supervised software development lifecycle or SDLC. Applying key, oftentimes small, and practical policies and regulations to each phase of your secure software development lifecycle will allow you and your team to quickly spot issues before they get out of hand — before they manifest in their entirety, take roots and derail...

OffensiveRust : Rust Weaponization For Red Team Engagements

0

OffensiveRust, my experiments in weaponizing Rust for implant development and general offensive operations. Why Rust? It is faster than languages like C/C++It is multi-purpose language, bearing excellent communitiesIt has an amazing inbuilt dependency build management called CargoIt is LLVM based which makes it a very good candidate for bypassing static AV detectionSuper easy cross compilation to Windows from *nix/MacOS, only requires you to...

4-ZERO-3 : 403/401 Bypass Methods + Bash Automation

0

4-ZERO-3 Tool to bypass 403/401. This script contain all the possible techniques to do the same. NOTE : If you see multiple /bypasses as output, you must check the Content-Length. If the content-length is same for multiple /bypasses means false positive. Reason can be "301/302" or "../" DON'T PANIC.Script will print cURL PAYLOAD if possible bypass found. Preview Help root@me_dheeraj:$ bash 403-bypass.sh -h  Usage / Modes Scan with...