OffensiveRust : Rust Weaponization For Red Team Engagements

0

OffensiveRust, my experiments in weaponizing Rust for implant development and general offensive operations. Why Rust? It is faster than languages like C/C++It is multi-purpose language, bearing excellent communitiesIt has an amazing inbuilt dependency build management called CargoIt is LLVM based which makes it a very good candidate for bypassing static AV detectionSuper easy cross compilation to Windows from *nix/MacOS, only requires you to...

4-ZERO-3 : 403/401 Bypass Methods + Bash Automation

0

4-ZERO-3 Tool to bypass 403/401. This script contain all the possible techniques to do the same. NOTE : If you see multiple /bypasses as output, you must check the Content-Length. If the content-length is same for multiple /bypasses means false positive. Reason can be "301/302" or "../" DON'T PANIC.Script will print cURL PAYLOAD if possible bypass found. Preview Help root@me_dheeraj:$ bash 403-bypass.sh -h  Usage / Modes Scan with...

5 Types of Cyber Security Threats

0

A cyber-attack can cause devastating effects on a business. Not only can it shut down your operations, but your reputation can be significantly impacted. In order to prevent them from happening as much as possible, it's essential to know what types of threats there are. Below, we will talk about just five that you should watch out for. Sound interesting? Then...

DetectionLabELK : A Fork From DetectionLab With ELK Stack Instead Of Splunk

0

DetectionLabELK is the perfect lab to use if you would like to build effective detection capabilities. It has been designed with defenders in mind. Its primary purpose is to allow blueteams to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified...

Cracken : A Fast Password Wordlist Generator, Smartlist Creation And Password Hybrid-Mask Analysis Tool

0

Cracken is a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust (more on talk/). Inspired by great tools like maskprocessor, hashcat, Crunch and  HuggingFace's tokenizers. What? Why? Woot?? At DeepSec2021 we presented a new method for analysing passwords as Hybrid-Masks exploiting common substrings in passwords by utilizing NLP tokenizers (more info on talk/). Our method splits a password into its subwords instead of just...

FakeDataGen : Full Valid Fake Data Generator

0

FakeDataGen is a Full Valid Fake Data Generator. This tool helps you to create fake accounts (in Spanish format) with fully valid data. Within this information, you can find the most common names, emails, bank details and other useful information. Requirements Python 3Install requirements.txt Download It is recommended to clone the complete repository or download the zip file. You can do this by running the...

ELFXtract : An Automated Analysis Tool Used For Enumerating ELF Binaries

0

ELFXtract is an automated analysis tool used for enumerating ELF binaries Powered by Radare2 and r2ghidra This is specially developed for PWN challenges and it has many automated features It almost displays every details of the ELF and also decompiles its ASM to C code using r2ghidra Decompiling ELFs in Ghidra takes more time, but in elfxtract it decompiles and displays in few seconds Features in ELFXtract File infoShared object dependency detailsELF...

LOLBins : PyQT5 App For LOLBAS And GTFOBins

0

LOLBins is a PyQT app to list all Living Off The Land Binaries and Scripts for Windows from LOLBAS and Unix binaries that can be used to bypass local security restrictions in misconfigured systems from GTFOBins. Download

Redherd Framework : A Collaborative And Serverless Framework For Orchestrating A Geographically Distributed Group Of Assets

0

Redherd Framework is a collaborative and serverless framework for orchestrating a geographically distributed group of assets capable of conducting simulating complex offensive cyberspace operations. The framework takes advantage of the "as a Service" paradigm in order to deploy a ready-to-use infrastructure that can also be adopted for effective training purposes, by reliably reproducing a real-world cyberspace scenario in which red and blue...

Whoc : A Container Image That Extracts The Underlying Container Runtime

0

Whoc is a container image that extracts the underlying container runtime and sends it to a remote server. Poke at the underlying container runtime of your favorite CSP container platform! WhoC at Defcon 29 Cloud VillageAzurescape - whoc-powered research, the first cross-account container takeover in the public cloud (70,000$ bounty) How does it work? As shown by runc CVE-2019-5736, traditional Linux container runtimes expose...