DNSTake : A Fast Tool To Check Missing Hosted DNS Zones That Can Lead To Subdomain Takeover

0

DNSTake takeover vulnerabilities occur when a subdomain (subdomain.example.com) or domain has its authoritative nameserver set to a provider (e.g. AWS Route 53, Akamai, Microsoft Azure, etc.) but the hosted zone has been removed or deleted. Consequently, when making a request for DNS records the server responds with a SERVFAIL error. This allows an attacker to create the missing hosted zone on the service...

CVE-2021-40444 PoC : Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)

0

CVE-2021-40444 PoC is a Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution) Creation of this Script is based on some reverse engineering over the sample used in-the-wild: 938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52 (docx file) You need to install lcab first (sudo apt-get install lcab) Check REPRODUCE.md for manual reproduce steps If your generated cab is not working, try pointing out exploit.html URL to calc.cab Using First generate...

Kali Linux 2021.3 : Penetration Testing and Ethical Hacking Linux Distribution

0

Kali Linux 2021.3 is a Penetration Testing and Ethical Hacking Linux Distribution. A summary of the changes since the 2021.2 release from June are: OpenSSL - Wide compatibility by default - Keep reading for what that meansNew Kali-Tools site - Following the footsteps of Kali-Docs, Kali-Tools has had a complete refreshBetter VM support in the Live image session - Copy & paste and drag & drop...

Gokart : A Static Analysis Tool For Securing Go Code

0

GoKart is a static analysis tool for Go that finds vulnerabilities using the SSA (single static assignment) form of Go source code. It is capable of tracing the source of variables and function arguments to determine whether input sources are safe, which reduces the number of false positives compared to other Go security scanners. For instance, a SQL query...

Vailyn : A Phased, Evasive Path Traversal + LFI Scanning & Exploitation Tool In Python

0

Vailyn is a multi-phased vulnerability analysis and exploitation tool for path traversal and file inclusion vulnerabilities. It is built to make it as performant as possible, and to offer a wide arsenal of filter evasion techniques. How Does It Work? Vailyn operates in 2 phases. First, it checks if the vulnerability is present. It does so by trying to access /etc/passwd...

Rootend : A *Nix Enumerator And Auto Privilege Escalation Tool

0

Rootend is a python *nix Enumerator & Auto Privilege Escalation tool. For a full list of our tools, please visit our website https://www.twelvesec.com/ Written by: nickvourd (twitter)maldevel (twitter)servo Usage ._ _ /_ _ | | _ / / _ | | / / // | | / // _ _____ _/ _ _/ | | / /| | / / / /...

BoobSnail : Allows Generating Excel 4.0 XLM Macro

0

BoobSnail allows generating XLM (Excel 4.0) macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation. Features: various infection techniques;various obfuscation techniques;translation of formulas into languages other than English;can be used as a library - you can easily write your own generator. Building and Running Tested on: Python 3.8.7rc1 pip install -r requirements.txtpython boobsnail.py. . ..__ |_ _ |_...

Peirates : Kubernetes Penetration Testing Tool

0

Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. It automates known techniques to steal and collect service accounts, obtain further code execution, and gain control of the cluster. Where Do I Run Peirates? You run Peirates from a container running on Kubernetes. Does Peirates Attack A Kubernetes Cluster? Yes, it absolutely does. Talk to...

targetedKerberoast : Kerberoast With ACL Abuse Capabilities

0

targetedKerberoast is a Python script that can, like many others (e.g. GetUserSPNs.py), print "kerberoast" hashes for user accounts that have a SPN set. This tool brings the following additional feature: for each user without SPNs, it tries to set one (abuse of a write permission on the servicePrincipalName attribute), print the "kerberoast" hash, and delete the temporary SPN set for that operation....

exFAT: Advantages & Disadvantages of Extensible FAT

0

exFAT or the Extensible File Allocation Table was introduced in 2006 by Microsoft as a file system optimized for SD cards, USB flash drives and other flash memory. It had the status of a proprietary technology until the technical specification was released in 2019 by Microsoft. Today, it is one of the most commonly used file systems in removable...