Etl-Parser : Event Trace Log File Parser In Pure Python

0

Etl-Parser is a pure Python 3 parser library for ETL Windows log files. ETL is the default format for ETW as well as the default format for the Kernel logger. etl-parser has no system dependencies, and will work well on both Windows and Linux. Since this format is not documented, we merged information from the blog of Geoff Chappel and reverse engineering activities conducted by Airbus CERT team. What is ETL and why is...

Smuggler : An HTTP Request Smuggling / Desync Testing Tool

0

Smuggler is an HTTP Request Smuggling / Desync testing tool written in Python 3 Installation git clone https://github.com/defparam/smuggler.gitcd smugglerpython3 smuggler.py -h Example Usage Single Host: python3 smuggler.py -u List of hosts: cat list_of_hosts.txt | python3 smuggler.py Options usage: smuggler.py optional arguments:-h, --help show this help message and exit-u URL, --url URL Target URL with Endpoint-v VHOST, --vhost VHOSTSpecify a virtual host-x,...

What Are The Benefits of Using a CRM In 2021

0

Customer relationship management aka CRM, as many people know is one of the most essential tools in a professional environment that involves selling services. Everyone knows that CRM helps with the overall growth of the business, but what many fail to notice is the fact that CRM is incredibly helpful in improving contact management. Read this blog till the end...

Certipy : Python Implementation For Active Directory Certificate Abuse

0

Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS). Based on the C# variant Certify from @harmj0y and @tifkin_. Installation $ python3 setup.py install Usage $ certipy -husage: certipy target {find,req,auth,auto} …Active Directory certificate abusepositional arguments:target username@]{find,req,auth,auto} Actionfind Find certificate templatesreq Request a new certificateauth Authenticate with a certificateauto Automatically abuse certificate templates...

Tor-Rootkit : A Python 3 Standalone Windows 10 / Linux Rootkit Using Tor

0

Tor-Rootkit is a Python 3 standalone Windows 10 / Linux Rootkit. The networking communication get's established over the tor network. How To Use Clone the repo and change directory: git clone https://github.com/emcruise/TorRootkit.gitcd ./tor-rootkit Build docker container: docker build -t listener . Run docker container: docker run -v $(pwd)/executables:/executables/ -it listener Deploy the executables: When the listener is up and running it generates a "executables" directory containing different...

PyRDP : RDP Monster-In-The-Middle (Mitm) And Library For Python With The Ability To Watch Connections Live Or After The Fact

0

PyRDP is a Python Remote Desktop Protocol (RDP) Monster-in-the-Middle (MITM) tool and library. It features a few tools: RDP Monster-in-the-MiddleLogs credentials used when connectingSteals data copied to the clipboardSaves a copy of the files transferred over the networkCrawls shared drives in the background and saves them locallySaves replays of connections so you can look at them laterRuns console commands or PowerShell...

Androidqf : (Android Quick Forensics) Helps Quickly Gathering Forensic Evidence From Android Devices, In Order To Identify Potential Traces Of Compromise

0

Androidqf (Android Quick Forensics) is a portable tool to simplify the acquisition of relevant forensic data from Android devices. It is the successor of Snoopdroid, re-written in Go and leveraging official adb binaries. androidqf is intended to provide a simple and portable cross-platform utility to quickly acquire data from Android devices. It is similar in functionality to mvt-android. However, contrary to MVT,...

If You Need Academic Help, Here’s Where You Can Get It

0

I cannot believe I'm in year 3 what I'm don't qualify this time next year anyway. This is something for everyone to take away from if you're 18 even alright up to what however mature of a student you are there. We go this is what everyone so this video is basically as you talk in the title, if...

How to Protect Small and Medium-Sized Businesses From Cyberattacks

0

Many small and medium-sized business owners mistakenly believe that their businesses will not fall victim to cyberattacks due to low turnover and a small amount of data. They believe that only large companies are exposed to such threats. However, most often in any company, it is employees who neglect security measures that pose a threat. As a result, the personal...

LDAPmonitor : Monitor Creation, Deletion And Changes To LDAP Objects Live During Your Pentest Or System Administration!

0

LDAPmonitor is a Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! With this tool you can quickly see if your attack worked and if it changed LDAP attributes of the target object. Features FeaturePython (.py)CSharp (.exe)Powershell (.ps1)LDAPS support✔️✔️✔️Random delay in seconds between queries✔️✔️✔️Custom delay in seconds between queries✔️✔️✔️Save output to logfile✔️✔️✔️Colored or not colored output...