Cloudflare CDN: What Is It and How Can You Benefit from It?

0

The CDN acronym stands for "content delivery network". The majority of web traffic today is served through such networks: Amazon, Netflix, Facebook, and many other Internet giants rely on this technology. CloudFlare is a global company whose primary mission is to make the Internet better. From this article, you'll get to know the benefits of using a CDN and...

Webdiscover : The Purpose Of This Script Is To Automate The Web Enumeration Process And Search For Exploits

0

Webdiscover, the purpose of this script is to automate the web enumeration process and search for exploits and vulns. Added Tools (dependencies are installed during script execution): seclistffufnamelistdnsreconsubfinderwhatwebgospidernucleisearchsploitgo-exploitdb It creates a directory with the scan outputs, as shown in the example below. Usage Prerequisites Docker service installed If you want to build the container yourself manually, git clone the repo: git clone git@github.com:V1n1v131r4/webdiscover.git Then build your docker container docker...

SysFlow : Cloud-native System Telemetry Pipeline

0

SysFlow Telemetry Pipeline is a framework for monitoring cloud and enterprise workloads. The framework builds the plumbing required for system telemetry so that users can focus on writing and sharing analytics on a scalable, common open-source platform. The backbone of the telemetry pipeline is a new data format which lifts raw system event information into an abstraction that describes process behaviors, and...

ThreadStackSpoofer : PoC For An Advanced In-Memory Evasion Technique

0

ThreadStackSpoofer is a PoC implementation for an advanced in-memory evasion technique that spoofs Thread Call Stack. This technique allows to bypass thread-based memory examination rules and better hide shellcodes while in-process memory. Intro This is an example implementation for Thread Stack Spoofing technique aiming to evade Malware Analysts, AVs and EDRs looking for references to shellcode's frames in an examined thread's call stack....

Terra : OSINT Tool On Twitter And Instagram

0

Terra is a OSINT Tool On Twitter And Instagram. Installation Clone the github repo $ git clone https://github.com/xadhrit/terra.git Change Directory $ cd terra Requirements For requirements run following commands: $ python3 -m pip install -r requirements.txt Note For Twitter Credentials : You need credentials which are listed in twitter.yml file in creds folder for using terra. You can find more about Twitter Api and Access Tokens on Twitter's Developer Portal For Instagram Credentails: Put your Instagram's username...

SubCrawl : A Modular Framework For Discovering Open Directories, Identifying Unique Content Through Signatures And Organizing The Data With Optional Output Modules, Such As MISP

0

SubCrawl is a framework developed by Patrick Schläpfer, Josh Stroschein and Alex Holland of HP Inc’s Threat Research team. SubCrawl is designed to find, scan and analyze open directories. The framework is modular, consisting of four components: input modules, processing modules, output modules and the core crawling engine. URLs are the primary input values, which the framework parses and adds to a queuing system before crawling...

PowerShx : Run Powershell Without Software Restrictions

0

PowerShx is a rewrite and expansion on the PowerShdll project. PowerShx provide functionalities for bypassing AMSI and running PS Cmdlets. Features Run Powershell with DLLs using rundll32.exe, installutil.exe, regsvcs.exe or regasm.exe, regsvr32.exe.Run Powershell without powershell.exe or powershell_ise.exeAMSI Bypass features.Run Powershell scripts directly from the command line or Powershell filesImport Powershell modules and execute Powershell Cmdlets. Usage .dll version rundll32 rundll32 PowerShx.dll,main -erundll32 PowerShx.dll,main -f Run the script...

PortBender : TCP Port Redirection Utility

0

PortBender is a TCP port redirection utility that allows a red team operator to redirect inbound traffic destined for one TCP port (e.g., 445/TCP) to another TCP port (e.g., 8445/TCP). PortBender includes an aggressor script that operators can leverage to integrate the tool with Cobalt Strike. However, because the tool is implemented as a reflective DLL, it can integrate...

PEASS-ng : Privilege Escalation Awesome Scripts SUITE new generation

0

PEASS-ng is a Privilege Escalation Awesome Scripts SUITE new generation. Here you will find privilege escalation tools for Windows and Linux/Unix* and MacOS. These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily. Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyzWinPEAS - Windows local Privilege Escalation Awesome Script (C#.exe and .bat)Check...

Metabadger : Prevent SSRF Attacks On AWS EC2 Via Automated Upgrades To The More Secure Instance Metadata Service V2 (IMDSv2)

0

Metabadger Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2). Metabadger Purpose and functionality Diagnose and evaluate your current usage of the AWS Instance Metadata Service along with understanding how the service worksPrepare you to upgrade to v2 of the Instance Metadata service to safeguard against v1 attack vectorsGive you the ability to...