How to Detect and Prevent Brute Force Attacks?
Although a brute force attack is among the simplest attack methods, its effects are far-reaching. They achieve it by guessing the password until you get the right combination. The attacker aims to use force to access the user account. They can use automated software or scripts to achieve this and fasten the process. However, brute force attacks take along...
Limelighter : A Tool For Generating Fake Code Signing Certificates Or Signing Real Ones
Limelighter is a tool which creates a spoof code signing certificates and sign binaries and DLL files to help evade EDR products and avoid MSS and sock scruitney. LimeLighter can also use valid code signing certificates to sign files. Limelighter can use a fully qualified domain name such as acme.com. Contributing LimeLighter was developed in golang. Make sure that the following are installed...
LazyCSRF : A More Useful CSRF PoC Generator
LazyCSRF is a more useful CSRF PoC generator that runs on Burp Suite. Motivation Burp Suite is an intercepting HTTP Proxy, and it is the defacto tool for performing web application security testing. The feature of Burp Suite that I like the most is Generate CSRF PoC. However, the function to automatically determine the content of request is broken, and it will...
Karma_V2 : A Passive Open Source Intelligence (OSINT) Automated Reconnaissance (Framework)
Karma_V2 can be used by Infosec Researchers, Penetration Testers, Bug Hunters to find deep information, more assets, WAF/CDN bypassed IPs, Internal/External Infra, Publicly exposed leaks and many more about their target. Shodan Premium API key is required to use this automation. Output from the 𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 is displayed to the screen and saved to files/directories. ℹ Regarding Premium Shodan API, Please...
Inceptor : Template-Driven AV/EDR Evasion Framework
Inceptor is a modern Penetration testing and Red Teaming often requires to bypass common AV/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently more difficult to bypass consistently. Inceptor is a tool which can help to automate great part of this process, hopefully requiring no further effort. Features Inceptor is a template-based...
DorkScout : Golang Tool To Automate Google Dork Scan Against The Entiere Internet Or Specific Targets
DorkScout is a tool to automate the finding of vulnerable applications or secret files around the internet throught google searches, dorkscout first starts by fetching the dorks lists from https://www.exploit-db.com/google-hacking-database and then it scans a given target or everything it founds Installation dorkscout can be installed in different ways: Go Packages throught Golang Packages (golang package manager) go get github.com/R4yGM/dorkscout this will work for every platform Docker if you don't have...
Fapro : Free, Cross-platform, Single-file mass network protocol server simulator
FaPro is a Fake Protocol Server tool, Can easily start or stop multiple network services. The goal is to support as many protocols as possible, and support as many deep interactions as possible for each protocol. Demo Site Features Supported Running Modes: Local Machine Virtual NetworkSupported Protocols: DNS DCE/RPC EIP Elasticsearch FTP HTTP IEC 104 Memcached Modbus MQTT MySQL RDP Redis S7 SMB SMTP SNMP SSH Telnet VNC IMAP POP3 NTP RTSP PORTMAPUse TcpForward to forward network trafficSupport tcp syn loggingSupport icmp ping loggingSupport udp packet logging Protocol Simulation Demos Rdp Support credssp...
ImpulsiveDLLHijack : C# Based Tool Which Automates The Process Of Discovering And Exploiting DLL Hijacks In Target Binaries
ImpulsiveDLLHijack is a C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during RedTeam Operations to evade EDR's. Methodological Approach The tool basically acts on automating following stages performed for DLL Hijacking: Discovery - Finding Potentially Vulnerable DLL Hijack pathsExploitation - Confirming whether the Confirmatory DLL was...
Rethink Network Access with Perimeter 81: a ZTNA Leader
Perimeter 81, a Secure Access Service Edge (SASE) platform, was named an industry leader in the Zero Trust Network Access (ZTNA) category of the Q3 2021 Forrester New Wave™ report. The platform earned the highest scores possible in the non-web and legacy apps, client support, product vision, and planned enhancements criteria. The Perimeter 81 platform is distinguished among those of...
Packet-Sniffer : A pure-Python Network Packet Sniffing Tool
Packet-Sniffer is a simple pure-Python network packet sniffer. Packets are disassembled as they arrive at a given network interface controller and their information is displayed on the screen. This application maintains no dependencies on third-party modules and can be run by any Python 3.x interpreter. Installation GNU / Linux Simply clone this repository with git clone and execute the packet_sniffer.py file as described in the following Usage section. user@host:~/DIR$ git...