Pantagrule : Large Hashcat Rulesets Generated From Real-World Compromised Passwords
Pantagrule is a series of rules for the hashcat password cracker generated from large amounts of real-world password compromise data. While Pantagrule rule files can be large, the rules are both tunable and perform better than many existing rule sets. Pantagrule was generated using PACK's Levenshtein Reverse Path algorithm for automated rule generation (Kacherginsky, 2013). PACK's output was then sorted based upon the...
Ctf-Screenshotter : A CTF Web Challenge About Making Screenshots
Ctf-Screenshotter is a CTF web challenge about making screenshots. It is inspired by a bug found in real life. The challenge was created by @LiveOverflow for https://cscg.de/. Watch the video writeup here: https://www.youtube.com/watch?v=FCjMoPpOPYI Run The Challenge To run the challenge you have to install docker-compose: docker-compose up Once the servicses are running, you should be able to access http://127.0.0.1:5000. Solution The DO_NOT_ACCESS folder contains the solution when you checkout the solution branch with git checkout solution. Download
BeaconEye : Hunts Out CobaltStrike Beacons And Logs Operator Command Output
BeaconEye scans running processes for active Cobalt Strike beacons. When processes are found to be running beacon, BeaconEye will monitor each process for C2 activity. How It Works BeaconEye will scan live processes or MiniDump files for suspected CobaltStrike beacons. In live process mode, BeaconEye optionally attaches itself as a debugger and will begin monitoring beacon activity for C2 traffic (HTTP/HTTPS...
Dorkify : Perform Google Dork Search
Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use. Google Dorking involves using advanced operators in the Google search engine to locate specific strings of text within search results such as finding specific versions of vulnerable Web applications. Users can...
SLSA : Supply-chain Levels For Software Artifacts
SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing levels of software security and supply chain integrity. The best way to read about SLSA is to visit slsa.dev. What's in this repo? The primary content of this repo is the docs/ directory, which contains the core SLSA specification and sources to the slsa.dev website. You can read SLSA's...
A Career as an Ethical Hacker
Much of an Ethical Hacker’s skills are put into testing security controls and perimeter penetration vulnerabilities in devices. They also broadly search a network or application for exploitable weaknesses. So, what is Ethical Hacking exactly? Today, we will quickly explore the world of Ethical Hacking and how one can become an Ethical Hacker. Alt Text: A Career as an Ethical...
How to monitor and optimize an SQL database
Are you a database admin looking for ways to make your life easier? There are plenty of effective strategies to implement and tools to use; it’s just a case of picking the right ones. To that end, here are some simple tips for monitoring and optimizing an SQL database that won’t overwhelm relative newcomers. Image Source: Pixabay Get to grips with monitoring...
PSPKIAudit : PowerShell toolkit for auditing Active Directory Certificate Services (AD CS)
PSPKIAudit is a PowerShell toolkit for auditing Active Directory Certificate Services (AD CS). It is built on top of PKISolution's PSPKI toolkit (Microsoft Public License). This repo contains a newer version of PSPKI than what's available in the PSGallery (see the PSPKI directory). Vadims Podans (the creator of PSPKI) graciously provided this version as it contains patches for several bugs. This README is only meant as a starting...
EDD : Enumerate Domain Data
EDD (Enumerate Domain Data) is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool, and we wanted a .NET implementation that we worked on ourselves. This tool was largely put together by viewing implementations of different functionality across a wide range of existing projects and combining them into EDD. Usage To...
Git-Secret : Go Scripts For Finding An API Key / Some Keywords In Repository
Git-Secret is a go scripts for finding an API key / some keywords in repository. Update V1.0.1 Removing some checkersAdding example file contains github dorks Screenshoot How to Install go get github.com/daffainfo/Git-Secret How to Use ./Git-Secret For path contain dorks, you can fill it with some keywords, for example keyword.txt passwordusernamekeysaccess_keys Download