How to monitor and optimize an SQL database

0

Are you a database admin looking for ways to make your life easier? There are plenty of effective strategies to implement and tools to use; it’s just a case of picking the right ones. To that end, here are some simple tips for monitoring and optimizing an SQL database that won’t overwhelm relative newcomers. Image Source: Pixabay Get to grips with monitoring...

PSPKIAudit : PowerShell toolkit for auditing Active Directory Certificate Services (AD CS)

0

PSPKIAudit is a PowerShell toolkit for auditing Active Directory Certificate Services (AD CS). It is built on top of PKISolution's PSPKI toolkit (Microsoft Public License). This repo contains a newer version of PSPKI than what's available in the PSGallery (see the PSPKI directory). Vadims Podans (the creator of PSPKI) graciously provided this version as it contains patches for several bugs. This README is only meant as a starting...

EDD : Enumerate Domain Data

0

EDD (Enumerate Domain Data) is designed to be similar to Power View but in .NET. Power View is essentially the ultimate domain enumeration tool, and we wanted a .NET implementation that we worked on ourselves. This tool was largely put together by viewing implementations of different functionality across a wide range of existing projects and combining them into EDD. Usage To...

Git-Secret : Go Scripts For Finding An API Key / Some Keywords In Repository

0

Git-Secret is a go scripts for finding an API key / some keywords in repository. Update V1.0.1 Removing some checkersAdding example file contains github dorks Screenshoot How to Install go get github.com/daffainfo/Git-Secret How to Use ./Git-Secret For path contain dorks, you can fill it with some keywords, for example keyword.txt passwordusernamekeysaccess_keys Download

LazySign – Create Fake Certs For Binaries Using Windows Binaries And The Power Of Bat Files

0

LazySign create fake certs for binaries using windows binaries and the power of bat files Over the years, several cool tools have been released that are capable of stealing or forging fake signatures for binary files. All of these tools however, have additional dependencies which require Go,python,... This repo gives you the opportunity of fake signing with 0 additional dependencies, all...

Brutus : An Educational Exploitation Framework Shipped On A Modular And Highly Extensible Multi-Tasking And Multi-Processing Architecture

0
Brutus : An Educational Exploitation Framework Shipped On A Modular And Highly Extensible Multi-Tasking And Multi-Processing Architecture

Brutus is an educational exploitation framework shipped on a modular and highly extensible multi-tasking and multi-processing architecture. Introduction Looking for version 1? See the branches in this repository. Brutus is an educational exploitation framework written in Python. It automates pre and post-connection network-based exploits, as well as web-based reconnaissance. As a light-weight framework, Brutus aims to minimize reliance on third-party dependencies....

PickleC2 : A Post-Exploitation And Lateral Movements Framework

0

PickleC2 is a simple C2 framework written in python3 used to help the community in Penetration Testers in their red teaming engagements. PickleC2 has the ability to import your own PowerShell module for Post-Exploitation and Lateral Movement or automate the process. Features There is a one implant for the beta version which is powershell. PickleC2 is fully encrypted communications, protecting the confidentiality and...

TsharkVM : Tshark + ELK Analytics Virtual Machine

0

tsharkVM, this project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds Debian 10 with pre-installed and pre-configured ELK stack. After the VM is up, the process is simple: decoded pcaps (tshark -T ek output / ndjson) are sent over TCP/17570 to the VMELK stack in VM will process...

Process-Dump : Windows Tool For Dumping Malware PE Files From Memory Back To Disk For Analysis

0

Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware files are packed and obfuscated before they are executed in order to avoid AV scanners, however when these files are executed they will often unpack or inject a clean version of the malware code in memory. A common task...

How to ensure compliance in the workplace

0

It doesn’t matter what industry you’re in, it’s important to ensure compliance. You need to adhere to local and national laws and regulations. Here’s how to ensure compliance in the workplace. Documenting policies and procedures In order to ensure compliance in the workplace, you need to make sure all of your policies and procedures are documented. These should be available on...