Wsh : Web Shell Generator And Command Line Interface

0

wsh (pronounced woosh) is a web shell generator and command line interface. This started off as just an http client since interacting with webshells is a pain. There's a form, to send a command you have to type in an input box and press a button. I wanted something that fits into my workflow better and ran in the...

Jarm : Active Transport Layer Security (TLS) server fingerprinting tool

0

JARM is an active Transport Layer Security (TLS) server fingerprinting tool. JARM fingerprints can be used to: Quickly verify that all servers in a group have the same TLS configuration.Group disparate servers on the internet by configuration, identifying that a server may belong to Google vs. Salesforce vs. Apple, for example.Identify default applications or infrastructure.Identify malware command and control infrastructure and...

Learning The Term Search Engine Optimization and Its Sources

0

SEO refers to the method of creating an internet site that lot of visibility on a probe engine’s results page. To clarify, a good SEO strategy can place a company’s website at the highest of the list on a Google search page, thus increasing the chance that individuals can visit the positioning. Search engines attempt to produce the foremost...

From Alan Turing to Harvard Computer Science: How Programming Has Changed

0

Alan Turing’s story about programming is cited by many people because it depicts how the gay community is stigmatized. His contribution cuts across disciplines such as cryptography, biology, mathematics, and artificial intelligence. Turing’s work was initially unrecognized but he later discovered the Turing machine that facilitated the cracking of Enigma code in the world of programming. Programming has changed in...

How your web design can impact your content marketing?

0

How your web design can impact your content marketing? The web design that a brand uses has a great impact in determining the potential of customer attracting and retaining. Whether it is the color you have picked for your website or the images you have added to it, everything works to improve your brand's value. Thus considering a bad design...

UnhookMe : An Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your Red Teams Malware

0

UnhookMe is a Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your Red Teams Malware In the era of intrusive AVs and EDRs that introduce hot-patches to the running processes for their enhanced optics requirements, modern adversaries must have a robust tool to slide through these watchguards. The propsed implementation of dynamic...

Sigurlfind3R : A Reconnaissance Tool To Fetch URLs From AlienVault’s OTX

0

Sigurlfind3R is a passive reconnaissance tool, it fetches known URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine. Usage sigurlfind3r -h This will display help for the tool. () _ _ _ _ _ | |/ ()_ | | / _/ | |/ | | | | '__| | |_| | '_ / _ | | | '|__ | (| | || | |...

ADCSPwn : A Tool To Escalate Privileges In An Active Directory Network By Coercing Authenticate From Machine Accounts And Relaying To The Certificate Service

0

ADCSPwn is a tool to escalate privileges in an active directory network by coercing authenticate from machine accounts (Petitpotam) and relaying to the certificate service. Usage Run ADCSPwn on your target network. Author: @batsec - MDSec ActiveBreachContributor: @Flangvik - TrustedSecadcspwn.exe --adcs --port --remote Required arguments:adcs - This is the address of the AD CS server which authentication will be relayed to.Optional arguments:port -...

Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images

0

Php-Jpeg-Injector Injects php payloads into jpeg images. Related to this post. Exploiting PHP-GD Image Create From jpeg() Function Proof-of-concept to exploit the flaw in the PHP-GD built-in function, image create from jpeg(). Inspired by one of Reddit's comment on my previous thread regarding exploiting the image create from gif() PHP-GD function. Warning: This POC was tested using libJPEG v8.0 only. The image requires...

Solitude : A Privacy Analysis Tool That Enables Anyone To Conduct Their Own Privacy Investigations

0

Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating user privacy within an app accessible for everyone. Important Note Prior to installing Solitude it should be noted that Solitude should be run on a private network that is trusted. The...