TsharkVM : Tshark + ELK Analytics Virtual Machine

0

tsharkVM, this project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds Debian 10 with pre-installed and pre-configured ELK stack. After the VM is up, the process is simple: decoded pcaps (tshark -T ek output / ndjson) are sent over TCP/17570 to the VMELK stack in VM will process...

Process-Dump : Windows Tool For Dumping Malware PE Files From Memory Back To Disk For Analysis

0

Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware files are packed and obfuscated before they are executed in order to avoid AV scanners, however when these files are executed they will often unpack or inject a clean version of the malware code in memory. A common task...

How to ensure compliance in the workplace

0

It doesn’t matter what industry you’re in, it’s important to ensure compliance. You need to adhere to local and national laws and regulations. Here’s how to ensure compliance in the workplace. Documenting policies and procedures In order to ensure compliance in the workplace, you need to make sure all of your policies and procedures are documented. These should be available on...

adalanche : Active Directory ACL Visualizer and Explorer

0

adalanche is a Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people are just added to Domain Admins. In large organizations you have a huge number of people with different needs, and they are delegated access to varying degrees of power in the AD. At some point in...

JWTXploiter : A Tool To Test Security Of Json Web Token

0

JWTXploiter is a tool to test security of JSON Web Tokens. Test a JWT against all known CVEs; Tamper with the token payload: changes claims and subclaims values.Exploit known vulnerable header claims (kid, jku, x5u)Verify a tokenRetrieve the public key of your target's ssl connection and try to use it in a key confusion attack with one option onlyAll JWAs...

Top 6 Front End Development Companies

0

Front-end development is a mix of development, technology, trends, design, graphic, usability, and creativity that is responsible for everything, what’s visible to users. An intuitive web interface adapted to users’ needs and expectations undoubtedly has an enormous impact on the way the customers perceive the brand. In this post, we have rounded up a list of the best web app...

Raider : Web Authentication Testing Framework

0

Raiders is a framework designed to test authentication for web applications. While web proxies like ZAProxy and Burpsuite allow authenticated tests, they don't provide features to test the authentication process itself, i.e. manipulating the relevant input fields to identify broken authentication. Most authentication bugs in the wild have been found by manually testing it or writing custom scripts that replicate the behavior. Raider aims to...

Cerbrutus : Network Brute Force Tool, Written In Python

0

Cerbrutus is a Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB, HTTP(s) POST, HTTP(s) GET, HTTP BASIC AUTH Thanks to @0dayctf, Rondons, Enigma, and 001 for testing and contributing Installation cd /optgit clone https://github.com/Cerbrutus-BruteForcer/cerbrutus Usage python3 /opt/cerbrutus/cerbrutus.py --helpusage: cerbrutus.py -U USERS -P PASSWORDS ]] Host...

Jsleak : A Go Code To Detect Leaks In JS Files Via Regex Patterns

0

jsleak is a tool to identify sensitive data in JS files through regex patterns. Although it's built for this, you can use it to identify anything as long as you have a regex pattern for it. How To Install Directly: {your package manager} install pkg-config libpcre++-devgo get github.com/0xTeles/jsleak/v2/jsleak How To Use -json string Json output file-pattern string File contains patterns to test-timeout int Timeout...

CSIRT-Collect : PowerShell Script To Collect Memory And (Triage) Disk Forensics

0

CSIRT-Collect is a PowerShell script to collect memory and (triage) disk forensics for incident response investigations. The script leverages a network share, from which it will access and copy the required executables and subsequently upload the acquired evidence to the same share post-collection. Permission requirements for said directory will be dependent on the nuances of the environment and what credentials are...