Sniffle : A Sniffer For Bluetooth 5 And 4.X LE
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended length advertisement and data packetsSupport for BT5 Channel Selection Algorithms #1 and #2Support for all BT5 PHY modes (regular 1M, 2M, and coded modes)Support for sniffing only advertisements and ignoring connectionsSupport for channel map, connection...
Radare2 : UNIX-like Reverse Engineering Framework And Command-Line Toolset
Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks. The radare project started as a simple command-line hexadecimal editor focused on forensics, over time more features were added to support a scriptable command-line low level tool to edit from local hard drives, kernel memory, programs, remote gdb...
Personal Cybersecurity Tips
The increased use of technological devices has increased cybersecurity threats. Technology is constantly advancing, and the use of the internet is inevitable. Cybersecurity threats cannot stop us from using the internet and other devices. You can overcome some threats by doing simple things. From masterpapers reviews, we have compiled this article to provide some tricks to ensure you are safe...
What Makes a Great Online Game?
Games like Fortnite or League of Legends don't become a huge sensation for no reason they usually share a set of characteristics that makes them attractive to players. Online games are not like traditional games, and just having innovative gameplay and graphics is not enough to guarantee success. Games like Among Us, for instance, are extremely popular even if...
Best Linux Distro For Students
Many developers and programmers use Linux as their operating system of choice. Most professional developers choose to utilize it for their daily activities due to its complexity as an operating system. Especially since the emergence of numerous user-friendly Linux distributions, this attitude has shifted significantly. Coders, home users, kids, instructors and schools all have their own Linux distributions to choose...
CredPhish : A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS
CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user passwords, Resolve-DnsName for DNS exfiltration, and Windows Defender's ConfigSecurityPolicy.exe to perform arbitrary GET requests. For a walkthrough, see the Black Hills Infosec publication. How To Phish For User Passwords With PowerShell Spoofing credential prompts is an effective privilege escalation and lateral movement technique. It’s not uncommon to experience seemingly...
LoGiC.NET : A More Advanced Free And Open .NET Obfuscator Using Dnlib
LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works with more complex obfuscations than Goldfuscator for example. Before Obfuscation After Obfuscation Dependencies dnlib v3.3.2 : Restore NuGet packages and it'll work (if it doesn't already).SharpConfigParser : https://github.com/AnErrupTion/LoGiC.NET/raw/master/SharpConfigParser.dll Current Features Renames methods, parameters, properties, fields and events.Adds proxy calls.Encrypts strings.Encodes ints.Adds junk methods.Prevents application tampering.Adds control...
Dorothy : Tool To Test Security Monitoring And Detection For Okta Environments
Dorothy is a tool to help security teams test their monitoring and detection capabilities for their Okta environment. Dorothy has several modules to simulate actions that an attacker might take while operating in an Okta environment and actions that security teams should be able to audit. The modules are mapped to the relevant MITRE ATT&CK® tactics, such as persistence, defense evasion,...
Reconmap : VAPT (Vulnerability Assessment And Penetration Testing) Automation And Reporting Platform
Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security projects, from planning, to implementation and documentation. The tool's aim is to go from recon to report in the least possible time. Requirements DockerDocker compose Documentation Go to https://reconmap.org to find the user, admin and developer manuals. Open-Source Vulnerability Assessment And Pentesting Management Platform Reconmap is an open-source collaboration platform for InfoSec...
TokenTactics : Azure JWT Token Manipulation Toolset
TokenTactics is a Azure JSON Web Token ("JWT") Manipulation Toolset. Azure access tokens allow you to authenticate to certain endpoints as a user who signs in with a device code. Even if they used multi-factor authentication. Once you have a user's access token, it may be possible to access certain apps such as Outlook, SharePoint, OneDrive, MSTeams and more. For instance,...