Personal Cybersecurity Tips
The increased use of technological devices has increased cybersecurity threats. Technology is constantly advancing, and the use of the internet is inevitable. Cybersecurity threats cannot stop us from using the internet and other devices. You can overcome some threats by doing simple things. From masterpapers reviews, we have compiled this article to provide some tricks to ensure you are safe...
What Makes a Great Online Game?
Games like Fortnite or League of Legends don't become a huge sensation for no reason they usually share a set of characteristics that makes them attractive to players. Online games are not like traditional games, and just having innovative gameplay and graphics is not enough to guarantee success. Games like Among Us, for instance, are extremely popular even if...
Best Linux Distro For Students
Many developers and programmers use Linux as their operating system of choice. Most professional developers choose to utilize it for their daily activities due to its complexity as an operating system. Especially since the emergence of numerous user-friendly Linux distributions, this attitude has shifted significantly. Coders, home users, kids, instructors and schools all have their own Linux distributions to choose...
CredPhish : A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS
CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user passwords, Resolve-DnsName for DNS exfiltration, and Windows Defender's ConfigSecurityPolicy.exe to perform arbitrary GET requests. For a walkthrough, see the Black Hills Infosec publication. How To Phish For User Passwords With PowerShell Spoofing credential prompts is an effective privilege escalation and lateral movement technique. It’s not uncommon to experience seemingly...
LoGiC.NET : A More Advanced Free And Open .NET Obfuscator Using Dnlib
LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works with more complex obfuscations than Goldfuscator for example. Before Obfuscation After Obfuscation Dependencies dnlib v3.3.2 : Restore NuGet packages and it'll work (if it doesn't already).SharpConfigParser : https://github.com/AnErrupTion/LoGiC.NET/raw/master/SharpConfigParser.dll Current Features Renames methods, parameters, properties, fields and events.Adds proxy calls.Encrypts strings.Encodes ints.Adds junk methods.Prevents application tampering.Adds control...
Dorothy : Tool To Test Security Monitoring And Detection For Okta Environments
Dorothy is a tool to help security teams test their monitoring and detection capabilities for their Okta environment. Dorothy has several modules to simulate actions that an attacker might take while operating in an Okta environment and actions that security teams should be able to audit. The modules are mapped to the relevant MITRE ATT&CK® tactics, such as persistence, defense evasion,...
Reconmap : VAPT (Vulnerability Assessment And Penetration Testing) Automation And Reporting Platform
Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security projects, from planning, to implementation and documentation. The tool's aim is to go from recon to report in the least possible time. Requirements DockerDocker compose Documentation Go to https://reconmap.org to find the user, admin and developer manuals. Open-Source Vulnerability Assessment And Pentesting Management Platform Reconmap is an open-source collaboration platform for InfoSec...
TokenTactics : Azure JWT Token Manipulation Toolset
TokenTactics is a Azure JSON Web Token ("JWT") Manipulation Toolset. Azure access tokens allow you to authenticate to certain endpoints as a user who signs in with a device code. Even if they used multi-factor authentication. Once you have a user's access token, it may be possible to access certain apps such as Outlook, SharePoint, OneDrive, MSTeams and more. For instance,...
Juumla : Tool Designed To Identify And Scan For Version, Config Files In The CMS Joomla!
Juumla is a python tool developed to identify the current Joomla version and scan for readable Joomla config files. Installing / Getting started A quick guide of how to install and use Juumla. Clone the repository - git clone https://github.com/oppsec/juumla.gitInstall the libraries - pip3 install -r requirements.txtRun Juumla - python3 main.py -u https://example.com Docker If you want to run Juumla in a Docker container, follow...
Rconn : Rconn Is A Multiplatform Program For Creating Generic Reverse Connections
Rconn (r conn) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT and/or firewall without adding firewall rules or port-forwarding. This is achieved by creating a connection from the node behind the firewall/NAT to a port on your local machine, and then a port is exposed in your machine through which...