The-Bastion : Authentication, Authorization, Traceability And Auditability For SSH Accesses
Bastions are a cluster of machines used as the unique entry point by operational teams (such as sysadmins, developers, database admins, to securely connect to devices (servers, virtual machines, cloud instances, network equipment, ...), usually using ssh. Bastions provides mechanisms for authentication, authorization, traceability and auditability for the whole infrastructure. Learn more by reading the blog post series that announced the release: Part...
DNSStager : Hide Your Payload In DNS
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS. DNSStager will create a malicious DNS server that handles DNS requests to your domain and return your payload as a response to specific record requests such as AAAA or TXT records after splitting it into chunks and encoding the payload using different algorithms. DNSStager can generate a custom...
Bughound : Static Code Analysis Tool Based On Elastic search
Bughound is an open-source static code analysis tool that analyzes your code and sends the results to Elasticsearch and Kibana to get useful insights about the potential vulnerabilities in your code. Bughound has its own Elasticsearch and Kibana Docker image that is preconfigured with dashboards to give you a strong visualization for the findings. You can detect various types of vulnerabilities...
Kali-Whoami : A Privacy Tool Developed To Keep You Anonymous On Kali Linux At The Highest Level
Kali-Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly with its ease of use and simple interface. It follows two different paths to ensure the highest possible level of anonymity. Finally, don't forget that there is never a hundred percent security on the internet! Features Anti mitmLog killerIP changerDns changerMac changerAnti cold bootTimezone changerHostname...
Exploit_Mitigations : Knowledge Base Of Exploit Mitigations Available Across Numerous Operating Systems, Architectures And Applications And Versions
Exploit_Mitigations goal is to list mitigations added over time in various operating systems, software, libraries or hardware. It becomes handy to know if a given vulnerability is easily exploitable or not depending on exploitation mitigations in place. An example is the following: Supported Targets We currently support the following operating systems: Microsoft WindowsLinuxGoogle AndroidApple iPhone OS (iOS)OpenBSDFreeBSD and the following software: Mozilla FirefoxMicrosoft EdgeGoogle...
10 Reasons Why SME Cybersecurity is Vital to Future Success
Thanks to the COVID-19 pandemic, an increasing number of people and organizations around the world are heading online to buy and sell. Storefront digitalization has become the norm. While this growth of technology use has no doubt had a positive impact on society, unfortunately it comes with several risks: one of them being cyber-attacks. As technology progresses, so does the...
Ventoy : A New Bootable USB Solution
Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files.With ventoy, you don't need to format the disk over and over, you just need to copy the image files to the USB drive and boot it. You can copy many image files at a time and ventoy will give you a boot menu to select...
Redteam-Hardware-Toolkit : Red Team Hardware Toolkit
Redteam should be formed with the intention of identifying and assessing vulnerabilities, testing assumptions, viewing alternate options for attack and revealing the limitations and security risks for that organization. There are many benefits to Red Teaming. First, you have a designated group with tactical experience in challenging the security of your organization at all times. This is important to...
Injector : Complete Arsenal Of Memory Injection And Other Techniques For Red-Teaming In Windows
Injector is a Complete Arsenal of Memory injection and other techniques for red-teaming in Windows. What Does Injector Do? Process injection support for shellcode located at remote server as well as local storage. Just specify the shellcode file and it will do the rest. It will by default inject into notepad.exe and if not found, it will create a notepad process...
DcRat : A Simple Remote Tool Written In C#
DcRat is a simple remote tool written in C#. Introduction Features TCP connection with certificate verification, stable and securityServer IP port can be archived through linkMulti-Server,multi-port supportPlugin system through Dll, which has strong expansibilitySuper tiny client size (about 40~50K)Data transform with msgpack (better than JSON and other formats)Logging system recording all events Functions Remote shellRemote desktopRemote cameraRegistry EditorFile managementProcess managementNetstatRemote recordingProcess notificationSend fileInject fileDownload...