GDir-Thief : Red Team Tool For Exfiltrating The Target Organization’S Google People Directory That You Have Access To, Via Google’s API

0

GDir-Thief is a Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's People API. HOW TO Create a new Google Cloud Platform (GCP) project Steps to get the Google API Access Token needed for connecting to the API Create a burner gmail/google accountLogin to said accountNavigate to the Google Cloud ConsoleNext to "Google Cloud Platform,"...

MacHound : An extension to audit Bloodhound collecting and ingesting of Active Directory relationships on MacOS hosts

0

MacHound is an extension to the Bloodhound audting tool allowing collecting and ingesting of Active Directory relationships on MacOS hosts. MacHound collects information about logged-in users, and administrative group members on Mac machines and ingest the information into the Bloodhound database. In addition to using the HasSession and AdminTo edges, MacHound adds three new edges to the Bloodhound database: CanSSH...

FRIDA-DEXDump : Fast Search And Dump Dex On Memory

0

FRIDA-DEXDump is a tool for Fast Search And Dump Dex On Memory. Features support fuzzy search broken header dex.fix struct data of dex-header.compatible with all android version(frida supported).support loading as objection plugin ~pypi package has been released ~ Requires frida: pip install frida click pip install click Installation From pypi pip3 install frida-dexdumpfrida-dexdump -h From source git clone https://github.com/hluwa/FRIDA-DEXDumpcd FRIDA-DEXDump/frida-dexdumppython3 main.py -h Usage Run frida-dexdump or python3 main.py to attach current front most application and dump dexs.Or,...

Scour : AWS Exploitation Framework

0

Scour is a modern module based AWS exploitation framework written in golang, designed for red team testing and blue team analysis. Scour contains modern techniques that can be used to attack environments or build detections for defense. Features  Command Completion Dynamic resource listing Command history Blue team mode (tags attacks with unique User Agent) Installation Scour is written in golang so its easy to ship around...

Backstab : A Tool To Kill Antimalware Protected Processes

0

Backstab is a tool to Kill Antimalware Protected Processes. Kill EDR Protected Processes Have these local admin credentials but the EDR is standing in the way? Unhooking or direct syscalls are not working against the EDR? Well, why not just kill it? Backstab is a tool capable of killing antimalware protected processes by leveraging sysinternals’ Process Explorer (ProcExp) driver, which...

Invoke-DNSteal : Simple And Customizable DNS Data Exfiltrator

0

Invoke-DNSteal is a Simple & Customizable DNS Data Exfiltrator. This tool helps you to exfiltrate data through DNS protocol over UDP and TCP, and lets you control the size of queries using random delay. Also, allows you to avoid detections by using random domains in each of your queries and you can use it to transfer information both locally and remotely. Requirements Powershell...

Gorsair : Hacks Its Way Into Remote Docker Containers That Expose Their APIs

0

Gorsair is a penetration testing tool for discovering and remotely accessing Docker APIs from vulnerable Docker containers. Once it has access to the docker daemon, you can use Gorsair to directly execute commands on remote containers. Exposing the docker API on the internet is a tremendous risk, as it can let malicious agents get information on all of the other...

Red-Shadow : Lightspin AWS IAM Vulnerability Scanner

0

Red-Shadow is a tool for Lightspin AWS IAM Vulnerability Scanner. Scan your AWS IAM Configuration for shadow admins in AWS IAM based on misconfigured deny policies not affecting users in groups discovered by Lightspin's Security Research Team. The tool detects the misconfigurations in the following IAM Objects: Managed PoliciesUsers Inline PoliciesGroups Inline PoliciesRoles Inline Policies Research Summary AWS IAM evaluation logic for deny policies...

Forblaze : A Python Mac Steganography Payload Generator

0

Forblaze is a project designed to provide steganography capabilities to Mac OS payloads. Using python3, it will build an Obj-C file for you which will be compiled to pull desired encrypted URLs out of the stego file, fetch payloads over https, and execute them directly into memory. It utilizes custom encryption - it is not cryptographically secure, but purely...

S3-Account-Search : S3 Account Search

0

S3-Account-Search tool lets you find the account id an S3 bucket belongs too. For this to work you need to have at least one of these permissions: Permission to download a known file from the bucket (s3:getObject).Permission to list the contents of the bucket (s3:ListBucket). Additionally, you will need a role that you can assume with (one of) these permissions on the...