Typodetect : Detect The Active Mutations Of Domains

0

Typodetect is a tool gives blue teams, SOC's, researchers and companies the ability to detect the active mutations of their domains, thus preventing the use of these domains in fraudulent activities, such as phishing and smishing. For this, Typodetect allows the use of the latest available version of the TLDs (Top Level Domains) published on the IANA website, the validation...

Krane : Kubernetes RBAC Static Analysis And Visualisation Tool

0

Krane is a simple Kubernetes RBAC static analysis tool. It identifies potential security risks in K8s RBAC design and makes suggestions on how to mitigate them. Krane dashboard presents current RBAC security posture and lets you navigate through its definition. Features RBAC Risk rules - Krane evaluates a set of built-in RBAC risk rules. These can be modified or extended with a set of custom rules.Portability - Krane can run...

TotP-SSH-Fluxer : Take Security By Obscurity To The Next Level

0

Totp-Ssh-Fluxer will take Security By Obscurity To The Next Level. Some people change their SSH port on their servers so that it is slightly harder to find for bots or other nasties, and while that is generally viewed as an action of security through obscurity it does work very well at killing a lot of the automated logins you always see...

defenselessV1 : Just Another Vulnerable Web Application

0

defenselessV1 is a vulnerable web application written in PHP/MySQL. This is the first version of this application. The purpose of this application is to create security awareness among developers and new guys in application security. It would soon be updated with with more bugs and a new vulnerable application is also being developed. Please let me know how...

TChopper : Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine

0

TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services display name and WMI by smuggling the malicious binary as base64 chunks and automate the process using the TChopper tool. How It Works the tool will get the file you willing to smuggle and encode the file as base64...

ColdFire : Golang Malware Development Library

0

ColdFire provides various methods useful for malware development in Golang. Most functions are compatible with both Linux and Windows operating systems. Installation go get github.com/redcode-labs/ColdFire Types Of Functions Included LoggingAuxiliaryReconnaissanceEvasionAdministrationSandbox detectionDisruptive Documentation Logging Functions func F(s string, arg …interface{}) stringAlias for fmt.Sprintffunc PrintGood(msg string)Print good status messagefunc PrintInfo(msg string)Print info status messagefunc PrintError(msg string)Print error status messagefunc PrintWarning(msg string)Print warning status message Auxiliary...

Neurax : A Framework For Constructing Self-Spreading Binaries

0

Neurax is a framework that aids in creation of self-spreading software. Requirements go get -u github.com/redcode-labs/Coldfire go get -u github.com/yelinaung/go-haikunator New in v. 2.0 New wordlist mutators + common passwords by countryImprovised passive scanning.FastScan option that makes active scans a bit quickerWordlists are created strictly in-memoryNeuraxScan() accepts a callback function instead of channel as an argument.NeuraxScan() scans in infinite loop with possibility to set interval between each...

Nebula : Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS

0

Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is build with modules for each provider and each functionality. As of April 2021, it only covers AWS, but is currently an ongoing project and hopefully will continue to grow to test GCP, Azure, Kubernetes, Docker, or automation engines like Ansible, Terraform, Chef, etc. Currently covers S3 Bucket name bruteforceIAM,...

Bn-Uefi-Helper : Helper Plugin For Analyzing UEFI Firmware

0

Bn-Uefi-Helper is a tool to helper plugin for analyzing UEFI firmware. This plugin contains the following features: Apply the correct prototype to the entry point functionFix segments so all segments are RWX and have the correct semanticsThis allows for global function pointers to be rendered correctlyApply types for core UEFI services (from EDK-II)Locate known protocol GUIDs and assign the GUID...

Penglab : Abuse Of Google Colab For Cracking Hashes

0

Penglab is a ready-to-install setup on Google Colab for cracking hashes with an incredible power, really useful for CTFs.  It installs by default : HashcatJohnHydraSSH (with ngrok) And now, it can also : Launch an integrated shellDownload the wordlists Rockyou and HashesOrg2019 quickly ! You only need a Google Account to use Google Colab, and to use ngrok for SSH. How To Use It ? Go on...