Rustcat : Netcat Alternative

0

Rustcat is a port listener that can be used for different purposes.It is basically like netcat but with fewer options. Why Use Rustcat? Serves it purpose of listening to portsHas command historyIt is easy to useSupports udpUses colors Installation Debian wget https://github.com/robiot/rustcat/releases/latest/download/rustcat_amd64.debsudo apt install ./rustcat_amd64.deb Arch git clone https://aur.archlinux.org/rustcat.gitcd rustcatmakepkg -si Or with yay: yay -S rustcat Other Distributions To install from crates.io: cargo install rustcat To install the latest github release...

Joern : Open-source Code Analysis Platform For C/C++/Java Based On Code Property Graphs

0

Joern is an open-source Code Analysis Platform For C/C++/Java Based On Code Property Graphs. Quick Installation wget https://github.com/ShiftLeftSecurity/joern/releases/latest/download/joern-install.shchmod +x ./joern-install.shsudo ./joern-install.shjoernCompiling (synthetic)/ammonite/predef/interpBridge.scCompiling (synthetic)/ammonite/predef/replBridge.scCompiling (synthetic)/ammonite/predef/DefaultPredef.scCompiling /home/tmp/shiftleft/joern/(console)██╗ ██████╗ ███████╗██████╗ ███╗ ██╗██║██╔═══██╗██╔════╝██╔══██╗████╗ ██║██║██║ ██║█████╗ ██████╔╝██╔██╗ ██║██ ██║██║ ██║██╔══╝ ██╔══██╗██║╚██╗██║╚█████╔╝╚██████╔╝███████╗██║ ██║██║ ╚████║╚════╝ ╚═════╝ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═══╝joern> If the installation script fails for any reason, try ./joern-install --interactive

PPLdump : Dump The Memory Of A PPL With A Userland Exploit

0

PPLdump implements a userland exploit that was initially discussed by James Forshaw (a.k.a. @tiraniddo) - in this blog post - for dumping the memory of any PPL as an administrator. I wrote two blog posts about this tool. The first part is about Protected Processes concepts while the second one dicusses the bypass technique itself. Blog post part #1: Do You Really Know About LSA Protection (RunAsPPL)?Blog post part...

Aggrokatz : An Aggressor Plugin Extension For Cobalt Strike Which Enables Pypykatz To Interface With The Beacons Remotely

0

aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely.The current version of aggrokatz allows pypykatz to parse LSASS dump files and Registry hive files to extract credentials and other secrets stored without downloading the file and without uploading any suspicious code to the beacon (Cobalt Strike is already there anyhow). In the future this project aims to provide additional features...

Volatility GUI : GUI For Volatility Forensics Tool

0

This is a GUI for Volatility forensics tool written in PyQT5. Prerequisites 1- Installed version of Volatility. 2- Install PyQT5. sudo apt-get install python3-pyqt5 3- Download Volatility GUI Configuration From the downloaded Volatility GUI, edit config.py file to specify 1- Python 2 bainary name or python 2 absolute path in python_bin. 2- Volatility binary absolute path in volatility_bin_loc. Then run config.py script to build the profiles list according to your configurations python3 config.py After that start...

Gundog : Guided Hunting In Microsoft 365 Defender

0

gundog - PowerShell based guided hunting in Microsoft 365 Defender Gundog provides you with guided hunting in Microsoft 365 Defender. Especially (if not only) for Email and Endpoint Alerts at the moment. Functionality You provide an AlertID (you might received via Email notification) and gundog will then hunt for as much as possible associated data. It does not give you the flexibility...

Redpill : Assist Reverse Tcp Shells In Post-Exploration Tasks

0

Redpill project aims to assist reverse tcp shells in post-exploration tasks. Often in redteam engagements weneed to use unconventional ways to access target system, such as reverse tcp shells (not metasploit) in orderto bypass the defenses implemented by the system administrator. After the first stage was successful compleatedwe face another type of problems: "I have (shell) access to the target...

iOS Malicious Bit Hunter : A Malicious Plug-In Detection Engine For iOS Applications

0

iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the macho file of the injected dylib dynamic library based on runtime, and can perform behavior analysis through interface input characteristics to determine the behavior of the dynamic library feature. The program does not rely on the jailbreak environment and...

Interactsh : An OOB Interaction Gathering Server And Client Library

0

Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external interactions, For example - Blind SQLi, Blind CMDi, SSRF, etc. Features DNS/HTTP/SMTP Interaction supportCLI Client / Web Dashboard supportAES encryption with zero loggingAutomatic ACME based Wildcard TLS w/ Auto RenewalSELF Hosting version support A hosted instance of the service with WEB UI is...

A2P2V : Automated Attack Path Planning and Validation

0

A2P2V ( Automated Attack Path Planning and Validation) is a planning and cyber-attack tool that provides the capability for users to determine a set of ranked attack sequences given a specific attacker goal. The aim of the tool is to simplify process so that non-security experts can generate clear, actionable intelligence from basic inputs using as much automation as...