DivideAndScan : Divide Full Port Scan Results And Use It For Targeted Nmap Runs
DivideAndScan is used to efficiently automate port scanning routine by splitting it into 3 phases: Discover open ports for a bunch of targets.Run Nmap individually for each target with version grabbing and NSE actions.Merge the results into a single Nmap report (different formats available). For the 1st phase a fast port scanner is intended to be used (Masscan / RustScan / Naabu), whose output is parsed and...
Endpoint Detection and Response: 6 Best Practices You Must Know About
What Is Endpoint Detection and Response? An endpoint detection and response (EDR) solution is a collection of tools and processes used to detect and analyze potential attacks and their traces on endpoint devices. Endpoints include desktops, laptops, mobile devices, and other devices connected to a corporate network. EDR solutions are designed to provide continuous monitoring and response to cyber threats and...
Qvm-Create-Windows-Qube : Spin Up New Windows Qubes Quickly, Effortlessly And Securely
qvm-create-windows-qube is a tool for quickly and conveniently installing fresh new Windows qubes with Qubes Windows Tools (QWT) drivers automatically. It officially supports Windows 7, 8.1 and 10 as well as Windows Server 2008 R2, 2012 R2, 2016 and 2019. The project emphasizes correctness, security and treating Windows as an untrusted guest operating system throughout the entire process. It also features other goodies such...
SQLFluff : A SQL Linter And Auto-Formatter For Humans
SQLFluff is a dialect-flexible and configurable SQL linter. Designed with ELT applications in mind, SQLFluff also works with jinja templating and dbt. SQLFluff will auto-fix most linting errors, allowing you to focus your time on what matters. Getting Started To get started, install the package and run sqlfluff lint or sqlfluff fix. $ pip install sqlfluff$ echo " SELECT a + b FROM tbl;...
AutoPentest DRL : Automated Penetration Testing Using Deep Reinforcement Learning
AutoPentest-DRL is an automated penetration testing framework based on Deep Reinforcement Learning (DRL) techniques. AutoPentest-DRL can determine the most appropriate attack path for a given logical network, and can also be used to execute a penetration testing attack on a real network via tools such as Nmap and Metasploit. This framework is intended for educational purposes, so that users...
ABPTTS : TCP Tunneling Over HTTP/HTTPS For Web Application Servers
ABPTTS uses a Python client script and a web application server page/package to tunnel TCP traffic over an HTTP/HTTPS connection to a web application server. In other words, anywhere that one could deploy a web shell, one should now be able to establish a full TCP tunnel. This permits making RDP, interactive SSH, Meterpreter, and other connections through the...
Etherblob Explorer : Search And Extract Blob Files On The Ethereum Blockchain Network
EtherBlob Explorer is a tool intended for researchers, analysts, CTF players or anyone curious enough wanting to search for different kinds of files or any meaningful human-supplied data on the Ethereum Blockchain Network. It searches over a user-supplied range of block IDs or UNIX timestamps on any of the 5 available networks: MainNet, Görli, Kovan, Rinkeby and Ropsten. For a...
Best WordPress Appointment Booking Plugins
WordPress is the most opted CMS around the world. As per stats, around 63.8% of CMS websites use WordPress. Why? Well, there are countless choices for themes and plugins that WordPress offers. Moreover, aspects like drag and drop editor, responsiveness, etc., make them more demanding. And these can be used to design and develop the best websites in a minimum...
IPED : Digital Forensic Tool – Process And Analyze Digital Evidence
IPED is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private examiners. Introduction Digital Evidence Processor and Indexer (translated from Portuguese) is a tool implemented in java and originally and still developed by digital forensic experts from Brazilian Federal Police since...
Ghidra-Evm : Module For Reverse Engineering Smart Contracts
Ghidra-Evm in the last few years, attacks on deployed smart contracts in the Ethereum blockchain have ended up in a significant amount of stolen funds due to programming mistakes. Since smart contracts, once compiled and deployed, are complex to modify and update different practitioners have suggested the importance of reviewing their security in the blockchain where only Ethereum Virtual...