Red-Detector : Scan Your EC2 Instance To Find Its Vulnerabilities Using Vuls.io
Red-Detector is a tool to Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/). Audit your EC2 instance to find security misconfigurations using Lynis (https://cisofy.com/solutions/#lynis). Scan your EC2 instance for signs of a rootkit using Chkrootkit (http://www.chkrootkit.org/). Requirements Configured AWS account with the EC2 actions mentioned below. The policy containing these requirements can be found in red-detector-policy.json. Actions details: Required action premissionWhy it...
Evasor : A Tool To Be Used In Post Exploitation Phase For Blue
The Evasor is an automated security assessment tool which locates existing executables on the Windows operating system that can be used to bypass any Application Control rules. It is very easy to use, quick, saves time and fully automated which generates for you a report including description, screenshots and mitigations suggestions, suites for both blue and red teams in...
Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell
Pystinger implements SOCK4 proxy and port mapping through webshell. It can be directly used by metasploit-framework, viper, cobalt strike for session online. Pystinger is developed in python, and currently supports three proxy scripts: php, jsp(x) and aspx. Usage Suppose the domain name of the server is http://example.com :8080 The intranet IPAddress of the server intranet is 192.168.3.11 SOCK4 Proxy proxy.jsp Upload to the target server and ensure that http://example.com:8080/proxy.jsp can access,the page...
CANalyse : A Vehicle Network Analysis And Attack Tool
CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect to simple user interfaces such as Telegram. Basically, while using this tool the attacker can provide a bot-ID and use the tool over the internet through telegram-bot. CANalyse is made to be placed inside a raspberry-PI and able to...
Judge Jury And Executable : A File System Forensics Analysis Scanner & Threat Hunting Tool
Judge Jury And Executable is a File System Forensics Analysis Scanner And Threat Hunting Tool Features Scan a mounted filesystem for threats right awayOr gather a system baseline before an incident, for extra threat hunting abilityCan be used before, during or after an incidentFor one to many workstationsScans the MFT, bypassing file permissions, file locks or OS file protections/hiding/shadowingUp to 51...
KubeArmor : Container-aware Runtime Security Enforcement System
Introduction to KubeArmor KubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file access, networking operation, and resource utilization) of containers at the system level. KubeArmor operates with Linux security modules (LSMs), meaning that it can work on top of any Linux platforms (such as Alpine, Ubuntu, and Container-optimized OS from Google) if Linux security...
Botkube : An App That Helps You Monitor Your Kubernetes Cluster, Debug Critical Deployments And Gives Recommendations For Standard Practices
BotKube integration with Slack, Mattermost or Microsoft Teams helps you monitor your Kubernetes cluster, debug critical deployments and gives recommendations for standard practices by running checks on the Kubernetes resources. You can also ask BotKube to execute kubectl commands on k8s cluster which helps debugging an application or cluster. Hacktoberfest 2020 BotKube is participating in Hacktoberfest 2020. We are giving some really cool swags to our...
Duplicut : Remove Duplicates From MASSIVE Wordlist, Without Sorting It
Duplicut is a modern password wordlist creation usually implies concatenating multiple data sources. Ideally, most probable passwords should stand at start of the wordlist, so most common passwords are cracked instantly. With existing dedupe tools you are forced to choose if you prefer to preserve the order OR handle massive wordlists. Unfortunately, wordlist creation requires both: So i wrote duplicut in highly optimized C to address this very specific need Quick start git...
Cybersecurity : Tips for the Best Measures to Protect Your Data
Cybersecurity is becoming a challenge to most individuals in society nowadays. People are losing money, among other essentials, through online fraud. Now, is there a need to sensitize people about Cybersecurity? Besides, what are the measures you can take to avoid cybercrime? Let’s find that out by reading through this post! Simple Cybersecurity Measures for Protecting Your Account If you want...
WinPmem : The Multi-Platform Memory Acquisition Tool
WinPmem has been the default open source memory acquisition driver for windows for a long time. It used to live in the Rekall project, but has recently been separated into its own repository. Description WinPmem is a physical memory acquisition tool with the following features: Open sourceSupport for WinXP - Win 10, x86 + x64. The WDK7600 can be used to include...