ArreStats – The Ultimate Tool For Exploring New Jersey’s Arrest Records

0

In the ever-evolving landscape of data journalism, tools that allow for the exploration of public records in an intuitive and detailed manner are invaluable. ArreStats emerges as a standout utility designed specifically for delving into the New Jersey Arrest file, a comprehensive database maintained by the FBI. Developed during Hack Jersey 2.0, a hackathon focused on fostering innovative solutions...

teler : Version 3 With Enhanced Capabilities And Community-Driven Development

0

teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community.  Note If you upgrade from prior to v2 frontwards there will be some break changes that affect configuration files. Appropriate adaptations can refer to teler.example.yaml file. See also: kitabisa/teler-waf: teler-waf is a Go HTTP middleware that provide teler IDS functionality to protect against web-based...

Invoke-ADEnum : Comprehensive Guide To Active Directory Enumeratio

0

Invoke-ADEnum is an enumeration tool designed to automate the process of gathering information from an Active Directory environment. With Invoke-ADEnum, you can enumerate various aspects of Active Directory, including forests, domains, trusts, domain controllers, users, groups, computers, shares, subnets, ACLs, OUs, GPOs, and more. One of the features of Invoke-ADEnum is its ability to generate an Active Directory Audit Report in...

Quick Setup Guide for Amnesiac – Running Directly From Memory

0

Amnesiac does not require installation on the target system. To get started, simply load the tool in memory and run, or clone the repository to your local machine. iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/Leo4j/Amnesiac/main/Amnesiac.ps1');Amnesiac Quick Start Get your first shell without reading the documentation Scan the Network for Admin Access From the main menu, press 0. This initiates a network scan to discover targets where you have admin...

Okta Terrify – Exposing Vulnerabilities In Passwordless Authentication

0

This tools was released as part of my BSides Cymru 2024 talk, Okta Terrify: Persistence in a Passwordless World. The presentation deck and demonstration video have been included with this repository. Okta Terrify is a tool to demonstrate how passwordless solutions such as Okta Verify's FastPass or other FIDO2/WebAuthn type solutions can be abused once an authenticator endpoint has been...

Cyber Detective’s OSINT Tools Collection

0

Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the links from my tweets in this collection (already 1000+ services for a wide variety of purposes). Thank you for following me! @cyb_detective Don't forget that OSINT's main strength is in automation. Read the Netlas Cookbook for details and examples. Most Important Categories SectionLinkMaps, Geolocation and TransportExploreSocial...

SocialPath – A Comprehensive Tool For Social Media Analysis And Darknet User Tracking

0

SocialPath emerges as a cutting-edge tool designed for security researchers and digital forensics experts. It enables the tracking and analysis of users across various social media platforms while also offering unique capabilities for deanonymizing darknet users. With support for multiple services and robust technical requirements, SocialPath provides a detailed, user-centric view of digital footprints. Track users across social media platforms Deanonymizing...

Kamerka GUI – Advanced Reconnaissance For IoT And ICS

0

Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS). Developed with support from powerful platforms like Shodan and enhanced by resources from Binary Edge and WhoisXMLAPI, this tool offers an unparalleled view into the security posture of critical infrastructures worldwide. Explore how Kamerka GUI leverages open-source information and exploits...

Gitleaks – Comprehensive Guide To Detecting Hardcoded Secrets In Git Repositories

0

Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one solution for detecting secrets, past or present, in your code. ➜ ~/code(master) gitleaks detect --source . -v ○ │╲ │ ○ ○ ░ ░ ...

Abuse INSIGHTS – Harnessing Python To Decode Brute Force Usernames From Compromised Hosts

0

Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted by regex from Abuse IP DB's reporter comments. Installing Prerequisites Python 2.7 Dependencies Abuse IP DB API Key. Installation $ git clone https://github.com/west-wind/abuse-insights.git $ cd abuse-insights $ python abuse-insights.py Intended Use The intention of this script is to obtain insights about the sort of usernames that are attempted in...