AzureC2Relay : An Azure Function That Validates And Relays Cobalt Strike Beacon
AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile. Any incoming requests that do not share the profiles user-agent, URI paths, headers, and query parameters, will be redirected to a configurable decoy website. The validated C2 traffic is relayed to a team...
SNOWCRASH : A Polyglot Payload Generator
SNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected by the user (in this case combined Bash and Powershell code) is embedded into a single polyglot template, which is platform-agnostic. There are few payloads available, including command execution, reverse shell establishment, binary execution and some more :> Basic Usage Install dependencies: ./install.shList available payloads: ./snowcrash...
PoisonApple : macOS Persistence Tool
PoisonApple is a command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters for cyber threat emulation purposes. Install Do it up: $ pip3 install poisonapple --user Note: PoisonApple was written & tested using Python 3.9, it should work using Python 3.6+ Important Notes! PoisonApple will make modifications to your macOS system, it's advised...
Max : Maximizing BloodHound With A Simple Suite Of Tools
Description New Release:dpat - The BloodHound Domain Password Audit Tool (DPAT)A simple suite of tools:get-info - Pull lists of information from the Neo4j databasemark-owned - Mark a list of objects as Ownedmark-hvt - Mark a list of objects as High Value Targetsquery - Run a raw Cypher query and return outputexport - Export all outbound controlling privileges of a domain...
NtHiM : Super Fast Sub-domain Takeover Detection
NtHiM is a super Fast Sub-domain Takeover Detection. Installation Method 1: Using Pre-compiled Binaries The pre-compiled binaries for different systems are available in the Releases page. You can download the one suitable for your system, unzip the file and start using NtHiM. Method 2: Using Crates.io NtHiM is available on Crates.io. So, if you have Rust installed on your system, you can simply install...
Columbo : A Computer Forensic Analysis Tool Used To Simplify & Identify Specific Patterns In Compromised Datasets
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down data to small sections and uses pattern recognition and machine learning models to identify adversaries behaviour and their possible locations in compromised Windows platforms in a form of suggestions. Currently Columbo operates on Windows platform. Dependencies & High Level Architecture Columbo...
Burpsuite : Copy As XMLHttpRequest Extension
The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript's XmlHttpRequest, which simplifies PoC development when exploiting XSS. Installation download the latest JAR from releases or build manuallyadd JAR to burpsuite using tabs: "Extender" -> "Extensions" -> "Add" Usage select one request from any tab or a few requests in "Proxy" -> "HTTP history" tabinvoke context...
Scylla : The Simplistic Information Gathering Engine
Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced searches on Instagram & Twitter accounts, websites/webservers, phone numbers, and names. Scylla also allows users to find all social media profiles (main platforms) assigned to a certain username. In continuation, Scylla has shodan support so you can search for devices all over the internet, it...
UAC : Unix-like Artifacts Collector
UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection of Unix-like systems artifacts. It respects the order of volatility and artifacts that are changed during the execution. It was created to facilitate and speed up data collection, and depend less on remote support during incident response engagements. UAC can...
Ethical Hacking – A new evolution in the digital era
Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network. The company that owns the system or network allows Cyber Security engineers to perform such activities in order to test the system’s defenses. Thus, unlike malicious hacking, this process is planned, approved, and more importantly, legal. Ethical hackers aim to...













