Audix : A PowerShell Tool To Quickly Configure Windows Event

0

Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring. Note: This tool will only change the local security policy. If applied to a host with a GPO setting, it is best to use the same settings in a Group Policy default profile so all systems get the same config. If the GPO profile...

Serverless-Prey : Serverless Functions For Establishing Reverse Shells

0

Serverless-Prey is a collection of serverless functions (FaaS), that, once launched to a cloud environment and invoked, establish a TCP reverse shell, enabling the user to introspect the underlying container: Panther: AWS Lambda written in Node.jsCougar: Azure Function written in C#Cheetah: Google Cloud Function written in Go This repository also contains research performed using these functions, including documentation on where secrets...

Lunar : A Lightweight Native DLL Mapping Library

0

Lunar is a lightweight native DLL mapping library that supports mapping directly from memory. Features Imports and delay imports are resolvedRelocations are performedImage sections are mapped with the correct page protectionException handlers are initialisedA security cookie is generated and initialisedDLL entry point and TLS callbacks are called Getting Started The example below demonstrates a simple implementation of the library var libraryMapper = new LibraryMapper(process,...

Ps-Tools : An Advanced Process Monitoring Toolkit For Offensive Operations

0

Ps-Tools is an advanced process monitoring toolkit for offensive operations. Having a good technical understanding of the systems we land on during an engagement is a key condition for deciding what is going to be the next step within an operation. Collecting and analyzing data of running processes from compromised systems gives us a wealth of information and helps...

Eavesarp : Analyze ARP Requests To Identify Intercommunicating Hosts

0

Eavesarp a reconnaissance tool that analyzes ARP requests to identify hosts that are likely communicating with one another, which is useful in those dreaded situations where LLMNR/NBNS aren't in use for name resolution. Requirements/Installation This is only gon' work on Kali or other Debian-based Linux distributions eavesarp requires Python3.7 and Scapy. After installing Python, run the following to install Scapy: python3.7 -m...

Richkit : Domain Enrichment Toolkit

0

Richkit is a python3 package that provides tools taking a domain name as input, and returns additional information on that domain. It can be an analysis of the domain itself, looked up from data-bases, retrieved from other services, or some combination thereof. The purpose of richkit is to provide a reusable library of domain name-related analysis, lookups, and retrieval functions,...

Chromepass : Hacking Chrome Saved Passwords

0

Chromepass is a python-based console application that generates a windows executable with the following features: Decrypt Chrome saved paswordsSend a file with the login/password combinations remotely (email or reverse-http)Custom iconCompletely undetectable by AntiVirus Engines AV Detection Due to the way this has been coded, it is currently fully undetected. Here are some links to scans performed using a variety of websites VirusTotal Scan...

Tentacle : A POC Vulnerability Verification & Exploit Framework

0

Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls to zoomeye, fofa, shodan and other APIs to perform bulk vulnerability verification for multiple targets. Install pip3 install -r requestment.txt Also Read - DigiTrack : Attacks For $5 or Less Using Arduino Usage When you run it for the first time, the...

Tails – Live System To Preserve Your Privacy & Anonymity

0

The Tails team is happy to publish Tails 4.5, the first version of Tails to support Secure Boot. This release also fixes many security vulnerabilities. You should upgrade as soon as possible. New Features Secure BootTails now starts on computers with Secure Boot enabled.If your Mac displays the following error:Security settings do not allow this Mac to use an external startup disk.Then...

How to Send a Fax Without a Phone Line? With Fax Online Service

0

Most people today are unaware of what a fax is, leave alone how to operate a fax machine. Although it may seem to be an outdated technology, many businesses still use it to securely send confidential files.  So, how do you send a fax online without a phone line? Thanks to online fax services, you can send faxes via the...