Tea : SSH-Client Worm

0

Tea is a ssh-client worm made with tas framework. How it works? This is a fakessh-client that manipulates the tty input/output to execute arbitrary commands and upload itself through the ssh connection. To work properly, the remote machine needs: Display the "last login" message when login. Dd and stty target user using bash as default shell. Capability to run the fakessh binary. Writable...

Microsoft WinUI : Windows UI Library Roadmap

0

WinUI is the native UI platform for Windows 10. This document outlines the prospective roadmap for new website through 2019 and into 2020. It is under active development by the Microsoft developer platform team and the roadmap will continue to evolve based on market changes and customer feedback, so please note that the plans outlined here aren't exhaustive or...

Zelos : A Comprehensive Binary Emulation Platform

0

Zelos is a comprehensive binary emulation platform. It (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of it is to quickly assess the dynamic behavior of binaries via command-line or python scripts. All syscalls are emulated to isolate the target binary. Linux x86_64 (32- and 64-bit), ARM and MIPS binaries are supported. Unicorn provides CPU emulation. Full documentation is available here....

Pickl3 : Windows Active User Credential Phishing Tool

0

Pickl3 is a Windows active user credential phishing tool.You can execute the Pickl3 and phish the target user credential. Operational Usage - 1 Nowadays, since the operating system of many end users is Windows 10, we cannot easily steal account information with Mimikatz-like projects like the old days. Using Pickl3, you can try to steal the account information of the active...

Betwixt : Web Debugging Proxy Based On Chrome Devtools Network Panel

0

Betwixt is a web Debugging Proxy based on Chrome DevTools Network panel.Betwixt will help you analyze web traffic outside the browser using familiar Chrome DevTools interface. Installing Download the latest release for your operating system, build your own bundle or run Betwixt from the source code. Setting Up In order to capture traffic, you'll have to direct it to the proxy created by Betwixt in the background (http://localhost:8008). If...

Dirble : Fast Directory Scanning And Scraping Tool

0

Dirble is a website directory scanning tool for Windows and Linux. It's designed to be fast to run and easy to use. How to Use? Download one of the precompiled binaries for Linux, Windows, or Mac, or compile the source using Cargo, then run it from a terminal. The default wordlist Dirble uses is dirble_wordlist.txt in the same directory as the executable. It can...

Pentest Tools Framework : A Database Of Exploits, Scanners & Tools For Penetration Testing

0

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities. About PTF It is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You...

RedRabbit : Red Team PowerShell Script

0

RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam. The aim is to highlight just how Powerful PowerShell is and how it can be used against you (Ethically). To Run You can either run locally by downloading the script or run remotely using: powershell –nop –c “iex(New-Object Net.WebClient).DownloadString(‘https://raw.githubusercontent.com/securethelogs/RedRabbit/master/redrabbit.ps1’)” If you run remotely, you will always get the latest version Also...

Sifter : A Osint, Recon & Vulnerability Scanner

0

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface...

WireGuard Brings The Evolution of VPNs

0

Most people don’t care about how the internet works; they want it to work. The same goes for other essential electronics and tech in the digital age, for example, routers and broadband connections. But every so often, there are significant breakthroughs that are a pretty big deal to techies. These are the revolutionary moments that change the way most people use the internet. And one...