Corsy : CORS Misconfiguration Scanner

0

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations. Requirements It only works with Python 3 and has the following dependencies: tldrequests To install these dependencies, navigate to the tool directory and execute pip3 install -r requirements.txt Usage Using it is pretty simple python3 corsy.py -u https://example.com Scan URLs from a file python3 corsy.py -i /path/urls.txt Number of threads python3 corsy.py -u https://example.com -t 20 ...

TeleGram-Scraper : Telegram Group Scraper Tool

0

TeleGram-Scraper is a telegram group scraper tool to fetch all information about group members. How To Install & Setup API ( Termux ) https://youtu.be/I8oR9tuYyrU API Setup Go to http://my.telegram.org and log in. Click on API development tools and fill the required fields. put app name you want & select other in platform Example : copy "api_id" & "api_hash" after clicking create app (...

Grouper2 : To Find Vulnerabilities In AD Group Policy

0

Grouper2 is a tool to find vulnerabilities in AD group policy. It is a tool for pentesters to help find security-related misconfigurations in Active Directory Group Policy. It might also be useful for other people doing other stuff, but it is explicitly NOT meant to be an audit tool. If you want to check your policy configs against some particular...

Gophish : Open-Source Phishing Toolkit

0

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training. Install Installation of Gophish is dead-simple - just download and extract the zip containing the release for your system, and run the binary. Gophish has binary releases for Windows,...

Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

0

Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of Neo4j. This helps in identifying the outliers easily. Since it is based on neo4j , one can query the graph using cypher queries to find the anomalies. It also supports modules to programmatically fetch data from neo4j database and...

Scallion : GPU-Based Onion Hash Generator

0

Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL. It runs on Mono (tested in Arch Linux) and .NET 3.5+ (tested on Windows 7 and Server 2008). It is currently in beta stage and under active development. Nevertheless, we feel that it is ready for use. Improvements are expected primarily in...

AntiCheat : Framework To Test Any Anti-Cheat

0

AntiCheat is a framework to test any Anti-Cheat on the market. This can be used as Template or Code Base to test any Anti-Cheat and learn along the way. The entry level to reverse AntiCheats and Cheats is quite high, therefore, I'm releasing all the code I developed during my research. The main idea is to help people and...

Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

0

Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup their environment while staying within their scope. Features * Configure Firewall * Configure Hostname * Configure Interface(s) Also Read - LOLBITS : C# Reverse Shell Using BITS As Communication Protocol Supported Operating Systems * Redhat/CentOS * Windows configuration can be generated but...

Gowitness : A Golang Web Screenshot Utility Using Chrome Headless

0

Gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using the command line. Both Linux and macOS is supported, with Windows support 'partially working'. Inspiration for gowitness comes from Eyewitness. If you are looking for something with lots of extra features, be sure to check it out along with these...

Lsassy : Extract Credentials From Lsass Remotel

0

Lsassy is a tool used to extract credentials from lsass remotely. This library uses impacket project to remotely read necessary bytes in lsass dump and pypykatz to extract credentials. ChaptersDescriptionRequirementsRequirements to install lsassy from sourceInstallationInstallation commands from pip or from sourceBasic UsageCommand line template for standalone versionAdvanced UsageAdvanced usage (Dumping methods, execution methods, ...)CrackMapExec ModuleLink to CrackMapExec module included...