CWFF : Custom Wordlists For Fuzzing

0

CWFF is a tool that creates a special High quality fuzzing/content discovery wordlist for you at the highest speed possible using concurrency and it's heavily inspired by @tomnomnom's Who, What, Where, When, Wordlist #NahamCon2020. Usage CWFF domainPositional Arguments:domain Target website(ofc)Optional Arguments:-h, --help Show this help message and exit--threads The number of...

UEFI_RETool : A Tool For UEFI Firmware Reverse Engineering

0

UEFI_RETool is a tool for UEFI firmware reverse engineering. UEFI firmware analysis with uefi_retool.py script Usage Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directoryEdit config.json filePE_DIR is a directory that contains all executable images from the UEFI firmwareDUMP_DIR is a directory that contains all components from the firmware filesystemLOGS_DIR is a directory for logsIDA_PATH and IDA64_PATH are paths to...

Netenum : Network Reconnaisance Tool That Sniffs For Active Hosts

0

Netenum passively monitors the ARP traffic on the network. It extracts basic data about each active host, such as IP address, MAC address and manufacturer. The main objective of this tool is to find active machines without generating too much noise. Features Provides basic information about the network, such as ESSID and current signal strength.Found hosts can be written to a...

DLInjector-GUI : Faster DLL Injector for Processes

0

DLInjector for Graphical User Interface. Faster DLL Injector for processes. It targets the process name to identify the target. The process does not need to be open to define the target. DLInjector waits until the process executed. USAGE Its usage a very simple. Firstly, enter the target process name with exe (chrome.exe, explorer.exe). And enter the to be injected DLL path (C:malwDll.dll). Example Injection...

Cnitch : Container Snitch Checks Running Processes Under The Docker Engine

0

Cnitch (snitch or container snitch) is a simple framework and command line tool for monitoring Docker containers to identify any processes which are running as root. Why is this a bad thing? If you have not already been to can I haz non-privileged containers? by mhausenblas then I recommend you head over there now to get all the info. When I...

Mistica : Swiss Army Knife For Arbitrary Communication Over Application Protocols

0

Mistica is a tool that allows to embed data into application layer protocol fields, with the goal of establishing a bi-directional channel for arbitrary communications. Currently, encapsulation into HTTP, DNS and ICMP protocols has been implemented, but more protocols are expected to be introduced in the near future. It has a modular design, built around a custom transport protocol, called...

DeimosC2 : A Golang Command & Control Framework For Post-Exploitation

0

DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that have been compromised. DeimosC2 server and agents works on, and has been tested on, Windows, Darwin, and Linux. It is entirely written in Golang with a front end written in Vue.js. Listener Features Each listener has it's own RSA Pub and...

EternalBlueC : Tool For EternalBlue Vulnerability Detector, DoublePulsar Detector & DoublePulsar Shellcode & DLL Uploader

0

EternalBlueC suite remade in C which includes: MS17-010 Exploit, EternalBlue/MS17-010 vulnerability detector, DoublePulsar detector and DoublePulsar UploadDLL & Shellcode ms17_vuln_status.cpp - This program sends 4 SMB packets. 1 negociation packet and 3 requests. This program reads the NT_STATUS response from a TransNamedPipeRequest ( PeekNamedPipe request ) and determines if NT_STATUS = 0xC0000205 ( STATUS_INSUFF_SERVER_RESOURCES ). If this is the...

Kubei : A Flexible Kubernetes Runtime Scanner

0

Kubei is a vulnerabilities scanning tool that allows users to get an accurate and immediate risk assessment of their kubernetes clusters. Kubei scans all images that are being used in a Kubernetes cluster, including images of application pods and system pods. It doesn’t scan the entire image registries and doesn’t require preliminary integration with CI/CD pipelines. It is a configurable...

7 Best Apps to Hack Girlfriend’s Phone to View Text Messages

0

Ever got a gut feeling that your girl is seeing someone else behind your back or cheating on you? That can be very disheartening. But! If you want to make sure of this “gut feeling”- you will need some help. And we are not talking about any overpaid detective or secretive stalking; we are talking about becoming a spy.  Yes,...