DFIRTriage : Digital Forensic Acquisition Tool For Windows Based Incident Response

0

DFIRTriage is a Digital forensic acquisition tool for Windows-based incident response. This tool intended to provide Incident Responders with rapid host data. Written in Python, the code has been compiled to eliminate the dependency of python on the target host.  The tool will run a variety of commands automatically upon execution. The acquired data will reside in the...

VScan : Vulnerability Scanner Tool Using nmap & nse Scripts

0

VScan is a vulnerability scanner tool is using nmap and nse scripts to find vulnerabilities. This tool puts an additional value into vulnerability scanning with nmap. It uses NSE scripts which can add flexibility in terms of vulnerability detection and exploitation. Below there are some of the features that NSE scripts provide Network discoveryMore sophisticated version detectionVulnerability detectionBackdoor detectionVulnerability...

Sojobo : A Binary Analysis Framework

0

Sojobo is an emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It is totally developed in .NET so you don't need to install or compile any other external libraries (the project is self contained). With Sojobo you can: Emulate a (32 bit) PE binaryInspect the memory of the emulated...

Donut : Generates x86, x64, or AMD64+x86 Position-Independent Shellcode

0

Donut generates x86 or x64 shellcode from VBScript, JScript, EXE, DLL (including .NET Assemblies) files. This shellcode can be injected into an arbitrary Windows processes for in-memory execution. Given a supported file type, parameters and an entry point where applicable (such as Program.Main), it produces position-independent shellcode that loads and runs entirely from memory....

Github Dorks : Collection of Github Dorks & Helper Tool

0

Github search is quite powerful and useful feature and can be used to search sensitive data on the repositories. Collection of github dorks that can reveal sensitive personal and/or organizational information such as private keys, credentials, authentication tokens, etc. This list is supposed to be useful for assessing security and performing pen-testing of systems....

EyeWitness : Designed To Take Screenshots Of Websites

0

EyeWitness is designed to take screenshots of websites provide some server header info, and identify default credentials if known. It is designed to run on Kali Linux. It will auto detect the file you give it with the -f flag as either being a text file with URLs on each new line, nmap XML output, or nessus...

Sparrow WiFi : Next-Gen GUI-based WiFi & Bluetooth Analyzer for Linux

0

Sparrow WiFi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz WiFi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for tools like inSSIDer and linssid that runs specifically on Linux. In its most comprehensive use cases, it integrates...

XRay : Tool For Recon, Mapping & OSINT Gathering From Public Networks

0

XRay is a tool for network OSINT gathering, its goal is to make some of the initial tasks of information gathering and network mapping automatic. How Does it Work? XRay is a very simple tool, it works this way: It'll bruteforce subdomains using a wordlist and DNS requests.For every subdomain/ip found, it'll use Shodan to gather open ports and...

Trivy : Simple & Comprehensive Vulnerability Scanner

0

Trivy is a Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI. A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System. It detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn etc.). It is easy to use. Just...

Mallory : HTTP/HTTPS Proxy Over SSH

0

Mallory is a HTTP/HTTPS proxy over SSH tool. Installation Local machine: go get github.com/justmao945/mallory/cmd/malloryRemote server: need our old friend sshd Configueration Config File Default path is $HOME/.config/mallory.json, can be set when start program mallory -config path/to/config.json Content: id_rsa is the path to our private key file, can be generated by ssh-keygenlocal_smart is the local address to serve HTTP proxy with smart detection of destination hostlocal_normal is similar to local_smart but send all traffic...