MalConfScan : Volatility Plugin For Extracts Configuration Data Of Known Malware

0

MalConfScan is a Volatility plugin extracts configuration data of known malware. Volatility is an open-source memory forensics framework for incident response and malware analysis. This tool searches for malware in memory images and dumps configuration data. In addition, this tool has a function to list strings to which malicious code refers. Supported Malware Families It can dump the following malware configuration data, decoded...

ISPY : Eternalblue/Bluekeep Scanner & Exploit

0

ISPY V1.0 is a eternalblue(ms17-010)/bluekeep(CVE-2019-0708) scanner and exploit ( Metasploit automation ) . How to install? git clone https://github.com/Cyb0r9/ispy.git cd ispy chmod +x setup.sh ./setup.sh Also Read - B2R2 : A Collection of Algorithms, Functions And Tools For Binary Analysis Screenshots Tested On Parrot OSKali linux Demo https://www.youtube.com/watch?v=WCa5N5_zKgw&list=UUv9HdZbTOo0iBG5X2qaqmqg Disclaimer Usage of ispy for attacking targets without prior mutual consent is illegal. ispy is for security testing purposes...

Zeek : A Powerful Network Analysis Framework

0

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. Key Features In-depth Analysis it ships with analyzers for many protocols, enabling high-level semantic analysis at the application layer.Adaptable and Flexible it's domain-specific scripting language enables site-specific monitoring policies and means that it is not restricted to any particular detection approach.Efficient it targets high-performance networks...

Maryam : Open-source Intelligence(OSINT) Framework

0

Maryam is a full-featured open-source intelligence(OSINT) framework written in Python. Complete with independent modules, built in functions, interactive help, and command completion, provides a command-line environment for used forensic and open-source intelligence(OSINT). Maryam is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module is a subclass of the "module"...

Box.JS : A Tool For Studying JavaScript Malware

0

box.js is a utility to analyze malicious JavaScript. Installation Simply install box-js from npm: npm install box-js --global Usage Looking to use box-js with Cuckoo? Use cuckoo-package.py as an analysis package. Let's say you have a sample called sample.js: to analyze it, simply run box-js sample.js Chances are you will also want to download any payloads; use the flag --download to enable downloading. Otherwise, the engine will simulate a 404...

FATT -Fingerprint All The Things

0

FATT (fingerprintAllTheThings) is a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic. A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files (pcap) or live network traffic. The main use-case is for monitoring honeypots, but you can also use it for other use cases such as network forensic analysis....

Penta : Open Source All-In-One CLI Tool To Automate Pentesting

0

Penta is is Pentest automation tool using Python3. It provides advanced features such as metasploit and nexpose to extract vuln info found on specific servers. Installation Install requirements penta requires the following packages. Python3.7pipenv Resolve python package dependency. $ pipenv install If you dislike pipenv... $ pip install -r requirements.txt Also Read - ThreadBoat : Program Uses Thread Execution Hijacking to Inject Native Shellcode...

Tarnish : A Chrome Extension Static Analysis Tool

0

Tarnish is a static-analysis tool to aid researchers in security reviews of Chrome extensions. It automates much of the regular grunt work and helps you quickly identify potential security vulnerabilities. This tool accompanies the research blog post which can be found here. If you don't want to go through the trouble of setting this up you can just use...

B2R2 : A Collection of Algorithms, Functions And Tools For Binary Analysis

0

B2R2 is a collection of useful algorithms, functions, and tools for binary analysis written purely in F# (in .NET lingo, it is purely managed code). It has been named after R2-D2, a famous fictional robot appeared in the Star Wars. In fact, B2R2's original name was B2-R2, but we decided to use the name B2R2 instead, because .NET does not allow dash (-)...

Userrecon-py : Username Recognition On Various Websites

0

Userrecon-py is used for Username recognition on various websites. is used for Username recognition on various websites. Installation With pip3 # Linuxsudo -H pip3 install git+https://github.com/decoxviii/userrecon-py.git --upgradeuserrecon-py --help Build from source # Linuxgit clone https://github.com/decoxviii/userrecon-py.git ; cd userrecon-py sudo -H pip3 install -r requirements.txt python3 setup.py build sudo python3 setup.py install Also Read - Lockdoor Framework : A Penetration Testing Framework with Cyber Security...