CrauEmu : uEmu Extension For Developing & Analyzing Payloads For Code-Reuse Attacks
crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks. Installation Put the file crauEmu.py in same location as uEmu.py.Use File / Script file⦠or ALT+F7 in IDA to load crauEmu.py Also Read - Eavesarp : Analyze ARP Requests To Identify Intercommunicating Hosts RopEditor Slides from ZeroNights 2019Download Download
HTBenum : A Linux Enumeration Script For Hack The Box
HTBenum is a Linux enumeration script for Hack The Box. This script is designed for use in situations where you do not have internet access on a Linux host and would like to run enumeration and exploit suggestion scripts, such as Hack The Box. I find myself running a similar set of scripts when I get an initial foothold...
Domained : Multi Tool Subdomain Enumeration
Domained is a domain name enumeration tool. The tools contained in it requires Kali Linux (preferred) or Debian 7+ and Recon-ng. It uses several subdomain enumeration tools and wordlists to create a unique list of subdomains that are passed to EyeWitness for reporting with categorized screenshots, server response headers and signature based default credential checking. (resources are saved to...
Lollipopz : Data Exfiltration Utility For Testing Detection Capabilities
Lollipopz is a data exfiltration utility for testing detection capabilities. Data exfiltration utility used for testing detection capabilities of security products. Obviously for legal purposes only. Exfiltration How-To? /etc/shadow -> HTTP GET requests Server # ./lollipopz-cli.py -m lollipopz.methods.http.param_cipher.GETServer -lp 80 -o output.log Client $ ./lollipopz-cli.py -m lollipopz.methods.http.param_cipher.GETClient -rh 127.0.0.1 -rp 80 -i ./samples/shadow.txt -r /etc/shadow -> HTTP POST requests Server # ./lollipopz-cli.py -m lollipopz.methods.http.param_cipher.POSTServer -lp 80...
Sherloq : An Open-Source Digital Image Forensic Toolset
Sherloq is a personal research project about implementing a fully integrated environment for digital image forensics. It is not meant as an automatic tool that decide if an image is forged or not (that tool probably will never exist...), but as a companion in putting at work various algorithms to discover potential image inconsistencies. While many commercial solutions have unaffordable...
Privacy Badger : A Browser Extension Automatically Learns To Block Invisible Trackers
Privacy Badger is a browser extension that automatically learns to block invisible trackers. Instead of keeping lists of what to block, Privacy Badger learns by watching which domains appear to be tracking you as you browse the Web. It sends the Do Not Track signal with your browsing. If trackers ignore your wishes, your Badger will learn to block them....
Audix : A PowerShell Tool To Quickly Configure Windows Event
Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring. Note: This tool will only change the local security policy. If applied to a host with a GPO setting, it is best to use the same settings in a Group Policy default profile so all systems get the same config. If the GPO profile...
Serverless-Prey : Serverless Functions For Establishing Reverse Shells
Serverless-Prey is a collection of serverless functions (FaaS), that, once launched to a cloud environment and invoked, establish a TCP reverse shell, enabling the user to introspect the underlying container: Panther: AWS Lambda written in Node.jsCougar: Azure Function written in C#Cheetah: Google Cloud Function written in Go This repository also contains research performed using these functions, including documentation on where secrets...
Lunar : A Lightweight Native DLL Mapping Library
Lunar is a lightweight native DLL mapping library that supports mapping directly from memory. Features Imports and delay imports are resolvedRelocations are performedImage sections are mapped with the correct page protectionException handlers are initialisedA security cookie is generated and initialisedDLL entry point and TLS callbacks are called Getting Started The example below demonstrates a simple implementation of the library var libraryMapper = new LibraryMapper(process,...
Ps-Tools : An Advanced Process Monitoring Toolkit For Offensive Operations
Ps-Tools is an advanced process monitoring toolkit for offensive operations. Having a good technical understanding of the systems we land on during an engagement is a key condition for deciding what is going to be the next step within an operation. Collecting and analyzing data of running processes from compromised systems gives us a wealth of information and helps...