Pypykatz : Mimikatz Implementation In Pure Python

0

Pypykatz is a mimikatz implementation in pure Python and can be runs on all OS's which support python>=3.6. Installing Install it via pip or by cloning it from github. The installer will create a pypykatz executable in the python's Script directory. You can run it from there, should be in your PATH. Via PIP pip3 install pypykatz Via Github Install Pre-Requirements pip3 install minidump minikerberos...

3 Reasons to Use a VPN in a Net Neutrality-Free World

0

In the early days of the internet, internet communication was impartial. Data relaying was not influenced by ISPs based on the content, platform, source & destination address and user. Netizens could freely surf through the web without manipulation or interference from the Internet Service Providers. In other words, the net was neutral to all individuals and businesses alike. The end...

Token Reverser : Word List Generator To Crack Security Tokens

0

Token Reverser is a word list generator to crack security tokens. Example Use Case You are testing reset password functionReset password token was sent to your email box (e.g. 582431d4c7b57cb4a3570041ffeb7e10)You suppose, it is a md5 hash of the data you provided during registration process You remember that on registration you entered the following data:First name: FooLast name: BarEmail: foo.bar@example.comBirth date: 1985-05-23Phone: 202-555-0185Address:...

ShuffleDNS : Wrapper Around Massdns Written In Go To Enumerate Valid Subdomains Using Active Bruteforce

0

ShuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support.  Features Simple and modular code base making it easy to contribute.Fast And Simple active subdomain scanning.Handles wildcard subdomains in a smart manner.Optimized for ease of useStdin and stdout support for integrating in...

AWSGen.py : AWS S3 Bucket Name Generator (beta v.)

0

AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names Also Read - Betwixt : Web Debugging Proxy Based On Chrome Devtools Network Panel Example: Download

Jeopardize : A Low Cost Threat Intelligence&Response Tool

0

Jeopardize is a low(zero) cost threat intelligence&response tool against phishing domains. Jeopardize tool is developed to provide basic threat intelligence&response capabilities against phishing domains at the minimum cost as possible. It detects registered phishing domain candidates (typosquatting, homograph etc.), analyzes them and assigns a risk score to them. After then, it sends valid-looking credentials to the login forms on those...

Tea : SSH-Client Worm

0

Tea is a ssh-client worm made with tas framework. How it works? This is a fakessh-client that manipulates the tty input/output to execute arbitrary commands and upload itself through the ssh connection. To work properly, the remote machine needs: Display the "last login" message when login. Dd and stty target user using bash as default shell. Capability to run the fakessh binary. Writable...

Microsoft WinUI : Windows UI Library Roadmap

0

WinUI is the native UI platform for Windows 10. This document outlines the prospective roadmap for new website through 2019 and into 2020. It is under active development by the Microsoft developer platform team and the roadmap will continue to evolve based on market changes and customer feedback, so please note that the plans outlined here aren't exhaustive or...

Zelos : A Comprehensive Binary Emulation Platform

0

Zelos is a comprehensive binary emulation platform. It (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of it is to quickly assess the dynamic behavior of binaries via command-line or python scripts. All syscalls are emulated to isolate the target binary. Linux x86_64 (32- and 64-bit), ARM and MIPS binaries are supported. Unicorn provides CPU emulation. Full documentation is available here....

Pickl3 : Windows Active User Credential Phishing Tool

0

Pickl3 is a Windows active user credential phishing tool.You can execute the Pickl3 and phish the target user credential. Operational Usage - 1 Nowadays, since the operating system of many end users is Windows 10, we cannot easily steal account information with Mimikatz-like projects like the old days. Using Pickl3, you can try to steal the account information of the active...