Mouse : iOS & macOS Post-Exploitation Framework

0

Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse Payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more. Getting...

MultiJuicer : Run Capture Flags & Security Trainings With OWASP Juice Shop

0

MultiJuicer is a tool used to run capture the flags and security trainings with OWASP juice shop . Running CTFs and Security Trainings with OWASP Juice Shop is usually quite tricky, Juice Shop just isn't intended to be used by multiple users at a time. Instructing everybody how to start Juice Shop on their own machine works ok, but...

Progress Burp : Burp Suite Extension To Track Vulnerability Assessment Progress

0

Progress Burp Suite extension to track vulnerability assessment progress. Features Capture items (unique requests) from the Burp Suite tools (Proxy, Repeater, Target). Request unique key is defined as follows: target (host, port, protocol), path and method. Items have following editable properties: commentstatus (Blocked, Done, Ignored, In progress, New, Postponed)tags Items can be filtered by: statustags (there are...

SSF : Secure Socket Funneling Network Tool

0

Secure Socket Funneling (SSF) is a network tool and toolkit. It provides simple and efficient ways to forward data from multiple sockets (TCP or UDP) through a single secure TLS tunnel to a remote computer. It is cross platform (Windows, Linux, OSX) and comes as standalone executables. Features Local and remote TCP port forwardingLocal and remote UDP port forwardingLocal and...

ABD : Course Materials For Advanced Binary Deobfuscation

0

ABD is the course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories Advanced Binary Deobfuscation This repository contains the course materials of Advanced Binary Deobfuscation at the Global Cybersecurity Camp (GCC) Tokyo in 2020. Course Abstract Reverse engineering is not easy, especially if a binary code is obfuscated. Once obfuscation performed, the binary would not be analyzed accurately with naive techniques alone. In...

Learn How to Run Linux on Mac Computers With This Guide

0

Some people perceive Linux as an underdog in an OS realm dominated by Windows and Apple. Yet, there’s no shortage of ways access to Linux can come in useful. Coders and casual users alike swear by it and for good reasons too. It’s a highly versatile, configurable, and powerful platform. Yes, from a hardware perspective, Mac fires on all cylinders. It’s such a nice blend of...

WiFi Hacker : Shell Script For Attacking Wireless Connections Using Built-In Kali Tools

0

Wifi hacker is a shell script for attacking wireless connections using built-in kali tools. Supports All Securities (WEP, WPS, WPA, WPA2). Also Read - Ohmybackup : Scan Victim Backup Directories & Backup Files Download

Get Team Pass : Get Teamviewer’s ID & Password From A Remote Computer In The LAN

0

Get Team Pass is a tool with which you can get teamviewer's ID and password from a remote computer in the LAN.Most useful for postexploitation or sysadmins and is tested on windows 7 and windows 10 x86 and x64. Prerequisites You must have valid credentials on the remote computer Port 445 must be accesible on target machine Execution examples: hook.exe must be in...

Dnssearch : A Subdomain Enumeration Tool

0

Dnssearch is a subdomain enumeration tool. It takes an input domain ( -domain parameter ) and a wordlist ( -wordlist parameter ), it will then perform concurrent DNS requests using the lines of the wordlist as sub domains eventually bruteforcing every sub domain available on the top level domain. It supports a custom file extension ( -ext, default to php ) and other optional arguments: Usage of ./dnssearch:...

Liffy : Local File Inclusion Exploitation Tool

0

Liffy is a local file inclusion exploitation tool. A little python tool to perform Local file inclusion. Liffy-v2.0 is the improved version of it which was originally created by rotlogix/liffy. The latter is no longer available and the former hasn't seen any development for a long time. Main feature data:// for code executionexpect:// for code executioninput:// for code executionfilter:// for arbitrary file reads/proc/self/environ for code...