Gadgetinspector : Code Analyzer For Finding Deserialization Gadget

0

Gadgetinspector is a byte code analyzer for finding deserialization gadget chains in Java applications. This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities. By automatically discovering possible gadgets chains in an application's classpath penetration testers can quickly construct exploits and application security engineers can assess the impact of a...

Owasp D4n155 : Intelligent & Dynamic Wordlist Using Osint

0

OWASP D4N155 is an intelligent and dynamic wordlist using OSINT. It's an information security audit tool that creates intelligent wordlists based on the content of the target page. Install Need to: Python3.6, Bash (GNU Bourne-Again SHell)Optional: Git, Groff Source git clone https://github.com/owasp/D4N155.git cd D4N155 pip3 install -r requirements.txt bash main Or without git wget -qO- https://github.com/owasp/D4N155/archive/master.zip | bsdtar -xf- cd D4N155-master pip3 install -r requirements.txt bash main Also Read...

SUDO_KILLER : A Tool To Identify & Exploit Sudo Rules

0

SUDO_KILLER is a tool that can be used for privilege escalation on linux environment by abusing SUDO in several ways. The tool helps to identify misconfiguration within sudo rules, vulnerability within the version of sudo being used (CVEs and vulns) and the use of dangerous binary, all of these could be abused to elevate privilege...

Adama : Searches For Threat Hunting & Security Analytics

0

Adama is a tool for searches for threat hunting and security analytics. A collection of known log and / or event data searches for threat hunting and detection. They enumerate sets of searches used across many different data pipelines. Implementation details are for ELK. Also Read - DecryptTeamViewer : Enumerate & Decrypt TeamViewer Credentials From...

TaskManager Button Disabler : Simple Way To Disable/Rename Buttons From A Task Manager

0

TaskManager Button Disabler is a simple way to disable/rename buttons from a task manager. Installation $git clone https://github.com/Mrakovic-ORG/TaskManager-Button-Disabler $cd TaskManager-Button-DisablerTaskManager Button Disabler $dotnet build Features Rename kill proccess buttonDisable kill proccess buttonWorks in TaskMgr, ProcessHacker etc... Also Read - Syborg : Recursive DNS Subdomain Enumerator With Dead-End Avoidance System In Action Download

Metabigor : Intelligence Tool But Without API Key

0

Metabigor is Intelligence tool, its goal is to do OSINT tasks and more but without any API key. Installation go get -u github.com/j3ssie/metabigor Main Features Discover IP Address of the target.Wrapper for running masscan and nmap on IP target.Do searching from command line on some search engine. Demo Also Read - Gospider : Fast Web Spider Written In Go Example Commands #discovery IP of a...

Rabid : Tool To Decode All Kind Of BigIP Cookies

0

Rabid is a CLI tool and library allowing to simply decode all kind of BigIP cookies. Features Support all 4 cookie formatsCLI tool & libraryHackable Quick install $ gem install rabid Default usage: CLI $ rabid 'BIGipServer=1677787402.36895.0000'Pool name: Cookie type: IPv4 pool membersRaw cookie: BIGipServer=1677787402.36895.0000Decoded cookie: 10.1.1.100:8080 Default usage: library require 'bigipcookie'#IPv4 pool members, with pool namebip = BigIPCookie::Decode.new('BIGipServer=1677787402.36895.0000')#Automatically decodebip.auto_decode#Print resultputs "Cookie: #{bip.decoded_cookie}" Also Read - NekoBot...

Top 9 Best Gaming Mouse for Small Hands in 2020

0

Not everyone is blessed with big fat palms. Some gamers do have petite figure and matching petite hands. Now when it comes to gaming venture, the Razer gaming mouse is known to have multiple buttons not just on the top but on sides too. So, if you have a small hand and operating an average size mouse, chances are...

How to Hack a Mobile Phone With Just The Number

0

Hacking is one of those practices that almost attracts everybody, especially young teenagers. In this modern era of technology, hacking is getting common day by day, although hacking is not a walk in the park for everyone. If we talk about hacking a mobile phone then there are many types of hacking techniques that occur in this particular hacking...

0l4bs : Cross-Site Scripting Labs For Web Application Security Enthusiasts

0

Ol4bs is a cross-site scripting labs for web application security enthusiasts. List of Chall ~ Chall 1 | URL ~ Chall 2 | Form ~ Chall 3 | User-Agent ~ Chall 4 | Referrer ~ Chall 5 | Cookie ~ Chall 6 | LocalStorage ~ Chall 7 | Login Page ~ Chall 8 | File Upload ~ Chall 9 | Base64 Encoding ~ Chall 10 | Removes Alert ~ Chall...