AntiCheat : Framework To Test Any Anti-Cheat
AntiCheat is a framework to test any Anti-Cheat on the market. This can be used as Template or Code Base to test any Anti-Cheat and learn along the way. The entry level to reverse AntiCheats and Cheats is quite high, therefore, I'm releasing all the code I developed during my research. The main idea is to help people and...
Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals
Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup their environment while staying within their scope. Features * Configure Firewall * Configure Hostname * Configure Interface(s) Also Read - LOLBITS : C# Reverse Shell Using BITS As Communication Protocol Supported Operating Systems * Redhat/CentOS * Windows configuration can be generated but...
Gowitness : A Golang Web Screenshot Utility Using Chrome Headless
Gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using the command line. Both Linux and macOS is supported, with Windows support 'partially working'. Inspiration for gowitness comes from Eyewitness. If you are looking for something with lots of extra features, be sure to check it out along with these...
Lsassy : Extract Credentials From Lsass Remotel
Lsassy is a tool used to extract credentials from lsass remotely. This library uses impacket project to remotely read necessary bytes in lsass dump and pypykatz to extract credentials. ChaptersDescriptionRequirementsRequirements to install lsassy from sourceInstallationInstallation commands from pip or from sourceBasic UsageCommand line template for standalone versionAdvanced UsageAdvanced usage (Dumping methods, execution methods, ...)CrackMapExec ModuleLink to CrackMapExec module included...
5 Tips to Protect Yourself from Cyberattacks at The University
Students often don’t see the importance of securing themselves in the cyber world because they do not perceive themselves as targets of hackers. The truth is, everybody is at risk and students can get their credit card information and other personal details used for fraudulent purposes. That can completely change the lives of students and they may suffer from a...
Top 3 Best Ways to Track Someone by Cell Phone Number
There are many people who know quite well how to track someone by cell phone number, but there are some others who don’t have any slightest idea how it can be done. For the sake of your ease we are writing this article, so you would be able to choose the best way when it comes to tracking someone’s...
LOLBITS : C# Reverse Shell Using BITS As Communication Protocol
LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and Control backend. The Command and Control backend is hidden behind an apparently harmless flask web application and it's only accesible when the HTTP requests received by the app contain a valid authentication header. It is composed...
Shell Backdoor List : PHP / ASP Shell Backdoor List
Shell Backdoor is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, delete, or download any files on the site, or upload their own. How to upload? Hackers usually take advantage...
Hakrawler : Discovery Of Endpoints & Assets Within A Web Application
Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It can be used to discover: FormsEndpointsSubdomainsRelated domainsJavaScript files The goal is to create the tool in a way that it can be easily chained with other tools such as subdomain enumeration tools and vulnerability scanners in order...
GTFO : Search For Unix Binaries To Bypass System Security Restrictions
GTFO is a tool used to search for Unix binaries that can be exploited to bypass system security restrictions. This is a standalone script written in Python 3 for GTFOBins. You can search for Unix binaries that can be exploited to bypass system security restrictions. These binaries can be abused to get the f**k break out of restricted shells, escalate...