RSDL : Subdomain Scan With Ping Method
RSDL is a tool for subdomain Scan With Ping Method. FlagsValueDescription--hostnameexample.comDomain for scan.--outputRecords the output with the domain name.--list/tmp/lists/example.txtLister for subdomains. Also Read - GCPBucketBrute : A Script To Enumerate Google Storage Buckets Installation go get github.com/tismayil/rsdlclone repo and build ( go build rsdl.go ) Used Repos GO Spinner : github.com/briandowns/spinner - GO Ping : github.com/sparrc/go-ping - Download
Cacti : Complete Network Graphing Solution
Cacti is a complete network graphing solution designed to harness the power of RRDtool's data storage and graphing functionality providing the following features: Remote and local data collectorsDevice discoveryAutomation of device and graph creationGraph and device templatingCustom data collection methodsUser, group and domain access controls All of this is wrapped in an intuitive, easy to use interface that makes sense for...
HAL – The Hardware Analyzer
HAL is a comprehensive reverse engineering and manipulation framework for gate-level netlists focusing on efficiency, extend-ability and portability. It comes with a fully-fledged plugin system, allowing to introduce arbitrary functionalities to the core. Features Natural directed graph representation of netlist elements and their connectionsSupport for custom gate librariesHigh performance thanks to optimized C++ coreModularity: write your own...
GCPBucketBrute : A Script To Enumerate Google Storage Buckets
GCPBucketBrute is a script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated. This script (optionally) accepts GCP user/service account credentials and a keyword.Then, a list of permutations will be generated from that keyword which will then be used to scan for the existence of Google Storage buckets...
Threat_Note : DPS’ Lightweight Investigation Notebook
threat_note is a web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related to their research. As of right now this includes the ability to add IP Addresses, Domains and Threat Actors, with more types being added in the future. This app fills the gap between various...
ADAudit : Powershell Script To Do Domain Auditing Automation
ADAudit is a PowerShell Script to perform a quick AD audit. If you have any decent powershell one liners that could be used in the script please let me know. I'm trying to keep this script as a single file with no requirements on external tools (other than ntdsutil and cmd.exe) Run directly on a DC...
SGX-Step : A Practical Attack Framework For Precise Enclave Execution Control
SGX-Step is an open-source framework to facilitate side-channel attack research on Intel SGX platforms. SGX-Step consists of an adversarial Linux kernel driver and user space library that allow to configure untrusted page table entries and/or x86 APIC timer interrupts completely from user space. Our research results have demonstrated several new and improved enclaved execution attacks that gather side-channel observations...
These Three Tips Can Help you to Protect from Phishing Attacks
The most dangerous part of a phishing attack is the belief that it can’t happen to you. Getting scammed on the Internet always feels like something that will happen to someone else. Surely you’re not the type that would fall for the old trick about the son of the deposed king of Nigeria wanting to wire you $7 million...
DFIRTriage : Digital Forensic Acquisition Tool For Windows Based Incident Response
DFIRTriage is a Digital forensic acquisition tool for Windows-based incident response. This tool intended to provide Incident Responders with rapid host data. Written in Python, the code has been compiled to eliminate the dependency of python on the target host. The tool will run a variety of commands automatically upon execution. The acquired data will reside in the...
VScan : Vulnerability Scanner Tool Using nmap & nse Scripts
VScan is a vulnerability scanner tool is using nmap and nse scripts to find vulnerabilities. This tool puts an additional value into vulnerability scanning with nmap. It uses NSE scripts which can add flexibility in terms of vulnerability detection and exploitation. Below there are some of the features that NSE scripts provide Network discoveryMore sophisticated version detectionVulnerability detectionBackdoor detectionVulnerability...