Slither : Static Analyzer for Solidity

0

Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors, prints visual information about contract details, and provides an API to easily write custom analyses. It enables developers to find vulnerabilities, enhance their code comprehension, and quickly prototype custom analyses. Features Detects vulnerable Solidity code with low false positivesIdentifies where the error...

AutoMacTC : Automated Mac Forensic Triage Collector

0

AutoMacTC is a modular forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and present them in formats viable for analysis. The output may provide valuable insights for incident response in a macOS environment. Automactc can be run against a live system or dead disk (as a mounted volume.) Requirements Python 2.7 (Mac systems ship...

Password Lense: Reveal Character Types In A Password

0

Certain characters in passwords ('O' and '0', 'I' and 'l', etc.) can be hard to identify when you need to type them in (and copy-paste is unavailable). Password Lense is a small web application that provides a quick and secure way to get a more informative view of your password. Features Color codes each character in your password with a corresponding legend/keyHover-based tooltip...

Snare : Super Next Generation Advanced Reactive HonEypot

0

Snare is a super next generation advanced reactive honeypot.It is a web application honeypot sensor attracting all sort of maliciousness from the Internet. Basic Concepts Surface first. Focus on the attack surface generation.Sensors and masters. Lightweight collectors and central decision maker (tanner). Getting Started You need Python3. We tested primarily with >=3.5This was tested with a recent Ubuntu based Linux. Also...

Osmedeus – Fully Automated Offensive Security Framework For Reconnaissance And Vulnerability Scanning

0

Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. Installation git clone https://github.com/j3ssie/Osmedeuscd Osmedeus./install.sh This install only focus on Kali linux How To Use? If you have no idea what are you doing just type the command below or check out the Advanced...

Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

0

UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting known bypasses. UAC-A-mola has modules to carry out the protection and mitigation of UAC bypasses. Installation To install uac-a-mola you have to perform the following actions: Download and install python 2.7.x for Windows taking into account your particular infrastructure, you can find the binaries here: https://www.python.org/downloads/Add...

FOCA : Tool To Find Metadata & Hidden Information In The Documents

0

FOCA is a tool used mainly to find metadata and hidden information in the documents it scans. These documents may be on web pages, and can be downloaded and analysed with FOCA. It is capable of analysing a wide variety of documents, with the most common being Microsoft Office, Open Office, or PDF files, although it also analyses Adobe InDesign or SVG files, for...

IoT Implant : Toolkit For Implant Attack Of IoT Devices

0

IoT Implant Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port debugging, software analysis and stable spy clients. With an easy-to-use and extensible shell-like environment, IoT-Implant-Toolkit is a one-stop-shop toolkit simplifies complex procedure of IoT malware implantation. In our research, we...

Discover : Custom Bash Scripts Used To Automate Various Penetration Testing Tasks

0

Discover custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit. For use with Kali Linux and the Penetration Testers Framework (PTF). Download, setup, and usage git clone https://github.com/leebaird/discover /opt/discover/All scripts must be ran from this location.cd /opt/discover/./update.sh RECONDomainPersonParse salesforceSCANNINGGenerate target listCIDRListIP, range, or domainRerun Nmap scripts and MSF auxWEBInsecure direct object...

RBuster : Yet Another Dirbuster

0

Rbuster is yet another dirbuster with the latest version of v0.2.1. Following are the common command line options; -a <user agent string> - specify a user agent string to send in the request-c <http cookies> - use this to specify any cookies that you might need (simulating auth). header.-f - force processing of a domain with wildcard results.-l - show the length of...