PrivExchange : Exchange Your Privileges For Domain Admin Privs By Abusing Exchange

0

PrivExchange is a tool to Exchange your privileges for Domain Admin privs by abusing Exchange. These tools require impacket. You can install it from pip with pip install impacket, but it is recommended to use the latest version from GitHub. This tool simply logs in on Exchange Web Services to subscribe to push notifications. This will make Exchange connect back to...

PostShell – Post Exploitation Bind/Backconnect Shell

0

PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be compiled on any Unix like system. ScreenShots Banner and interaction with shell after a connection is started. Also Read - Metame : Metamorphic Code Engine For Arbitrary...

TinkererShell : A Simple Python Reverse Shell

0

TinkererShell is a simple python reverse shell written just for fun. Simple reverse shell written in python 3.7 just for fun. Actually it supports Windows and Linux OS and integrates some basic features like keylogging and AES encrypted communications. Supported operating systems: Windows Linux Functions and characteristics: Reverse connection. AES encrypted communications. Multithreaded. Support multiple bots connected at the same time. Keylogger. Possibility to...

DetExploit : OSS Vulnerability Scanner for Windows Platform

0

DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them to user. As we know, most of cyberattacks uses vulnerability that is released out year before. I thought this is huge problem, and this kind of technology should be more powerful than technology that will detect unknown malwares or exploits. Demo Demo Video Clip (v0.5,...

Stegify : Go Tool For LSB Steganography,Capable Of Hiding Any File Within An Image

0

Stegify is a Go tool for LSB steganography, capable of hiding any file within an image. It is a simple command line tool capable of fully transparent hiding any file within an image. This technique is known as LSB (Least Significant Bit) Install $ go get -u github.com/DimitarPetrov/stegify Usage As a command line tool $ stegify -op encode -carrier -data -result $...

Cloud-Based Anti-Phishing Tools Can Help Prevent Phishing Attempts By Cybercriminals

0

Phishing has, is, and will always remain a threat. The most advanced cloud-based anti-phishing tools are there to help you not only to combat such threats to your enterprise, but also to educate your employees to make them aware and vigilant against such vulnerabilities. People have been working on computers and the internet long enough to know what phishing is....

Shodan Eye : Tool Collects All The Information About All Devices Directly Connected To The Internet

0

Shodan Eye tool collects all information about all devices that are directly connected to the internet with the specified keywords that you enter. This way you get a complete overview. The types of devices that are indexed can vary enormously: from small desktops, refrigerators to nuclear power plants and everything in between. You can find everything using "your own" specified...

Pyrdp : MITM & Library For Python 3 With The Ability To Watch Connections Live Or After The Fact

0

PyRDP is a Python 3 Remote Desktop Protocol (RDP) Man-in-the-Middle (MITM) and library. It features a few tools: RDP Man-in-the-MiddleLogs credentials used when connectingSteals data copied to the clipboardSaves a copy of the files transferred over the networkCrawls shared drives in the background and saves them locallySaves replays of connections so you can look at them laterRuns console commands or...

Grapl : Graph platform for Detection and Response

0

Grapl is a Graph Platform for Detection and Response. In short, Grapl will take raw logs, convert them into graphs, and merge those graphs into a Master Graph. It will then orchestrate the execution of your attack signatures and provide tools for performing your investigations. Grapl supports nodes for: Processes (Beta)Files (Beta)Networking (Alpha) and currently parses Sysmon logs or a generic JSON...

Metame : Metamorphic Code Engine For Arbitrary Executables

0

Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent version of its own code under some interpretation. This is used by computer viruses to avoid the pattern recognition of anti-virus software. It implementation works this way: Open a given binary and analyze the codeRandomly replace instructions with equivalences...