PoshC2 : Python Server for PoshC2

0

PoshC2 is a proxy aware C2 framework that utilises Powershell and/or equivalent (System.Management.Automation.dll) to aid penetration testers with red teaming, post-exploitation and lateral movement. Powershell was chosen as the base implant language as it provides all of the functionality and rich features without needing to introduce multiple third party libraries to the framework. In addition to the Powershell implant, PoshC2 also has...

Hacktronian : All in One Hacking Tool for Linux & Android

0

Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs. Menu Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation Install The Hacking Tool Google Dorks Information Gathering: Nmap Setoolkit Port Scanning Host To IP wordpress user CMS scanner XSStrike Dork - Google Dorks Passive Vulnerability Auditor Scan A server's Users Crips Password Attacks: Cupp Ncrack Also Read - PEpper : An Open Source Script To Perform...

Pyshark : Python Wrapper For TShark, Allowing Python Packet Parsing Using Wireshark Dissectors

0

Python wrapper for tshark, allowing python packet parsing using wireshark dissectors. Python2 deprecation - This package no longer supports Python2. If you wish to still use it in Python2, you can: Use version 0.3.8Install pyshark-legacy via pypiClone the pyshark-legacy , where bugfixes will be applied. Looking for contributors - for various reasons I have a hard time finding time to maintain...

Applepie : A Hypervisor For Fuzzing Built With WHVP & Bochs

0

Hello! Welcome to applepie! This is a tool designed for fuzzing, introspection, and finding bugs! This is a hypervisor using the Windows Hypervisor Platform API present in recent versions of Windows (specifically this was developed and tested on Windows 10 17763). Bochs is used for providing deep introspection and device emulation. The Windows Hypervisor Platform API (WHVP) is an API...

PEpper : An Open Source Script To Perform Malware Static Analysis On Portable Executable

0

PEpper is an open source tool to perform malware static analysis on Portable Executable. Following are some of the features supported by the tool; Suspicious entropy ratioSuspicious name ratioSuspicious code sizeSuspicious debugging time-stampNumber of exportNumber of anti-debugging callsNumber of virtual-machine detection callsNumber of suspicious API callsNumber of suspicious stringsNumber of YARA rules matchesNumber of URL foundNumber of IP foundCookie on the stack (GS) supportControl Flow Guard (CFG) supportData Execution Prevention (DEP) supportAddress Space Layout Randomization (ASLR) supportStructured Exception Handling (SEH) supportThread Local Storage (TLS) supportPresence of manifestPresence of versionPresence...

GoDoH : A DNS-Over-HTTPS C2

0

GoDoH is a proof of concept Command and Control framework, written in Golang, that uses DNS-over-HTTPS as a transport medium. Currently supported providers include Google, Cloudflare but also contains the ability to use traditional DNS. Installation All you would need are the godoh binaries themselves. Binaries are available for download from the releases page as part of tagged releases. To build godoh from source, follow the following steps: Ensure...

Truegaze : Static Analysis Tool For Android/iOS Applications Focusing On Security Issues Outside The Source Code

0

Truegaze is a static analysis tool for Android and iOS applications focusing on security issues outside the source code such as resource strings, third party libraries and configuration files. Requirements Python 3 is required and you can find all required modules in the requirements.txt file. Only tested on Python 3.7 but should work on other 3.x releases. No plans to 2.x support...

PwnedOrNot : OSINT Tool To Find Passwords For Compromised Email Addresses

0

pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps. Haveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script: Name of BreachDomain NameDate of BreachFabrication statusVerification StatusRetirement statusSpam Status And with all this information it can easily find passwords for compromised emails if the dump is accessible and it contains the...

Eyeballer : Convolutional Neural Network For Analyzing Pentest

0

Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge set of web-based hosts. Go ahead and use your favorite screenshotting tool like normal (EyeWitness or GoWitness) and then run them through Eyeballer to tell you what's likely to contain vulnerabilities, and what isn't. Setup Eyeballer uses TF.keras on Tensorflow 2.0. This...

A List Of Services & How To Claim Subdomain With Dangling DNS Records

0

Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed or deleted. This allows an attacker to set up a page on the service that was being used and point their page to that subdomain. For example, if subdomain.example.com was pointing to a GitHub page and the...