IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor
IOCExtract is an advanced Indicator of Compromise (IOC) extractor. This library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora. It includes some encoded and "defanged" IOCs in the output, and optionally decodes/refangs them. The Problem It is common practice for malware analysts or endpoint software to "defang" IOCs such as URLs and IP addresses, in order...
VTHunting : A Tiny Script Used to Generate Report About Virus Total Hunting
VTHunting is a tiny tool based on the VT api version 3 to run daily, weekly or monthly report about malware hunting. The report can be send via email, Slack channel or Telegram. The tool can also be used in cli to get a report anytime. The default number of result is 10 but it can be increase or...
Facebash : Facebook Brute Forcer In Shellscript Using TOR
Facebash is a tool for facebook Brute Forcer in shellscript using TOR. Warning : Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h. Features Save/Resume sessionsAnonymous attack through TORDefault Password List (+39k) Also Read - H2Buster : A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2 Usage git clone https://github.com/thelinuxchoice/facebash cd instashell chmod +x facebash.sh service...
Metabigor : Command Line Search Engines Without Any API Key
Metabigor allows you do query from command line to awesome Search Engines (like Shodan, Censys, Fofa, etc) without any API key. But Why ? Don't use your API key so you don't have to worry about litmit of API quotation. Do query from command line without Premium account. Get more result without Premium account. But I...
AutoPwn : Automate Repetitive Tasks For Fuzzing
Completely re-writing this right now. Focus will be on interactive Linux apps that only take input from stdin for starters. Attempting to use Shellphish's Driller and Fuzzer functionality. AutoPwn in it's current state will do this in limited form. Simply run autoPwn ./binary then select the Start option. Installing Given all the dependency issues here, the easiest way to...
UserRecon-PY : Find Username In Social Networks
Userrecon-PY is a tool used to find usernames in social networks. Installation Install dependencies (Debian/Ubuntu): sudo apt install python3 python3-pip Install with pip3: sudo -H pip3 install git+https://github.com/decoxviii/userrecon-py.git userrecon-py --help Also Read - H2Buster : A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2 Building from Source Clone this repository, and: git clone https://github.com/decoxviii/userrecon-py.git ; cd userrecon-py sudo -H pip3 install -r requirements.txt python3 setup.py build sudo python3...
Amass : In-Depth DNS Enumeration and Network Mapping
The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names and reverse DNS sweeping. Additionally, it uses the IP addresses obtained during resolution to discover associated netblocks and ASNs. All the information is then used to build maps of the target networks. Information Gathering Techniques Used: DNS: Basic enumeration, Brute forcing (upon...
PCI Compliance and Network Segmentation
The first step to determining the scope of your Payment Card Industry Data Security Standard (PCI DSS) compliance is segmenting your data networks. Network segmentation helps to improve data security and reduces the chances of breaches resulting from compromised systems. What You Should Know About PCI DSS Network Segmentation To properly segment your data networks for PCI DSS-compliance purposes, it is crucial to understand the purpose...
WPBullet : A Static Code Analysis For WordPress & PHP
WPBullet is a static code analysis for WordPress Plugins/Themes (and PHP). Simply clone the repository, install requirements and run the script ; git clone https://github.com/webarx-security/wpbullet wpbulletcd wpbulletpip install -r requirements.txtpython wpbullet.py Available options: --path (required) System path or download URL Examples: --path="/path/to/plugin" --path="https://wordpress.org/plugins/example-plugin" --path="https://downloads.wordpress.org/plugin/example-plugin.1.5.zip"--enabled (optional) Check only for given modules, ex. --enabled="SQLInjection,CrossSiteScripting" --disabled (optional) Don't check for given...
Kubolt : Utility For Scanning Public Kubernetes Clusters
Kubolt is simple utility for scanning public unauthinticated kubernetes clusters and run commands inside containers. Sometimes, the kubelet port 10250 is open to unauthorized access and makes it possible to run commands inside the containers using getrun function from kubelet: // getRun handles requests to run a command inside a container. func (s *Server) getRun(request *restful.Request,...