WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation
WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of time with being as stealth as possible. Just find a network port and plug it in. The scripts have been designed in a way that the approach is targeted to...
Hawkeye – A Tool To Crawl The Filesystem Or A Directory
HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log Files, Sqlite Database, password files, etc. Hawkeye uses a fast filesystem crawler to look through files recursively and then sends them for analysis in real time and presents the data in both json format and simple console output. The...
Curate – A tool for fetching archived URLs
Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will clone this repository and then move all scripts to /usr/local/bin. $ git clone git@github.com:EdOverflow/curate.git && cp curate/curate /usr/local/bin/ && echo "You can delete the ./curate/ folder now." Once you have are done with this one-liner, make sure to include your VirusTotal API key...
Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation
Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shellcodes to running processes in a system. Almost all nix systems most of the Linux variants can be backdoored with cymothoa. Cymothoa uses ptrace library in nix systems to evaluate running processes & inject shellcodes. The greatest advantage of...
Tcpflow – To Monitor, Capture & Dump Packets
Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used to monitor thousands of connections. Tcpflow differs from other tools by actually capturing the real data and dumping it to a file we specify. It can be then further used for other analysis purposes. One more advantage of tcpflow is...
Mallet – A Framework For Creating Proxies
Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies, just more generic. It is built upon the Netty framework, and relies heavily on the Netty pipeline concept, which allows the graphical assembly of graphs of handlers. In the Netty world, handler instances provide frame delimitation (i.e. where does a message...
RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing SPNs Accounts
RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue teams to identify potentially risky SPNs as well as red teams to escalate privileges by leveraging Kerberos and Active Directory. Also Read Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development and Vulnerability Research RiskySPN Usage...
PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing, Privilege Escalation on Scale, and Post Exploitation Attacks
PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions such as OS command execution. It is intended to be used during internal penetration tests and red team engagements. However, PowerUpSQL also includes many functions that can be used by administrators to quickly inventory the SQL Servers in their ADS...
PacVim – A Game That Teaches You Vim Commands
PacVim is a free open source, text-based game that teaches you vim commands in a simple and fun manner. In spite of the fact that Vim is a prominent content editor on Linux systems, individuals still think that its difficult to learn, it has a precarious expectation to learn and adapt particularly the propelled highlights, a considerable measure of...
lbd – Tool to Detect Whether a Domain has Load Balancing Enabled
Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can be in any form. Load balancing can be done to evenly distribute workload through a series of Computer clusters. Or it can be used within a single system to balance connections across a set of network interface cards or disks....