FFM : Freedom Fighting Mode Open Source Hacking Harness

0

FFM is a hacking harness that you can use during the post-exploitation phase of a red-teaming engagement. It was presented at SSTIC 2018 and the accompanying slide deck is available at this url. If you're not familiar with this class of tools, it is strongly advised to have a look at them to understand what a hacking harness'...

IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray

0

IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made to a database by multiple users, by connecting together different instances of IDA Pro. The main features of IDArling are: hooking general user eventsstructure and enumeration supportHex-Rays decompiler syncingreplay engine and auto-savingdatabase loading and savinginteractive status bar widgetuser cursors (instructions, functions, navbar)invite and...

How to Write a Dissertation in Less Time Than You Plan

0

Let's face it. Many students have problems with an adequate estimate of time. When it comes to a particularly difficult task, the situation is even more aggravated. It seems to a student that there is still a lot of time to cope with the task. There are so long timeframes that it is possible to afford not to hurry....

Just-Metadata : Tool That Gathers & Analyzes Metadata About IP Addresses

0

Just-Metadata is a tool that can be used to gather intelligence information passively about a large number of IP addresses, and attempt to extrapolate relationships that might not otherwise be seen. Just-Metadata has "gather" modules which are used to gather metadata about IPs loaded into the framework across multiple resources on the internet....

PHPMussel : Anti-Virus Anti-Trojan Anti-Malware Solution

0

An ideal solution for shared hosting environments, where it's often not possible to utilise or install conventional anti-virus protection solutions, phpMussel is a PHP script designed to detect trojans, viruses, malware and other threats within files uploaded to your system wherever the script is hooked, based on the signatures of ClamAV and others. Features Licensed as GNU...

WinPwn : Automation for Internal Windows Penetrationtest / AD-Security

0

In many past internal penetration tests I often had problems with the existing Powershell Recon / Exploitation scripts due to missing proxy support. For this reason I wrote my own script with automatic proxy recognition and integration called WinPwn. The script is mostly based on well-known large other offensive security Powershell projects. I only load...

Mutiny Fuzzer : Network Fuzzer Replaying PCAPs Through a Mutational Fuzzer

0

The Mutiny Fuzzer Framework is a network fuzzer that operates by replaying PCAPs through a mutational fuzzer. The goal is to begin network fuzzing as quickly as possible, at the expense of being thorough. The general workflow for Mutiny is to take a sample of legitimate traffic, such as a browser request, and feed it into a prep script...

Tips for paper writing for final assignment

0

Students are in high school and have just gotten major term paper assignments and are not a little five hundreds of words. Actually pending on the level in the year so students probably wondering if there is a way that can get to writing paper very fast is usually required. If are off to the college in the fall so then required to...

FridaExtract : Frida.re Based RunPE Extraction Tool

0

FridaExtract is a Frida.re based RunPE extraction tool. RunPE type injection is a common technique used by malware to hide code within another process. It also happens to be the final stage in a lot of packers : ) NOTE: Frida now also supports extraction of injected PE files using the "MapViewOfSection" technique best described here. Using FridaExtract you can automatically extract and reconstruct a PE...

Droidefense : Advance Android Malware Analysis Framework

0

Droidefense is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and tricks that malware researcher have on they every day work. For those situations on where the malware has anti-analysis routines, Droidefense attemps to bypass them in order to get to the code and 'bad boy' routine. Sometimes those techniques can be virtual machine...