RedELK – Enhancing Red Team Operations And Blue Team Detection Through Centralized SIEM
Short: a Red Team's SIEM. Longer: a Red Team's SIEM that serves two main goals: Enhanced usability and overview for the red team operators by creating a central location where all relevant operational logs from multiple teamservers are collected and enriched. This is great for historic searching within the operation as well as giving a read-only view on the operation (e.g....
SharpTerminator – A Guide To Automating AV/EDR Disruption With C# Port
C# port of ZeroMemoryEx's Terminator, so all hail goes to him. Usage You can download the driver from a remote URL using SharpTerminator and load it to terminate AV/EDR processes, or you can directly load it to the disk to perform the same operation. When using Remote URL, the driver is downloaded to "C:WindowsTemp" and then loaded from there. In fact, there is...
RedELK Server – DeploymentEssential Configuration Variables Overview
We delve into the process of setting up a RedELK server, focusing on the critical configuration variables required for successful deployment. As the traditional method becomes obsolete, we transition towards the use of an Ansible role specifically designed for this purpose. Discover how to customize your RedELK environment to meet specific security and monitoring needs. Variables The following variables can be...
RedELK-Client : Deploying Cybersecurity Monitoring With Ansible
The RedELK client components using Ansible, a powerful automation tool that streamlines the installation and management of cybersecurity monitoring systems. As RedELK enhances the capabilities of red teaming operations by aggregating data and providing insightful analytics, mastering its deployment is crucial for effective cybersecurity defenses. We'll detail the necessary configurations, dependencies, and steps to successfully integrate RedELK into your...
Crawl4AI – The Future Of Asynchronous Web Crawling For AI
Crawl4AI simplifies asynchronous web crawling and data extraction, making it accessible for large language models (LLMs) and AI applications. Looking for the synchronous version? Check out README.sync.md. You can also access the previous version in the branch V0.2.76. Try It Now! ✨ Play around with this ✨ Visit our Documentation Website Features 🆓 Completely free and open-source 🚀 Blazing fast performance, outperforming many paid...
OXO Scan Orchestration Engine – A Comprehensive Guide To Scalable Security Assessments
OXO is a security scanning framework built for modularity, scalability and simplicity. OXO Engine combines specialized tools to work cohesively to find vulnerabilities and perform actions like recon, enumeration, fingerprinting ... Documentation Agents Store CLI Manual Examples RequirementsDocker is required to run scans locally. To install docker, please follow these instructions.InstallingOXO ships as a Python package on pypi. To install it, simply run the following...
Nullinux – The Comprehensive SMB Enumeration Tool For Penetration Testing
Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB. If no username and password are provided in the command line arguments, an anonymous login, or null session, is attempted. Nullinux acts as a wrapper around the Samba tools smbclient & rpcclient to enumerate...
MANSPIDER – Advanced SMB Crawling For Sensitive Data Detection
textract, one of manspider's upstream dependencies, is no longer being updated. For this reason, you may run into problems when installing with pip. The recommended installation method is now Docker docker run --rm -v ./manspider:/root/.manspider blacklanternsecurity/manspider --help Note there is also a helper script manspider.sh which will automatically mount volumes for manspider's loot and logs directories, making it a bit more...
EDR-Antivirus-Bypass-To-Gain-Shell-Access
This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique. The code executes shellcode that spawns a reverse shell, successfully evading detection by various security mechanisms. Description This project demonstrates how to bypass EDR and antivirus protection using Windows API functions such as VirtualAlloc, CreateThread, and WaitForSingleObject. The payload is injected directly into the...
GShark – A Comprehensive Guide To Sensitive Information Management System Deployment
The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please refer to articles and videos. For now, all the scans are only targeted to the public environments, not local environments. For the usage of GShark, please refer to the wiki. Features Support multiple platforms, such as GitLab, GitHub, Searchcode, and...