Invoke-AtomicAssessment : Unleashing The Power Of Adversary Emulation For Enhanced Cybersecurity
Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team. This tool automates the execution of these techniques and logs the results in the ATTiRe format, which can then be visualized on the VECTR platform. The tool offers various threat actor profiles, enabling simulations of ransomware attacks and activities of Advanced Persistent Threat (APT)...
Wicked Panda APT Adversary Simulation
This is a simulation of attack by the Wicked Panda group (APT-41) targeting U.S. state government networks the attack campaign was active between May 2021 and February 2022, in addition to attacks targeting Taiwanese media, the attack chain starts with the in-memory execution of MoonWalk backdoor. Once the MoonWalk backdoor is successfully loaded by DodgeBox, the malware decrypts and...
Cyberbro : Revolutionizing Threat Intelligence With Simplified IoC Analysis
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple services.Inspired by Cybergordon and IntelOwl. This project aims to provide a simple and efficient way to check the reputation of your observables using multiple services, without having to deploy a complex solution. Features Effortless Input Handling: Paste raw logs, IoCs, or fanged IoCs, and let our...
B(l)utter
Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime. Currently, the application supports only Android libapp.so. Also, the application currently works only against recent Dart versions. Environment Setup This application uses the C++20 Formatting Library. It requires a very recent C++ compiler, such as g++ >=13 or Clang >=15. I recommend using Linux OS (only tested on Deiban SD) because it...
FLARE-VM : A Comprehensive Guide To Establishing A Reverse Engineering Lab On Windows
Welcome to FLARE-VM - a collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a virtual machine (VM). FLARE-VM was designed to solve the problem of reverse engineering tool curation and relies on two main technologies: Chocolatey and Boxstarter. Chocolatey is a Windows-based Nuget package management system,...
AWeSomeUserFinder : Harnessing AWS IAM For Username Enumeration And Password Security
AWS IAM Username Enumerator and Password Spraying Tool in Python3 In order to use the tool with the UpdateAssumeRolePolicy method, the IAM user account utilized must have the following permissions attached: "iam:GetRole" "iam:CreatePolicy" "iam:UpdateAssumeRolePolicy" "iam:CreateRole" "iam:AttachRolePolicy" An example policy is included in the files named "example_assume_role_policy.json" in the example_policies directory. Additionally, an AWS access key and AWS secret key are required. See this link for information on...
Monolith : The Ultimate Tool For Compiling Entire Web Pages Into Single HTML Files
A data hoarder’s dream come true: bundle any web page into a single HTML file. You can finally replace that gazillion of open tabs with a gazillion of .html files stored somewhere on your precious little drive. Unlike the conventional “Save page as”, monolith not only saves the target document, it embeds CSS, image, and JavaScript assets all at once,...
Useful Bug Bounty And Security Related Write-ups : A Comprehensive Guide For Enthusiasts
This repo contains all variants of information security & Bug bounty & Penetration Testing write-up design for beginners or newcomers who are confused or don't know which keyword to search. All these articles' links are fetched from medium.com (A popular blog sharing site for a variety of different interest people) Note: All of them were generated by an automation tool...
Conduwuit : Pioneering A New Era In Matrix Homeservers
Matrix is an open network for secure and decentralized communication. Users from every Matrix homeserver can chat with users from all other Matrix servers. You can even use bridges (also called Matrix Appservices) to communicate with users outside of Matrix, like a community on Discord. What Is The Goal? A high-performance and efficient Matrix homeserver that's easy to set up and...
LSMS – Linux Security And Monitoring Scripts
Linux Security And Monitoring Scripts are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events or for an investigation. Each script works on its own and is independent of other scripts. The scripts can be set up to either print out their results, send them to you via mail, or...