BYOB : Open-Source Project To Build Your Own Botnet
BYOB is an open-source project that provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed to allow developers to easily...
Kemon – An Open-Source Pre & Post Callback-Based Framework For macOS Kernel Monitoring
Kemon is an open-source Pre and Post callback-based framework for macOS kernel monitoring. With the power of it, we can easily implement LPC communication monitoring, MAC policy filtering, kernel driver firewall, etc. In general, from an attacker's perspective, this framework can help achieve more powerful Rootkit. From the perspective of defense, it can help construct more granular monitoring capabilities....
Aircrack-NG : WiFi Security Auditing Tools Suite
Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further processing by third party tools. Attacking: Replay attacks, deauthentication, fake access points and others via packet injection. Testing: Checking WiFi cards and driver capabilities (capture and injection). Cracking:...
JShell – Get a JavaScript shell with XSS
JShell get a JavaScript shell with XSS. The Java Shell tool is an interactive tool for learning the Java programming language and prototyping Java code. JShell Usages Run shell.py and it will automatically try to detect your IP address, default LPORT is 33. As you can see the payload has been generated and now all you have to do is to deliver...
AWS Key Disabler – Lambda Script That Will Disable Access Keys Older Than A Given Amount Of Days
The AWS Key disabler is a Lambda Function that disables AWS IAM User Access Keys after a set amount of time in order to reduce the risk associated with old access keys. AWS Lambda Architecture SysOps Output for EndUser Developer Toolchain Also ReadHow Safe is to Use the Internet From Public WiFi? AWS Key Disabler Current Limitations A report containing the output (json) of...
Drltrace – A Library Calls Tracer For Windows & Linux Applications
Drltrace is a dynamic API calls tracer for Windows and Linux applications designed primarily for malware analysis. Drltrace is built on top of DynamoRIO dynamic binary instrumentation framework. The release build can be downloaded here. Why Drltrace Rock? Fast enough to perform analysis of malicious samples without being detected by time-based anti-research techniques. Supports both x86 and x64 (ARM in future). ...
Neofetch – A command-line System Information Tool
Neofetch is a command-line system information tool written in bash 3.2+. Neofetch displays information about your operating system, software and hardware in an aesthetic and visually pleasing way. The overall purpose of Neofetch is to be used in screen-shots of your system. Neofetch shows the information other people want to see. There are other tools available for proper system statistic/diagnostics. The...
Drozer v2.4.4 – The Leading Security Assessment Framework For Android
Drozer 2.4.4 is the leading security testing framework for Android. Drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS. Drozer provides tools to help you use, share and understand public Android exploits. It helps you to...
Put2Win – Script To Automatize Shell Upload By PUT HTTP Method To Get Meterpreter
Put2Win is a script to automatize shell upload by PUT HTTP method to get meterpreter. It's necessary to have installed nmap and msfvenom tools for a correct operation. Also ReadJoomscan – OWASP Joomla Vulnerability Scanner Project Put2Win Usage ./Put2win.sh -h This script automatize shell upload by PUT HTTP method to get meterpreter. Usage: ./Put2win.sh -t TARGET -u URL_PATH -l LHOST Examples: ./Put2win.sh -t 192.168.1.80 -u...
UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP
Udp2raw Tunnel is a tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP Environment). It can defend Replay-Attack and supports Multiplexing. It also acts as a Connection Stabilizer. When used alone,udp2raw tunnels only UDP traffic. Nevertheless,if you used udp2raw + any UDP-based VPN together,you can tunnel any traffic(include TCP/UDP/ICMP),currently...