HASH : Harnessing HTTP Agnostic Software Honeypots For Enhanced Cybersecurity

0

The main philosophy of HASH is to be easy to configure and flexible to mimic any software running on HTTP/HTTPs. With the minimum footprint possible to avoid being detected as honeypot. Features Single framework to deploy HTTP/HTTPs based honeypots Easily configurable via YAML files Built-in honeytraps Powerful randomization based on fakerjs to avoid honeypot detection Optionally, integration with Datadog to ingest and analyze honeypots logs...

SECurityTr8Ker : SEC Cybersecurity Disclosure Monitor

0

SECurityTr8Ker is a Python application designed to monitor the U.S. Securities and Exchange Commission's (SEC) RSS feed for new 8-K filings that contain material cybersecurity incident disclosures. This tool is particularly useful for cybersecurity analysts, financial professionals, and researchers interested in real-time alerts of cybersecurity incidents disclosed by publicly traded companies. Features Real-time Monitoring: Continuously monitors the SEC's RSS feed for...

ripgrep : The Fast, Flexible Search Tool

0

ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect gitignore rules and automatically skip hidden files/directories and binary files. (To disable all automatic filtering by default, use rg -uuu.) ripgrep has first class support on Windows, macOS and Linux, with binary downloads available for every release. ripgrep...

InfluxDB : The Open Source Leader In Time Series Data And Real-Time Analytics

0

InfluxDB is the leading open source time series database for metrics, events, and real-time analytics. Project Status This main branch contains InfluxDB v3 in pre-release and under active development. Build artifacts are not yet generally available and official installation instructions will be coming later this year. For now, a Dockerfile is provided and can be adapted or used for inspiration by...

Fuxploider : Automating File Upload Vulnerability Exploitation

0

Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws. This tool is able to detect the file types allowed to be uploaded and is able to detect which technique will work best to upload web shells or any malicious file on the desired web server. Installation You will need Python...

The Strength Of Signed App Control Policies

0

Before delving into the topic, let's first clarify the role of an Administrator within the operating system. An Administrator is a user with the highest level of access to the OS, possessing the authority to make system-wide changes that impact all users. Administrators are responsible for managing system security, modifying security settings, installing software and hardware, and accessing all files...

Embassy : Revolutionizing Embedded Systems With Rust And Asynchronous Programming

0

Embassy is the next-generation framework for embedded applications. Write safe, correct and energy-efficient embedded code faster, using the Rust programming language, its async facilities, and the Embassy libraries. Documentation - API reference - Website - Chat Rust + async Embedded The Rust programming language is blazingly fast and memory-efficient, with no runtime, garbage collector or OS. It catches a wide variety of...

AttackRuleMap : Bridging Adversary Simulations And Detection Rules For Enhanced Cybersecurity

0

This repository provides a mapping of Atomic Red Team attack simulations to open-source detection rules, such as Sigma and Splunk ESCU. Project Purpose The goal of this project is to bridge the gap between Atomic Red Team's adversary simulations and open-source detection rules. By doing so, this project aims to help security professionals simulate attacks and evaluate their detection strategies more...

Qdrant : A High-Performance Vector Similarity Search Engine

0

Qdrant (read: quadrant) is a vector similarity search engine and vector database. It provides a production-ready service with a convenient API to store, search, and manage points—vectors with an additional payload Qdrant is tailored to extended filtering support. It makes it useful for all sorts of neural-network or semantic-based matching, faceted search, and other applications. Qdrant is written in Rust,...

ShadowHound : Leveraging PowerShell For Stealthy Active Directory Enumeration

0

ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like SharpHound. It leverages native PowerShell capabilities to minimize detection risks and offers two methods for data collection: ShadowHound-ADM.ps1: Uses the Active Directory module (ADWS). ShadowHound-DS.ps1: Utilizes direct LDAP queries via DirectorySearcher. Blog Post For more details and context, check out the blog post. Scripts Overview ShadowHound-ADM.ps1 Method:...