Ansible Role : Bloodhound-CE (Ludus) – A Quick Deployment Guide
An Ansible Role that installs Bloodhound-CE on a debian based system. Checks if {{ ludus_bloodhound_ce_install_path }}/docker-compose.yml exists If not, it installs vanilla bloodhound-ce (via docker-compose) Outputs the admin password in bloodhound_ce_install_path (default: /opt/bloodhound) To force the role to re-run, stop the docker container and remove the ludus_bloodhound_ce_install_path folder cd /opt/bloodhound docker compose down cd .. rm -rf /opt/bloodhound Requirements Debian based OS Role Variables Available variables are listed below, along with default values (see defaults/main.yml): #...
DetectDee – The Ultimate Guide To Tracing Social Media Profiles
DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing usernames, email addresses, or phone numbers. Tailored for cybersecurity experts, it offers precision, evasion capabilities against web application firewalls, and easy integration. This guide delves into the functionalities, installation, and usage of DetectDee, ensuring a seamless experience for those...
Awesome Honeypots : Guardians Of The Digital Frontier – A Comprehensive Guide To Cybersecurity Tools
A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and others, with a focus on free and open source projects. There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the guide. Discover more awesome lists at sindresorhus/awesome. Contents Awesome Honeypots Contents Related Lists Honeypots Honeyd Tools Network...
Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques
Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is meant to be used with kdmapper or a similar driver mapper. I am just learning about kernel driver development, so this is for educational purposes mainly. Usage You can integrate Banshee into your tooling, by including the Banshee.hpp file in your project, e.g.: Banshee banshee = Banshee(); banshee.Initialize(); int targetPid...
Mali GPU Kernel LPE – Unveiling Root Access Exploits In Google Pixel Devices
This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox, which I independently identified and reported to Google. It includes a kernel exploit that achieves arbitrary kernel r/w capabilities. Consequently, it disables SELinux and elevates privileges to root on Google Pixel 7 and 8 Pro models running the following...
v2.3.0 – Enhanced Runtime Display And Custom Configurations In Naabu
In the latest software evolution, version 2.3.0 marks a significant milestone for Naabu, introducing key enhancements that users have eagerly anticipated. This update unveils the capability to display results dynamically at runtime and the flexibility to specify custom configuration files, among other critical bug fixes. Spearheaded by a collaborative effort, these advancements promise to elevate the user experience and...
DarkGPT : A Step-By-Step Installation Guide For Interacting With Leaked Databases
DarkGPT unveils the shadowy corners of cyberspace by granting access to leaked databases through a cutting-edge AI powered by GPT-4-200K. This comprehensive guide outlines the installation process, from setting up your environment to running the project, ensuring you're equipped to navigate this complex landscape. Dive into the world of DarkGPT and unlock the potential of AI in cybersecurity. Installation Guide...
Awesome Hacking – An Amazing Project : The Ultimate Resource Guide For Cybersecurity Exploration
A curated list of awesome Hacking. Inspired by awesome-machine-learning If you want to contribute to this list (please do), send me a pull request! For a list of free hacking books available for download, go here Table Of Contents System Tutorials Tools Docker General Reverse Engineering Tutorials Tools General Web Tools General Network Tools Forensic Tools Cryptography Tools Wargame System Reverse Engineering Web Cryptography Bug bounty CTF Competition General OS Online resources Post exploitation tools ETC System Tutorials Roppers Computing Fundamentals Free, self-paced curriculum that builds a base of knowledge in computers and networking. Intended to build up a student...
The Spy’s Job – Mastering OSINT With XDeadHackerX’s Comprehensive Toolkit
Buenas, soy XDeadHackerX y quiero presentaros mi nueva herramienta llamada The_Spy´s_Job. Esta Tool está enfocado al OSINT de casi todos los ámbitos (Personas, Nicknames, Redes Sociales, Emails, Números de Teléfono, Páginas Webs, IPs Públicas e Imágenes) Mi idea era recopilar y automatizar todas las técnicas de OSINT más Avanzadas posibles en una sola Herramienta y así trabajar de la forma más cómoda y rápida posible, ya que...
WinSOS – Harnessing Trusted Binaries For Stealthy DLL Hijacking
WinSOS represents a sophisticated technique that turns the Windows operating system's own features against it. By manipulating executables in the WinSxS folder, a component trusted by Windows, attackers can discreetly execute malicious code. This method, building on DLL Search Order Hijacking, does not require elevated privileges, making it a stealthy approach for infiltrating Windows 10 and 11 systems. It...