Nmap Analysis Tool – Enhancing Network Security Through Advanced Analysis And Reporting

0

This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML files to create a spreadsheet that compares IPs, ports and services between the files, and create a markdown report using GPT. Screenshots Features Comprehensive Nmap XML Parsing Multiple File Support: Parse and analyze two Nmap XML output files. Structured...

Shelter : Mastering In-Memory Payload Encryption With Advanced ROP Techniques

0

Shelter is a completely weaponized sleep obfuscation technique that allows to fully encrypt your in-memory payload making an extensive use of ROP. This crate comes with the following characteristics: AES-128 encryption. Whole PE encryption capability. Removal of execution permission during sleep time. No APC/HWBP/Timers used, exclusive use of ROP to achieve the obfuscation. Use of Unwinder to achieve call stack spoofing before executing the ROP chain. Different methods...

ADeleg – Mastering Active Directory Delegation Management

0

Is an Active Directory delegation management tool. It allows you to make a detailed inventory of delegations set up so far in a forest, along with their potential issues: Objects owned by users Objects with ACEs for users Non canonical ACL Disabled ACL inheritance Default ACL modified in schema Deleted delegation trustees It also allows you to document your delegation model in JSON files, to obtain...

SSH-Snake : Automated SSH-Based Network Traversal

0

SSH-Snake is a powerful tool designed to perform automatic network traversal using SSH private keys discovered on systems, with the objective of creating a comprehensive map of a network and its dependencies, identifying to what extent a network can be compromised using SSH and SSH private keys starting from a particular system. SSH-Snake can automatically reveal the relationship between systems...

CloudMiner – Unleashing Free Computing Power Within Azure Automation

0

CloudMiner represents a groundbreaking approach to leveraging Azure Automation service without incurring any costs. Designed for educational and research purposes, this tool cleverly navigates through the service's upload module/package flow, allowing users to execute code for up to three hours per session, completely free of charge. Despite being reported to Microsoft, the service's behavior remains unchanged, opening up new...

SqliSniper – Enhancing Web Security By Detecting SQL Injection Vulnerabilities With Python

0

SqliSniper is a robust Python tool designed to detect time-based blind SQL injections in HTTP request headers. It enhances the security assessment process by rapidly scanning and identifying potential vulnerabilities using multi-threaded, ensuring speed and efficiency. Unlike other scanners, SqliSniper is designed to eliminates false positives through and send alerts upon detection, with the built-in Discord notification functionality. Key Features Time-Based Blind...

WEB-Wordlist-Generator : Strengthening Your Web Application’s Defense Against Cyber Threats

0

In the digital age, securing web applications against cyber attacks is paramount. The WEB-Wordlist-Generator emerges as a crucial tool, designed to scan web applications and generate targeted wordlists. This allows for proactive measures to be taken, enhancing security and preventing potential breaches. With its easy installation and versatile usage options, it's a must-have in any cybersecurity toolkit. NOTE : You...

NullSection : A Revolutionary Anti-Reversing Tool For Enhancing Software Security

0

NullSection emerges as a cutting-edge tool designed to fortify software against reverse engineering attempts. By employing a novel technique that overwrites section headers with null bytes, it effectively renders ELF binaries, including potentially malicious .ko rootkits, impervious to analysis by popular decompilers like Ghidra and IDA. This article delves into the installation process, advantages, and responsible usage of NullSection,...

Mr.Handler – The Ultimate Tool For Linux Security Incident Response And System Analysis

0

MR.Handler is a specialized tool designed for responding to security incidents on Linux systems. It connects to target systems via SSH to execute a range of diagnostic commands, gathering crucial information such as network configurations, system logs, user accounts, and running processes. At the end of its operation, the tool compiles all the gathered data into a comprehensive HTML...

AzSubEnum – Azure Service Subdomain Enumeration

0

AzSubEnum is a specialized subdomain enumeration tool tailored for Azure services. This tool is designed to meticulously search and identify subdomains associated with various Azure services. Through a combination of techniques and queries, AzSubEnum delves into the Azure domain structure, systematically probing and collecting subdomains related to a diverse range of Azure services. How It Works? AzSubEnum operates by leveraging DNS...