ExecIT – Unveiling A Fileless Execution Technique Ith Undetectable DLL Shellcode

0

DLL Shellcode self-inyector/runner based on HWSyscalls, ideally thought to be executed with rundll32. May grant fileless execution if victim endpoint has access to attacker-controlled SMB share. It is designed for use with rundll32 and has the potential to enable fileless execution when accessing an attacker-controlled SMB share. The tool claims to be undetected by several EDR solutions but emphasizes ethical...

C++ Standard Library And Qt, Python, etc. Implementation in C – Reviving the Spirit of C For Enhanced Development

0

This project aims to reimplement the C++ standard library functionality using the C programming language. It provides C developers with tools and libraries commonly available in C++, enabling better data structure management, algorithm implementation, and feature usage while staying within the C language's ecosystem. A Personal Note From Me I undertake this project out of a deep affection for the C...

Awesome GPTs (Agents) For Cybersecurity – The Ultimate Guide

0

The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity (offensive and defensive), created by the community. Please note, this repository is a community-driven project and may not list all existing GPT agents in cybersecurity. Contributions are welcome – feel free to add your own creations! Disclaimer: Users should exercise caution...

VPS-Bug-Bounty-Tools : Automating Web Security Tools Installation

0

Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty. Usage: cd /tmp && git clone https://github.com/drak3hft7/VPS-Bug-Bounty-Tools cd VPS-Bug-Bounty-Tools sudo ./Tools-BugBounty-installer.sh Example During Installation: List Of Tools Inserted: Network Scanner: Nmap Masscan Naabu Subdomain Enumeration And DNS Resolver: Massdns Subfinder Knock Lazyrecon Github-subdomains Sublist3r Crtndstry Assetfinder Dnsx Dnsgen Subdomain Takeovers: SubOver Web Fuzzer: Dirsearch Ffuf Wordlists: SecLists Scanner CMS: Wpscan Droopescan Vuln SQL: SQLmap NoSQLmap Jeeves Enumeration Javascript: LinkFinder SecretFinder JSParser Visual Recon: Aquatone Crawling Web: GoSpider Hakrawler Katana Vuln XSS: XSStrike XSS-Loader Freq Gxss Dalfox Vuln SSRF: SSRFmap Gopherus Vulnerability Scanner: Nuclei Virtual Host Discovery: Virtual host scanner Useful Tools: Anew Unew Gf Httprobe Httpx Waybackurls Arjun Gau Uro Qsreplace SocialHunter Update - Time Line: 28 September 2021: Inserted into the script...

Stardust – A Deep Dive Into A 64-Bit Position Independent Implant Template

0

An modern 64-bit position independent implant template. raw strings global instance compile time hashing #include <Common.h> #include <Constexpr.h> FUNC VOID Main( _In_ PVOID Param ) { STARDUST_INSTANCE PVOID Message = { 0 }; // // resolve kernel32.dll related functions // if ( ( Instance()->Modules.Kernel32 =...

Automated Emulation – Building A Customizable Breach And Attack Simulation Lab With AWS And Terraform

0

Automated Emulation is a simple terraform template creating a customizable and automated Breach and Attack Simulation lab. It automically builds the following resources hosted in AWS: One Linux server deploying Caldera, Prelude Operator Headless, and VECTR One Windows Client (Windows Server 2022) auto-configured for Caldera agent deployment, Prelude pneuma, and other Red And Blue tools See the Features and Capabilities section for more details. Key...

CVE-2023-22527 in Confluence : A Step-by-Step Guide And Its Implications

0

In the world of cybersecurity, staying informed about the latest vulnerabilities is crucial. One such vulnerability that has garnered attention is CVE-2023-22527 in Confluence, a popular collaboration platform. In this article, we'll delve into the details of this vulnerability and provide a step-by-step guide on how it can be exploited. By the end, you'll gain a better understanding of...

Wormhole Connect – Navigating The Ecosystem For Simplifying Cross-Chain Integration

0

Wormhole Connect is a project to facilitate integration with the Wormhole protocol. It is thus far comprised of 3 components: wormhole-connect, sdk and builder. Below is a brief introduction on each, see the corresponding READMEs for more information. Wormhole Connect An app that brings all the functionality and utility of the Wormhole token bridge right into your application and removes all...

YaraDbg – Simplifying Yara Rule Development And Analysis For Security Analysts

0

YaraDbg is a free web-based Yara debugger to help security analysts to write hunting or detection rules with less effort and more confidence. By using YaraDbg, you can perform a thorough root-cause-analysis (RCA) on why some of your Yara rules did or did not match with a specific file. It can also help you to better maintain a large...

OpenVoice – Advancing Voice Cloning Technology

0

In the ever-evolving world of voice technology, OpenVoice stands as a game-changer. This groundbreaking platform, developed by a team of experts from MIT, Tsinghua University, and MyShell, offers a trifecta of advantages: precise tone color cloning, fine-grained voice style control, and zero-shot cross-lingual capabilities. Since its launch in May 2023, OpenVoice has witnessed explosive growth, powering MyShell's instant voice...