GitHub Copilot Chat – Simplifying Code with AI

0

In July, we introduced a public beta of GitHub Copilot Chat, a pivotal component of our vision for the future of AI-powered software development, for all GitHub Copilot for Business users. Today, we’re thrilled to take the next step forward in our GitHub Copilot X journey by releasing a public beta of GitHub Copilot Chat for all GitHub Copilot individual users across...

Dark Web Archives – Unveiling Hidden Marketplaces & Scams

0

All public/Privately leaked Dark Web Marketplace (DNM) Scripts, Source codes and information. This archive will be a place for researchers, law enforcemet and etc to study DNMs, Fraud Markets and Common Dark Web Scams without the need to venture to Tor/I2P to find them, do research and etc. We'll do that for you. In this archive you can find everything found...

Mshikaki – Advanced Shellcode Injection Tool for Bypassing AMSI

0

"Mshikaki - kebab (skewered meat, especially beef)" yum yum. In the realm of cybersecurity, stealth and efficiency are paramount. Enter 'Mshikaki', an advanced shellcode injection tool that stands out for its ability to seamlessly bypass the Antimalware Scan Interface (AMSI). Designed for both security researchers and penetration testers, Mshikaki ensures that your code remains undetected while achieving its objectives. Overview Mshikaki is...

Nessusploitable – Targeting Exploitable Nessus Vulnerabilities

0

Do you need to filter Nessus scan results and zero in on exploitable vulnerabilities? When you're on a penetration test or vulnerability assessment and you have to review Nessus scan results, you can filter using Nessus or you can export a Nessus .nessus file for distrubution or offline parsing. Nessusploitable parses .nessus files for exploitable vulnerabilities and outputs a...

AttackGen – Tailored Cyber Incident Response Testing

0

AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details. Table Of Contents Star the Repo Features Releases Requirements Installation Data Setup Running AttackGen Usage Contributing Licence Star The Repo If you find AttackGen useful, please consider starring the repository on GitHub. This...

Azure AD Attack & Defense Playbook

0

This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected. All of the included scenarios, insights and comments are based on experiences from the contributors during their attack simulations, hands-on or real-world scenarios. It should be considered a living document, which will be updated as practices progress &...

TinyCheck – Spotting Malicious Networks With Ease

0

Description TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). The idea of TinyCheck emerged...

ProtoBurp++: Elevating Protobuf Security Research

0

A game-changer in cybersecurity tooling, designed to take Protobuf fuzzing and encoding in Burp Suite to new heights. Dive in to explore its enhanced capabilities and features, setting a new benchmark in security research. This is an updated version of ProtoBurp by Dillon Franke, with enhanced features and capabilities. We called this version ProtoBurp++ to distinguish the tool from the original project. Description ProtoBurp++ is...

Donut-Decryptor : Unmasking Binary Secrets

0

Navigating the maze of binary obfuscation? Meet the "Donut-Decryptor", a tool tailored to decode the elusive Donut obfuscation. Dive in to unravel its capabilities and bring clarity to concealed code. Beyond mere decryption, it’s a spotlight in the shadowy corridors of cybersecurity. A must-have for those battling coded enigmas. A configuration and module extractor for the donut binary obfuscator. Description donut-decryptor checks file(s) for...

BucketLoot – An Automated S3 Bucket Inspector

0

Thousands of S3 buckets are left open on the internet, which makes them an easy target for bad people who want to get private information from the files in these buckets that can be tied to a person or an organization. There isn't much study or software that can use these S3 buckets to find secret exposures and search...