OSINT GPT – ChatGPT Powered Open Source Intelligence Tool

0

osintgpt is a Python package for leveraging OpenAI's GPT models to analyze text data and perform tasks such as calculating text embeddings, searching for similar documents, and more. It is designed for use in open-source intelligence (OSINT) applications and research. Installation You can install the osintgpt package using pip. pip install osintgpt Given the recent changes and updates, it is highly recommended to upgrade to the latest...

ADCSKiller – An ADCS Exploitation Automation Tool

0

ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages the features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure. Please note that the ADCSKiller is currently in its first draft and will undergo further refinements and additions in future updates. Features Enumerate Domain Administrators via...

OWASP WrongSecrets: Multi-Tenant CTF Party Setup

0

Welcome to OWASP WrongSecrets CTF Party, where Capture The Flag tasks meet scalability without any problems. Our platform is made for dynamic, multi-tenant CTF games. It was made possible by the pioneering work of the OWASP MultiJuicer. Whether you're a contestant who wants to take on the tasks or an organizer who wants a simple setup, this guide will show...

Supernova : The Ultimate Shellcode Encryption & Conversion Toolkit

0

Meet Supernova, the new and improved shellcode encryption tool made for today's ethical hackers. Supernova is written in Golang and works with both Windows and Linux. It has a wide range of encryption ciphers, such as ROT, XOR, RC4, and AES. What makes it different? It's not just an encryptor; it also changes your encrypted shellcode into forms that...

Combine Tool – Bypass EDRs & Secure Windows Credentials

0

By readapting the safetydump rust library (many thanks to the author!!!), I have been able to EASILY bypass all the countermeasures put in place by most EDRs, except Kaspersky EDR, and TrendMicro (new detection, from a couple hours ago) dbghelp!MiniDumpWriteDump with a custom callback could be used, until a year ago, to bypass most antivirus and EDR solutions. Now, most of...

EDRSandblast-GodFault: Advanced EDR Bypass Tool

0

EDRSandblast-GodFault is an advanced EDR bypass tool aimed at security researchers and organizations. Its purpose is to evaluate the effectiveness of current EDR systems by simulating real-world attack techniques. Use this tool responsibly and only on systems where you have explicit authorization. Integrates GodFault into EDR Sandblast, achieving the same result without the use of any vulnerable drivers. Example Output C:UsersuserDesktopOffsets>EDRSandblast.exe --kernelmode cmd D3FC0N 30...

Prebuilt Multi-Arch Binaries for Enhanced Device Management

0

Prebuilt binaries for multiple architeture (arm, armeb, aarch64, aarch64_be, mips, mips1, mipsel, mipsel1, mips64, mips64el, powerpc, powerpc64, powerpc64le, riscv64, i586, x86_64) All binaries are statically linked and stripped. Please go to the Release page for downloads. *archName*_tools.zip contains tools' binary (see Tools Section) for that specific arch, and allinone.zip contains all of it. Or download single file directly from bin branch. The source code and scripts can be found in the...

Empowering Frontline Workers: Streamline Device Management For An Enhanced Employee Experience

0

In today's fast-paced world, frontline workers play a vital role in delivering services and products directly to customers. From healthcare providers and retail associates to logistics personnel and customer service representatives, these frontline workers rely on mobile devices to streamline their tasks. To elevate and unleash their full potential, organizations are turning to the power of frontline device management solutions....

TelegramRAT – A Tool To Bypass Restricted Communications

0

A cross-platform Remote Access Tool that operates through Telegram, leveraging the secure messaging app for covert communication. Designed to navigate around network restrictions, TelegramRAT empowers users to remotely control computers, execute commands, retrieve system information, capture screenshots, and more, all while harnessing Telegram's encrypted platform. In this overview, we delve into TelegramRAT's functionality, installation process, and potential implications, shedding...

Autopsy- 4.21.0 Release With Faster Search And Malware Scanning

0

The 4.21 version of Autopsy is out, and this blog post will cover three of the most notable new features.  You can see the full list of changes here. We’re going to cover, Inline Keyword Search Cyber Triage Malware Scanner Module Logical File Timestamps To download the latest version, go here. You can also attend a Webinar on September 12. Register here. Search For Keywords Without Building An...