Sunday, December 15, 2019
Home Tags ISeeYou

Tag: ISeeYou

Must Need

Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
PESTO – PE (Files) Statistical Tool

PESTO – PE (Files) Statistical Tool

PESTO is a Python script that extracts and saves in a database some PE file security characteristics or flags searching for every...
SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To Run Command

SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To...

SCShell is a fileless lateral movement tool that relies on ChangeServiceConfigA to run commands. The beauty of this tool is that it...
RDPScan : A Quick Scanner For “BlueKeep”  Vulnerability

RDPScan : A Quick Scanner For “BlueKeep” Vulnerability

RDPScan is a quick-and-dirty scanner for the CVE-2019-0708 vulnerability in Microsoft Remote Desktop. Right now, there are about 900,000 machines on the...
Decker

Decker : Declarative Penetration Testing Orchestration Framework

Decker is a penetration testing orchestration framework. It leverages HashiCorp Configuration Language 2 (the same config language as Terraform) to allow declarative...
Mercure

Mercure – Tool For Security Managers Who Want To Train Their...

Mercure is a tool for security managers who want to train their colleague to phishing. What Mercure can do: Create email templates Create target lists ...
RiskySPN

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing...

RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue...