Saturday, September 26, 2020
Home Tags Network protocols

Tag: network protocols

Must Need

ThreatHunting : A Splunk App Mapped To MITRE ATT&CK

ThreatHunting : A Splunk App Mapped To MITRE ATT&CK

ThreatHunting is a Splunk application containing several dashboards and over 120 reports that will facilitate initial hunting indicators to investigate.
Tarnish : A Chrome Extension Static Analysis Tool

Tarnish : A Chrome Extension Static Analysis Tool

Tarnish is a static-analysis tool to aid researchers in security reviews of Chrome extensions. It automates much of the regular grunt work...
Killcast

Killcast : Manipulate Chromecast Devices in your Network

Killcast manipulate chromecast devices in your network. This tool is a Proof of Concept and is for Research Purposes Only, it shows...
Invisi-Shell

Invisi-Shell : Hide Your Powershell Script In Plain Sight(Bypass all Powershell...

Invisi-Shell is a tool used to hide your powershell script in plain sight! Invisi-Shell bypasses all of Powershell security features (ScriptBlock logging, Module logging,...
Skiptracer

Skiptracer – OSINT Python Webscaping Framework

Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining results. Skiptracer utilizes some...
nmap-bootstrap-xsl

Nmap-Bootstrap-XSL : A Nmap XSL implementation with Bootstrap

Nmap-Bootstrap-XSL is a  Nmap XSL implementation with Bootstrap. Nmap-Bootstrap-XSL Usage Add the nmap-bootstrap.xsl as stylesheet to your Nmap scan. Example: nmap -sS -T4 -A -sC -oA...
BackBox : Tool To Perform Penetration Tests & Security Assessments

BackBox : Tool To Perform Penetration Tests & Security Assessments

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments.