Friday, December 6, 2019
Home Tags TrustedSec

Tag: TrustedSec

Must Need

EKFiddle

EKFiddle – A framework Based On The Fiddler Web Debugger To...

EKFiddle is a framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general. Enable C# scripting (Windows only) Launch...
shellcode-encrypter-decrypter

Shellcode-Encrypter-Decrypter : Shellcode Encrypter & Decrypter by using XOR Cipher

Shellcode-Encrypter-Decrypter is a Shellcode Encrypter & Decrypter, Using XOR Cipher to enc and dec shellcode. Shellcode-Encrypter-Decrypter Installation git clone https://github.com/blacknbunny/Shellcode-Encrypter-Decrypter.git && cd Shellcode-Encrypter-Decrypter/ python enc.py --help Also ReadMunin...
Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics & Threat Hunting

Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics &...

Tylium is a primary data pipelines for intrusion detection, security analytics and threat hunting. These files contain configuration for producing EDR...
A List Of Services & How To Claim Subdomain With Dangling DNS Records

A List Of Services & How To Claim Subdomain With Dangling...

Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed...
Leaked

Leaked 2.0 – A Checking tool for Hash codes, Passwords and...

Leaked 2.0 is A Checking tool for Hash codes and Passwords and Emails leaked, uses leakz module from Aidan Holland, and leakz module uses...
Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting known bypasses. UAC-A-mola has...
Singularity

Singularity – A DNS Rebinding Attack Framework

Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack...