Remote Desktop Caching : Tool To Recover Old RDP

Remote Desktop Caching tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis. These PNG files allows Red Team member to extract juicy information …

Archery – Open Source Vulnerability Assessment & Management Helps Developers & Pentesters To Perform Scans & Manage Vulnerabilities

Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. It uses popular opensource tools to perform comprehensive scanning for web application and network. Archery Requirement Python 2.7 OpenVas 8, 9 OWASP ZAP 2.7.0 Selenium Python Firefox Web driver Start Application $ python manage.py runserver …

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find vulnerability in your website or you can use this tool to Get Shells, Sends, Deface, cPanels & Databases. Currently tol is supported by CMS like WordPress, Joomla, Drupal, PrestaShop, and LokoMedia. Also Read Blind-Bash : Project …

Remote-Desktop-Caching : Recover Old RDP (MSTSC) Session Information In The Form Of Broken PNG Files

Remote-Desktop-Caching tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a …

Win-PortFwd : Powershell Script To Setup Windows Port Forwarding Using Native Netsh Client

Win-PortFwd is a powershell script to setup windows port forwarding using native netsh client. Installation git clone https://github.com/deepzec/Win-PortFwd.git Win-PortFwd Usage .\win-portfwd.ps1 or powershell.exe -noprofile -executionpolicy bypass -file .\win-portfwd.ps1 Also Read MacSubstrate – Tool For Interprocess Code Injection On macOS Example : Note: This script require admin privileges to run, this script will automatically try to elevate …

WindowsSpyBlocker – Block Spying & Tracking On Windows

WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach of this application is to capture and analyze network traffic based on a set of tools. Configuration file app.conf is generated at first launch :         Also Read Shodanwave …

Camelishing – Social Engineering Tool

Camelishing is a Social Engineering tool with the features like Bulk email sending, Basic Python Agent Creator, Office Excel Macro Creator, DDE Excel Creator(or Custom Payload), Return İnformation, Mail Open Track,Agent Open Track, AutoSave, Statistics Report and User Control. Camelishing is supported in windows 7 and 10. Camelishing Installation $ pip install -r requirements.txt $ …

Log-killer : Clear All Your Logs In Linux & Windows Servers

Log-killer clear all your logs in linux and windows servers. Just download the tool and run it on the server. If your server OS is Windows then download the batch file and run it as administrator. But if your server Linux and then you should run the php script. Also Read Unicorn – Downgrade Attack & …

Blackbone – Memory Hacking Library For Windows

Blackbone is a tool used to hack windows memory library. Blackbone is licensed under the MIT License.  Features Of Blackbone Process interaction Manage PEB32/PEB64 Manage process through WOW64 barrier Process Memory Allocate and free virtual memory Change memory protection Read/Write virtual memory Also Read BLEAH – A BLE Scanner For SMART Devices Hacking Process modules Enumerate …

BeRoot – Tool To Check Common Windows Mis-configurations

BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It will be added to the pupy project as a post exploitation module (so it will be executed in memory without touching the disk). Except one method, this tool is only used to detect and not …