Lupo - Malware IOC Extractor and Debugging module for Malware Analysis Automation
Introduction Working on security incidents that involve malware, we come across situations on a regular basis where we feel the …
Read MoreDDexec - a technique to run binaries filelessly and stealthily on Linux using dd to replace the shell with another process
Context In Linux in order to run a program it must exist as a file, it must be accessible in …
Read MoreADReaper - A fast enumeration tool for Windows Active Directory Pentesting written in Go
ADReaper is a tool written in Golang which enumerates an Active Directory environment with LDAP queries within few seconds Installation You can download …
Read MoreShhhloader - SysWhispers Shellcode Loader
Shhhloader Shhhloader is a SysWhispers Shellcode Loader that is currently a Work in Progress. It takes raw shellcode as input …
Read MoreLive Forensicator - Powershell Script to aid Incidence Response and Live Forensics
___________ .__ __ \_ _____/__________ ____ ____ _____|__| ____ _____ _/ |_ ___________ | __)/ _ \_ __ \_/ __ …
Read MoreSpring4Shell-scan - a fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities
Features Support for lists of URLs. Fuzzing for more than 10 new Spring4Shell payloads (previously seen tools uses only 1-2 …
Read MoreLnkbomb - Malicious shortcut generator for collecting NTLM hashes from insecure file shares
Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The vulnerability exists due to Windows looking for …
Read MoreWindows 10 exploitation with just one image by Anastasis Vasileiadis
Metasploit is the latest in the field of information security and penetration control. It has almost redefined how we can …
Read MoreAccount Takeover Fraud: What You Need to Know
In the 21st century, fraud is a business transferred from offline to online. In recent years, internet users have increased …
Read MoreOstorlab - a composable security scanning platform for all assets
Security testing requires often chaining tools together, taking the output from one, mangling it, filtering it and then pushing it …
Read More