Aws-Security-Assessment-Solution – An AWS Tool To Help You Create A Point In Time Assessment Of Your AWS Account

Aws-Security-Assessment-Solution is an AWS tool to help you create a point in time assessment of your AWS account using Prowler and Scout as well as optional AWS developed ransomware checks. Self-Service Security Assessment tool Cybersecurity remains a very important topic and point of concern for many CIOs, CISOs, and their customers. To meet these important […]

February 27, 2023
Read More >>

Monomorph : MD5-Monomorphic Shellcode Packer

Monomorph is a MD5-Monomorphic Shellcode Packer – all payloads have the same MD5 hash. What does it do? It packs up to 4KB of compressed shellcode into an executable binary, near-instantly. The output file will always have the same MD5 hash: 3cebbe60d91ce760409bbe513593e401 Currently, only Linux x86-64 is supported. It would be trivial to port this […]

February 26, 2023
Read More >>

Sandfly-Entropyscan : Entropy Scanner For Linux To Detect Packed / Encrypted Binaries Related To Malware

Sandfly-Entropyscan is an Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes. Sandfly-Entropyscan is a utility to quickly scan files or running processes and report on their entropy (measure of randomness) and if they are a Linux/Unix ELF type […]

February 25, 2023
Read More >>

DFShell : The Best Forwarded Shell

D3Ext’s Forwarded Shell is a python3 script which use mkfifo to simulate a shell into the victim machine. It creates a hidden directory in /dev/shm/.fs/ and there are stored the fifos. You can even have a tty over a webshell. In case you want a good webshell with code obfuscation, login panel and more functions […]

February 25, 2023
Read More >>

Dc-sonar : Functionality For Analyzing AD Domains For Security Risks Related To Accounts

The DC Sonar Community provides functionality for analyzing AD domains for security risks related to accounts. Repositories The project consists of repositories: Disclaimer It’s only for education purposes. Avoid using it on the production Active Directory (AD) domain. Neither contributor incur any responsibility for any using it. Social media Check out our Red Team community […]

February 23, 2023
Read More >>

THE YARALYZER : Visually Inspect And Force Decode YARA And Regex Matches Found In Binary DATA And Text Data, With Colors

THE YARALYZER visually inspect all of the regex matches (and their sexier, more cloak and dagger cousins, the YARA matches) found in binary data and/or text. See what happens when you force various character encodings upon those matched bytes. With colors. Quick Start pipx install yaralyzer # Scan against YARA definitions in a file: yaralyze […]

February 23, 2023
Read More >>

SSTImap : Penetration Testing Tool For SSTI Detection And Exploitation

SSTImap is a penetration testing software that can check websites for Code Injection and Server-Side Template Injection vulnerabilities and exploit them, giving access to the operating system itself. This tool was developed to be used as an interactive penetration testing tool for SSTI detection and exploitation, which allows more advanced exploitation. Sandbox break-out techniques came […]

February 22, 2023
Read More >>

BlueHound : Tool That Helps Blue Teams Pinpoint The Security Issues

BlueHound is an open-source tool that helps blue teams pinpoint the security issues that actually matter. By combining information about user permissions, network access and unpatched vulnerabilities, BlueHound reveals the paths attackers would take if they were inside your networkIt is a fork of NeoDash, reimagined, to make it suitable for defensive security purposes. To […]

February 21, 2023
Read More >>

GUAC: Graph for Understanding Artifact Composition

GUAC represents Graph for Understanding Artifact Composition. Note: GUAC is under active development – if you are interested in contributing, please look at contributor guide and the “express interest” issue Graph for Understanding Artifact Composition (GUAC) aggregates software security metadata into a high fidelity graph database—normalizing entity identities and mapping standard relationships between them. Querying […]

February 21, 2023
Read More >>