Pinacolada – Wireless Intrusion Detection System For Hak5’s WiFi Coconut
Pinacolada looks for typical IEEE 802.11 attacks and then informs you about them as quickly as possible. All this with...
Pinacolada looks for typical IEEE 802.11 attacks and then informs you about them as quickly as possible. All this with...
Discover hidden debugging parameters and uncover web application secrets with debugHunter. This Chrome extension scans websites for debugging parameters and...
The security of mobile devices has become a critical concern due to the increasing amount of sensitive data being stored...
CertWatcher is a tool for capturing and tracking certificate transparency logs, using YAML templates. The tool helps detect and analyze...
Reportly is an AzureAD user activity report tool. About the tool This is a tool that will help blue teams...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
PoC Implementation of a fully dynamic call stack spoofer TL;DR SilentMoonwalk is a PoC implementation of a fully dynamic call...
WindowSpy is a Cobalt Strike Beacon Object File meant for targetted user surveillance. The goal of this project was to...
A multi-purpose toolkit for gathering and managing OSINT-Data with a neat web-interface. Introduction Seekr is a multi-purpose toolkit for gathering...
Grepmarx is a web application providing a single platform to quickly understand, analyze and identify vulnerabilities in possibly large and...
Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files...
Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a...
This tool is a command line utility that allows you to convert any binary file into a QRcode GIF. The...
Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data. It is useful both for...
apk.sh is a Bash script that makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding...
Cloud Exploit Framework Usage python3 tc.py -h _______ _ _ _____ _ _ |__ __| | | | / ____|...
fingerprintx is a utility similar to httpx that also supports fingerprinting services like as RDP, SSH, MySQL, PostgreSQL, Kafka, etc....
WAF bypass Tool is an open source tool to analyze the security of any WAF for False Positives and False...
MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner....
What is it? The Short A web application that assists network defenders, analysts, and researchers in the process of mapping...
CMLoot was created to easily find interesting files stored on System Center Configuration Manager (SCCM/CM) SMB shares. The shares are...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, discovery, persistence, ransomware, spyware, stealerMD5: 8c17dca7ea605fc37a624331ac72e65eSHA1: 71ca72354c3d42866992a9b6620067cf898909eeANALYSIS DATE: 2023-04-01T15:01:35ZTTPS: T1053, T1005, T1081, T1012,...
Score: 6 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: e0db5819c325375bfde35df5b1463e51SHA1: 265663bb1ce19366ea1695f40d9e028ddde14528ANALYSIS DATE: 2023-04-01T15:36:05ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...
Score: 10 MALWARE FAMILY: redlineTAGS:family:redline, discovery, infostealer, persistence, ransomware, spyware, stealer, upxMD5: 4265a75ed0df6c5675761d1e1d2a5e26SHA1: 345bab81cfe571f9505c52ca001dc015c66b09bdANALYSIS DATE: 2023-04-01T15:29:17ZTTPS: T1060, T1005, T1081, T1112,...