Kconfig-Hardened-Check – A Tool For Checking The Hardening Options In The Linux Kernel Config
MotivationThere are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major distros....
MotivationThere are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major distros....
Joern's Documentation is available here: https://docs.joern.io/home Quick Installationwget https://github.com/ShiftLeftSecurity/joern/releases/latest/download/joern-install.shchmod +x ./joern-install.shsudo ./joern-install.shjoernCompiling (synthetic)/ammonite/predef/interpBridge.scCompiling (synthetic)/ammonite/predef/replBridge.scCompiling (synthetic)/ammonite/predef/DefaultPredef.scCompiling /home/tmp/shiftleft/joern/(console) ██╗ ██████╗ ███████╗██████╗ ███╗...
This tool implements a userland exploit that was initially discussed by James Forshaw (a.k.a. @tiraniddo) - in this blog post...
This is a GUI for Volatility forensics tool written in PyQT5Prerequisites:1- Installed version of Volatility. 2- Install PyQT5. sudo apt-get...
aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely. The current version...
Gundog provides you with guided hunting in Microsoft 365 Defender. Especially (if not only) for Email and Endpoint Alerts at...
New technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services...
Automated Attack Path Planning and Validation (A2P2V) is a planning and cyber-attack tool that provides the capability for users to...
Defenseless is a vulnerable web application written in PHP/MySQL. This is the first version of this application. The purpose of...
Project DescriptionThe redpill project aims to assist reverse tcp shells in post-exploration tasks. Often in redteam engagements we need to...
_______ _______ _ ______ _______ ( ____ ( ____ ( ( /|( __ ( ____ )| ( /| ( /|...
The easiest way to identify anythingpip3 install pywhat && pywhat --helpWhat is this? Imagine this: You come across some mysterious...
Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is build with modules for each provider and each...
iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the...
Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external...
Cyber Range deployment of HELK and Velociraptor! Automated terraform deployment of one system running HELK + Velociraptor server with one...
A framework that aids in creation of self-spreading software Requirementsgo get -u github.com/redcode-labs/Coldfire go get -u github.com/yelinaung/go-haikunator New in v....
SQL / SQLI tokenizer parser analyzer. For C and C++ PHP Python Lua Java (external port) (https://github.com/p0pr0ck5/lua-ffi-libinjection) (external port) See...
A Red Team oriented simple HTTP & WebDAV server written in C# with functionality to capture Net-NTLM hashes. To be...
The ultimate scope gathering tool for HackerOne, Bugcrowd, and Intigriti by sw33tLie. Need to grep all the large scope domains...
Golang malware development framework IntroductionColdFire provides various methods useful for malware development in Golang. Most functions are compatible with both...
link is a command and control framework written in rust. Currently in beta. Introductionlink provides MacOS, Linux and Windows implants...
Some people change their SSH port on their servers so that it is slightly harder to find for bots or...
RedWarden - Flexible CobaltStrike Malleable Redirector(previously known as proxy2's malleable_redirector plugin) Let's raise the bar in C2 redirectors IR resiliency,...