What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Pirate.webp 2024-01-04 23:59:56 Meilleur EDR du marché (Beotm) & # 8211;Outil de détection de point de terminaison et de réponse à la réponse
Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing Tool
(lien direct)
BestDroftheMarket est un outil EDR (détection et réponse de point de terminaison) conçu pour servir de terrain de test
BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) tool designed to serve as a testing ground
Tool ★★★
Pirate.webp 2023-08-31 15:12:57 Agentsmith HIDS & # 8211;Détection d'intrusion basée sur l'hôte
AgentSmith HIDS – Host Based Intrusion Detection
(lien direct)
Agentsmith HIDS est un composant puissant d'un système de détection d'intrusion basé sur l'hôte, il a des fonctionnalités anti-rootkit et est un moyen très performant de collecter des informations sur un hôte.
AgentSmith HIDS is a powerful component of a Host-based Intrusion Detection system, it has anti-rootkit functionalities and is a very performant way to collect information about a host.
★★
Pirate.webp 2023-05-28 15:04:35 Padre & # 8211;Outil de padding Oracle Attack Exploiter
padre – Padding Oracle Attack Exploiter Tool
(lien direct)
Padre est un outil d'attaque Oracle exploiteur et padding avancé qui peut être déployé par rapport au cryptage en mode CBC.
padre is an advanced exploiter and Padding Oracle attack tool that can be deployed against CBC mode encryption.
Tool ★★
Pirate.webp 2023-03-31 13:18:47 Implications de confidentialité de Web 3.0 et DarkNets [Privacy Implications of Web 3.0 and Darknets] (lien direct) L'évolution d'Internet a été rapide au fil des ans et a eu un impact sur les implications de confidentialité de Web 3.0 et DarkNets, de Web 1.0 à Web 2.0, et maintenant à Web 3.0.Le Web 3.0, également connu sous le nom de Web décentralisé, est un réseau de systèmes interconnectés et distribués qui permettent aux utilisateurs d'interagir avec [& # 8230;]
The evolution of the internet has been rapid over the years and has impacted the privacy implications of Web 3.0 and Darknets, from Web 1.0 to Web 2.0, and now to Web 3.0. Web 3.0, also known as the decentralized web, is a network of interconnected and distributed systems that allow users to interact with […]
General Information ★★
Pirate.webp 2023-03-20 16:19:22 DataSurgeon – Extract Sensitive Information (PII) From Logs (lien direct) DataSurgeon (ds) is a versatile tool designed to Extract Sensitive Information (PII) From Logs, it's intended to be used for incident response, penetration testing, and CTF challenges. Tool ★★
Pirate.webp 2023-02-12 14:34:42 Pwnagotchi – Maximize Crackable WPA Key Material For Bettercap (lien direct) Pwnagotchi is an A2C-based "AI" leveraging bettercap that learns from its surrounding WiFi environment to maximize crackable WPA key material it captures Hack ★★★
Pirate.webp 2022-12-29 07:36:08 HardCIDR – Network CIDR and Range Discovery Tool (lien direct) HardCIDR is a Linux Bash script to discover the netblocks, or ranges, (in CIDR notation) owned by the target organization during the intelligence gathering phase of a penetration test. Tool ★★★
Pirate.webp 2022-04-29 17:32:59 Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage (lien direct) Socialscan – Command-Line Tool To Check For Email And Social Media Username Usagesocialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username, socialscan returns whether it is available, taken or invalid on online platforms. Other similar tools check username availability by requesting the profile page of the username in question and based on information like the HTTP status code or error text on the requested page, determine whether a username is already taken. Read the rest of Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage now! Only available at Darknet. Tool
Pirate.webp 2022-01-23 17:15:41 CFRipper – CloudFormation Security Scanning & Audit Tool (lien direct) CFRipper – CloudFormation Security Scanning & Audit ToolCFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool, it aims to prevent vulnerabilities from getting to production infrastructure through vulnerable CloudFormation scripts. You can use CFRipper to prevent deploying insecure AWS resources into your Cloud environment. You can write your own compliance checks by adding new custom plugins. CFRipper should be part of your CI/CD pipeline. It runs just before a CloudFormation stack is deployed or updated and if the CloudFormation script fails to pass the security check it fails the deployment and notifies the team that owns the stack. Read the rest of CFRipper – CloudFormation Security Scanning & Audit Tool now! Only available at Darknet. Tool
Pirate.webp 2022-01-05 09:55:56 CredNinja – Test Credential Validity of Dumped Credentials or Hashes (lien direct) CredNinja – Test Credential Validity of Dumped Credentials or HashesCredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently. At the core of it, you provide it with a list of credentials you have dumped (or hashes, it can pass-the-hash) and a list of systems on the domain (the author suggests scanning for port 445 first, or you can use “–scan”). It will tell you if the credentials you dumped are valid on the domain, and if you have local administrator access to a host. Read the rest of CredNinja – Test Credential Validity of Dumped Credentials or Hashes now! Only available at Darknet. Tool
Pirate.webp 2021-12-29 17:05:47 assetfinder – Find Related Domains and Subdomains (lien direct) assetfinder – Find Related Domains and Subdomainsassetfinder is a Go-based tool to find related domains and subdomains that are potentially related to a given domain from a variety of sources including Facebook, ThreatCrowd, Virustotal and more. assetfinder uses a variety of sources including those in the infosec space and social networks which can give relevant info: crt.sh certspotter hackertarget threatcrowd wayback machine dns.bufferover.run facebook – Needs FB_APP_ID and FB_APP_SECRET environment variables set (https://developers.facebook.com/) and you need to be careful with your app’s rate limits virustotal – Needs VT_API_KEY environment variable set (https://developers.virustotal.com/reference) findsubdomains – Needs SPYSE_API_TOKEN environment variable set (the free version always gives the first response page, and you also get “25 unlimited requests”) — (https://spyse.com/apidocs) Sources to be implemented: http://api.passivetotal.org/api/docs/ https://community.riskiq.com/ (?) https://riddler.io/ http://www.dnsdb.org/ https://certdb.com/api-documentation Usage of assetfinder to Find Related Domains and Subdomains The usage is very simple with only one option basically, to limit the search to subdomains only – by default it will scan for all associated domains and subdomains. Read the rest of assetfinder – Find Related Domains and Subdomains now! Only available at Darknet. Tool
Pirate.webp 2021-08-30 18:53:57 Karkinos – Beginner Friendly Penetration Testing Tool (lien direct) Karkinos – Beginner Friendly Penetration Testing ToolKarkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a ‘Swiss Army Knife’ for pen-testing and/or hacking CTF’s. Karkinos Beginner Friendly Penetration Testing Tool Features Encoding/Decoding characters Encrypting/Decrypting text or files Reverse shell handling Cracking and generating hashes How to Install Karkinos Beginner Friendly Penetration Testing Tool Dependencies are: Any server capable of hosting PHP Tested with PHP 7.4.9 Tested with Python 3.8 Make sure it is in your path as: Windows: python Linux: python3 If it is not, please change the commands in includes/pid.php Pip3 Raspberry Pi Zero friendly :) (crack hashes at your own risk) Then: git clone https://github.com/helich0pper/Karkinos.git cd Karkinos pip3 install -r requirements.txt cd wordlists && unzip passlist.zip You can also unzip it manually using file explorer. Read the rest of Karkinos – Beginner Friendly Penetration Testing Tool now! Only available at Darknet. Tool
Pirate.webp 2021-07-06 16:16:57 Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory (lien direct) Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active DirectoryAclpwn.py is a tool that interacts with BloodHound to identify and exploit ACL based privilege escalation paths. It takes a starting and ending point and will use Neo4j pathfinding algorithms to find the most efficient ACL based privilege escalation path. Features of Aclpwn.Py Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py currently has the following features: Direct integration with BloodHound and the Neo4j graph database (fast pathfinding) Supports any reversible ACL based attack chain (no support for resetting user passwords right now) Advanced pathfinding (Dijkstra) to find the most efficient paths Support for exploitation with NTLM hashes (pass-the-hash) Saves restore state, easy rollback of changes Can be run via a SOCKS tunnel Written in Python (2.7 and 3.5+), so OS independent Installation of Aclpwn.py ACL Based Privilege Escalation Aclpwn.py is compatible with both Python 2.7 and 3.5+. Read the rest of Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory now! Only available at Darknet. Tool
Pirate.webp 2021-05-27 10:57:54 Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack (lien direct) Vulhub – Pre-Built Vulnerable Docker Environments For Learning To HackVulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands and you have a vulnerable environment. Features of Vulhub Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub contains many frameworks, databases, applications, programming languages and more such as: Drupal ffmpeg CouchDB ActiveMQ Glassfish Joombla JBoss Kibana Laravel Rails Python Tomcat And many, many more. Read the rest of Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack now! Only available at Darknet. Hack
Pirate.webp 2021-05-07 14:49:00 LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) (lien direct) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks. SQLi and other injection attacks remain the top OWASP and CERT vulnerability. Current detection attempts frequently involve a myriad of regular expressions which are not only brittle and error-prone but also proven by Hanson and Patterson at Black Hat 2005 to never be a complete solution. LibInjection is a new open-source C library that detects SQLi using lexical analysis. Read the rest of LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) now! Only available at Darknet.
Pirate.webp 2021-04-19 10:11:41 Grype – Vulnerability Scanner For Container Images & Filesystems (lien direct) Grype – Vulnerability Scanner For Container Images & FilesystemsGrype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based operating systems. Features of Grype Vulnerability Scanner For Container Images & Filesystems Scan the contents of a container image or filesystem to find known vulnerabilities and find vulnerabilities for major operating system packages in: Alpine BusyBox CentOS / Red Hat Debian Ubuntu Find vulnerabilities for language-specific packages: Ruby (Bundler) Java (JARs, etc) JavaScript (NPM/Yarn) Python (Egg/Wheel) Python pip/requirements.txt/setup.py listings Supports Docker and OCI image formats Using Grype Vulnerability Scanner For Container Images & Filesystems To scan for vulnerabilities in an image: grype Grype can scan a variety of sources beyond those found in Docker. Read the rest of Grype – Vulnerability Scanner For Container Images & Filesystems now! Only available at Darknet. Vulnerability
Pirate.webp 2021-03-04 17:16:01 APT-Hunter – Threat Hunting Tool via Windows Event Log (lien direct) APT-Hunter – Threat Hunting Tool via Windows Event LogAPT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs. This will help you to decrease the time to uncover suspicious activity and the tool will make good use of the windows event logs collected and make sure to not miss critical events configured to be detected. The target audience for APT-Hunter is threat hunters, incident response professionals or forensic investigators. Read the rest of APT-Hunter – Threat Hunting Tool via Windows Event Log now! Only available at Darknet. Tool Threat
Pirate.webp 2021-02-03 13:13:35 GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials (lien direct) GitLab Watchman – Audit Gitlab For Sensitive Data & CredentialsGitLab Watchman is an application that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally – this includes code, commits, wiki pages and more. GitLab Watchman searches GitLab for internally shared projects and looks at: Code Commits Wiki pages Issues Merge requests Milestones For the following data: GCP keys and service account files AWS keys Azure keys and service account files Google API keys Slack API tokens & webhooks Private keys (SSH, PGP, any other misc private key) Exposed tokens (Bearer tokens, access tokens, client_secret etc.) S3 config files Passwords in plaintext CICD variables exposed publicly and more Using GitLab Watchman to Audit Gitlab For Sensitive Data GitLab Watchman will be installed as a global command, use as follows: usage: gitlab-watchman [-h] --timeframe {d,w,m,a} --output {file,stdout,stream} [--version] [--all] [--blobs] [--commits] [--wiki-blobs] [--issues] [--merge-requests] [--milestones] [--comments] Monitoring GitLab for sensitive data shared publicly optional arguments: -h, --help show this help message and exit --version show program's version number and exit --all Find everything --blobs Search code blobs --commits Search commits --wiki-blobs Search wiki blobs --issues Search issues --merge-requests Search merge requests --milestones Search milestones --comments Search comments required arguments: --timeframe {d,w,m,a} How far back to search: d = 24 hours w = 7 days, m = 30 days, a = all time --output {file,stdout,stream} Where to send results You can run GitLab Watchman to look for everything, and output to default Stdout: gitlab-watchman --timeframe a --all Or arguments can be grouped together to search more granularly. Read the rest of GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials now! Only available at Darknet.
Pirate.webp 2021-01-01 10:59:21 GKE Auditor – Detect Google Kubernetes Engine Misconfigurations (lien direct) GKE Auditor – Detect Google Kubernetes Engine MisconfigurationsGKE Auditor is a Java-based tool to detect Google Kubernetes Engine misconfigurations, it aims to help security and development teams streamline the configuration process and save time looking for generic bugs and vulnerabilities. The tool consists of individual modules called Detectors, each scanning for a specific vulnerability. Installing and Using GKE Auditor to Detect Google Kubernetes Engine Misconfigurations Installation git clone https://github.com/google/gke-auditor cd ./gke-auditor/ ./build.sh Usage The tool has to be built by running the build.sh script first. Read the rest of GKE Auditor – Detect Google Kubernetes Engine Misconfigurations now! Only available at Darknet. Tool Uber
Pirate.webp 2020-12-07 13:15:28 zANTI – Android Wireless Hacking Tool Free Download (lien direct) zANTI – Android Wireless Hacking Tool Free DownloadzANTI is an Android Wireless Hacking Tool that functions as a mobile penetration testing toolkit that lets you assess the risk level of a network using your mobile device for free download. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network. Features of zANTI Android Wireless Hacking Tool This network auditor comes along with a rather simple interface compared to other solutions and running its tasks is pretty straightforward. Read the rest of zANTI – Android Wireless Hacking Tool Free Download now! Only available at Darknet. Tool
Pirate.webp 2020-11-06 10:46:55 HELK – Open Source Threat Hunting Platform (lien direct) HELK – Open Source Threat Hunting PlatformThe Hunting ELK or simply the HELK is an Open-Source Threat Hunting Platform with advanced analytics capabilities such as SQL declarative language, graphing, structured streaming, and even machine learning via Jupyter notebooks and Apache Spark over an ELK stack. This project was developed primarily for research, but due to its flexible design and core components, it can be deployed in larger environments with the right configurations and scalable infrastructure. Goals of HELK Open Source Threat Hunting Platform Provide an open-source hunting platform to the community and share the basics of Threat Hunting. Read the rest of HELK – Open Source Threat Hunting Platform now! Only available at Darknet. Threat
Pirate.webp 2020-11-03 10:03:00 Trape – OSINT Analysis Tool For People Tracking (lien direct) Trape – OSINT Analysis Tool For People TrackingTrape is an OSINT analysis tool, which allows people to track and execute intelligent social engineering attacks in real-time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information. Example types of information are the status of sessions of their websites or services and control their users through their browser, without their knowledge. It has evolved with the aim of helping government organizations, companies and researchers to track the cybercriminals. Read the rest of Trape – OSINT Analysis Tool For People Tracking now! Only available at Darknet. Tool
Pirate.webp 2020-10-22 09:04:37 Fuzzilli – JavaScript Engine Fuzzing Library (lien direct) Fuzzilli – JavaScript Engine Fuzzing LibraryFuzzilii is a JavaScript engine fuzzing library, it's a coverage-guided fuzzer for dynamic language interpreters based on a custom intermediate language (“FuzzIL”) which can be mutated and translated to JavaScript. When fuzzing for core interpreter bugs, e.g. in JIT compilers, semantic correctness of generated programs becomes a concern. This is in contrast to most other scenarios, e.g. fuzzing of runtime APIs, in which case semantic correctness can easily be worked around by wrapping the generated code in try-catch constructs. Read the rest of Fuzzilli – JavaScript Engine Fuzzing Library now! Only available at Darknet.
Pirate.webp 2020-10-13 10:38:41 OWASP APICheck – HTTP API DevSecOps Toolset (lien direct) OWASP APICheck – HTTP API DevSecOps ToolsetAPICheck is an HTTP API DevSecOps toolset, it integrates existing HTTP APIs tools, creates execution chains easily and is designed for integration with third-party tools in mind. APICheck is comprised of a set of tools that can be connected to each other to achieve different functionalities, depending on how they are connected. It allows you to create execution chains and it can not only integrate self-developed tools but also can leverage existing tools in order to take advantage of them to provide new functionality. Read the rest of OWASP APICheck – HTTP API DevSecOps Toolset now! Only available at Darknet.
Pirate.webp 2020-10-07 04:18:46 trident – Automated Password Spraying Tool (lien direct) trident – Automated Password Spraying ToolThe Trident project is an automated password spraying tool developed to be deployed across multiple cloud providers and provides advanced options around scheduling and IP pooling. trident was designed and built to fulfill several requirements and to provide: the ability to be deployed on several cloud platforms/execution providers the ability to schedule spraying campaigns in accordance with a target's account lockout policy the ability to increase the IP pool that authentication attempts originate from for operational security purposes the ability to quickly extend functionality to include newly-encountered authentication platforms Using trident Password Spraying Tool Usage: trident-cli campaign [flags] Flags: -a, --auth-provider string this is the authentication platform you are attacking (default "okta") -h, --help help for campaign -i, --interval duration requests will happen with this interval between them (default 1s) -b, --notbefore string requests will not start before this time (default "2020-09-09T22:31:38.643959-05:00") -p, --passfile string file of passwords (newline separated) -u, --userfile string file of usernames (newline separated) -w, --window duration a duration that this campaign will be active (ex: 4w) (default 672h0m0s) Example output: $ trident-client results +----+-------------------+------------+-------+ | ID | USERNAME | PASSWORD | VALID | +----+-------------------+------------+-------+ | 1 | alice@example.org | Password1! Read the rest of trident – Automated Password Spraying Tool now! Only available at Darknet. Tool
Pirate.webp 2020-09-23 17:13:02 tko-subs – Detect & Takeover Subdomains With Dead DNS Records (lien direct) tko-subs – Detect & Takeover Subdomains With Dead DNS Recordstko-subs is a tool that helps you to detect & takeover subdomains with dead DNS records, this could be dangling CNAMEs point to hosting services or to nothing at all or NS records that are mistyped. What does tko-subs – Detect & Takeover Subdomains With Dead DNS Records Do? This tool allows you: To check whether a subdomain can be taken over because it has: a dangling CNAME pointing to a CMS provider (Heroku, Github, Shopify, Amazon S3, Amazon CloudFront, etc.) that can be taken over. Read the rest of tko-subs – Detect & Takeover Subdomains With Dead DNS Records now! Only available at Darknet. Tool
Pirate.webp 2020-08-17 08:03:23 Arcane – Tool To Backdoor iOS Packages (iPhone ARM) (lien direct) Arcane – Tool To Backdoor iOS Packages (iPhone ARM)Arcane is a simple script tool to backdoor iOS packages (iPhone ARM) and create the necessary resources for APT repositories. It was created to help illustrate why Cydia repositories can be dangerous and what post-exploitation attacks are possible from a compromised iOS device. How Arcane Tool To Backdoor iOS Package Works It's possible to supply scripts as part of a package when installing or removing applications. Package maintainer scripts include the preinst, postinst, prerm, and postrm files. Read the rest of Arcane – Tool To Backdoor iOS Packages (iPhone ARM) now! Only available at Darknet. Tool
Pirate.webp 2020-07-27 14:50:13 SharpHose – Asynchronous Password Spraying Tool (lien direct) SharpHose – Asynchronous Password Spraying ToolSharpHose is an asynchronous password spraying tool in C# for Windows environments that takes into consideration fine-grained password policies and can be run over Cobalt Strike's execute-assembly. It provides a flexible way to interact with Active Directory using domain-joined and non-joined contexts, while also being able to target specific domains and domain controllers. The tool takes into consideration the domain password policy, including fine-grained password policies, in an attempt to avoid account lockouts. Read the rest of SharpHose – Asynchronous Password Spraying Tool now! Only available at Darknet. Tool
Pirate.webp 2020-07-06 19:09:32 Axiom – Pen-Testing Server For Collecting Bug Bounties (lien direct) Axiom – Pen-Testing Server For Collecting Bug BountiesProject Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty, basically a pen-testing server out of the box with 1-line. With Axiom, you just need to run a single command to get setup, and then you can use the Axiom toolkit scripts to spin up and down your new hacking VPS. Setting up your own 'hacking vps', to catch shells, run enumeration tools, scan, let things run in the background in a tmux window, used to be an afternoon project – running into a whole day sometimes if you hit some package isues or 'dependency hell'. Read the rest of Axiom – Pen-Testing Server For Collecting Bug Bounties now! Only available at Darknet. APT 17
Pirate.webp 2020-05-27 17:41:21 Quasar RAT – Windows Remote Administration Tool (lien direct) Quasar RAT – Windows Remote Administration ToolQuasar is a fast and light-weight Windows remote administration tool coded in C#. The usage ranges from user support through day-to-day administrative work to employee monitoring. It aims to provide high stability and an easy-to-use user interface and is a free, open source tool. Features of Quasar RAT Windows Remote Administration Tool The main features that can be found in Quasar are: TCP network stream (IPv4 & IPv6 support) Fast network serialization (Protocol Buffers) Compressed (QuickLZ) & Encrypted (TLS) communication UPnP Support Task Manager File Manager Startup Manager Remote Desktop Remote Shell Remote Execution System Information Registry Editor System Power Commands (Restart, Shutdown, Standby) Keylogger (Unicode Support) Reverse Proxy (SOCKS5) Password Recovery (Common Browsers and FTP Clients) Using Quasar Windows Remote Administration Tool 1. Read the rest of Quasar RAT – Windows Remote Administration Tool now! Only available at Darknet. Tool
Pirate.webp 2020-05-18 16:56:26 Pingcastle – Active Directory Security Assessment Tool (lien direct) Pingcastle – Active Directory Security Assessment ToolPingCastle is a Active Directory Security Assessment Tool designed to quickly assess the Active Directory security level with a methodology based on a risk assessment and maturity framework. It does not aim at a perfect evaluation but rather as an efficiency compromise. The risk level regarding Active Directory security has changed. Several vulnerabilities have been made popular with tools like mimikatz or sites likes adsecurity.org. CMMI is a well known methodology from the Carnegie Mellon university to evaluate the maturity with a grade from 1 to 5, PingCastle has adapated CMMI to Active Directory security. Read the rest of Pingcastle – Active Directory Security Assessment Tool now! Only available at Darknet. Tool
Pirate.webp 2020-04-30 14:46:33 Second Order – Subdomain Takeover Scanner Tool (lien direct) Second Order – Subdomain Takeover Scanner ToolSecond Order Subdomain Takeover Scanner Tool scans web applications for second-order subdomain takeover by crawling the application and collecting URLs (and other data) that match specific rules or respond in a specific way. Using Second Order Subdomain Takeover Scanner Tool Command line options: -base string Base link to start scraping from (default "http://127.0.0.1") -config string Configuration file (default "config.json") -debug Print visited links in real-time to stdout -output string Directory to save results in (default "output") Example: go run second-order.go -base https://example.com -config config.json -output example.com -concurrency 10 Config File for Second Order Subdomain Takeover Scanner Tool Example configuration file included (config.json) Headers: A map of headers that will be sent with every request. Read the rest of Second Order – Subdomain Takeover Scanner Tool now! Only available at Darknet. Tool
Pirate.webp 2020-04-14 16:14:56 Binwalk – Firmware Security Analysis & Extraction Tool (lien direct) Binwalk – Firmware Security Analysis & Extraction ToolBinwalk is a fast and easy to use Python-based firmware security analysis tool that allows for firmware analysis, reverse engineering, and extraction of firmware images. Features of Binwalk Firmware Security Analysis & Extraction Tool Scanning Firmware – Binwalk can scan a firmware image for many different embedded file types and file systems File Extraction – You can tell binwalk to extract any files that it finds in the firmware image Entropy Analysis – Can help identify interesting sections of data inside a firmware image String Search – Allows you to search the specified file(s) for a custom string There are also various filters such as by CPU architecture, number of instructions, include filter, exclude filter, Installation of Binwalk Firmware Security Analysis & Extraction Tool Download binwalk: $ wget https://github.com/ReFirmLabs/binwalk/archive/master.zip $ unzip master.zip Install binwalk; if you have a previously installed version of binwalk, it is suggested that you uninstall it before upgrading: $ (cd binwalk-master && sudo python setup.py uninstall && sudo python setup.py install) Debian users can install all optional and suggested extractors/dependencies using the included deps.sh script (recommended): $ sudo ./binwalk-master/deps.sh If you are not a Debian user, or if you wish to install only selected dependencies, see the INSTALL documentation for more details. Read the rest of Binwalk – Firmware Security Analysis & Extraction Tool now! Only available at Darknet. Tool
Pirate.webp 2020-03-31 15:20:31 zBang – Privileged Account Threat Detection Tool (lien direct) zBang –  Privileged Account Threat Detection ToolzBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations and red teamers can utilize zBang to identify potential attack vectors and improve the security posture of the network. The results can be analyzed with the graphic interface or by reviewing the raw output files. The tool is built from five different scanning modules: ACLight scan – discovers the most privileged accounts that must be protected, including suspicious Shadow Admins. Read the rest of zBang – Privileged Account Threat Detection Tool now! Only available at Darknet. Tool Threat
Pirate.webp 2020-03-29 07:14:18 Memhunter – Automated Memory Resident Malware Detection (lien direct) Memhunter – Automated Memory Resident Malware DetectionMemhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving the threat hunter analysis process and remediation times. It's a self contained binary that can be deployed and managed at scale, does not use memory dumps and relies purely on memory inspection to do its work. It also does not require any complex infrastructure to deploy. The tool was designed as a replacement of memory forensic volatility plugins such as malfind and hollowfind. Read the rest of Memhunter – Automated Memory Resident Malware Detection now! Only available at Darknet. Malware Tool Threat
Pirate.webp 2020-03-24 15:48:52 Sandcastle – AWS S3 Bucket Enumeration Tool (lien direct) Sandcastle – AWS S3 Bucket Enumeration ToolSandcastle is a Python-based Amazon AWS S3 Bucket Enumeration Tool, formerly known as bucketCrawler. The script takes a target's name as the stem argument (e.g. shopify) and iterates through a file of bucket name permutations. Amazon S3 [Simple Storage Service] is cloud storage for the Internet. To upload your data (photos, videos, documents etc.), you first create a bucket in one of the AWS Regions. You can then upload any number of objects to the bucket. Read the rest of Sandcastle – AWS S3 Bucket Enumeration Tool now! Only available at Darknet. Tool
Pirate.webp 2020-02-26 16:36:00 Astra – API Automated Security Testing For REST (lien direct) Astra – API Automated Security Testing For RESTAstra is a Python-based tool for API Automated Security Testing, REST API penetration testing is complex due to continuous changes in existing APIs and newly added APIs. Astra can be used by security engineers or developers as an integral part of their process, so they can detect and patch vulnerabilities early during development cycle. Astra can automatically detect and test login & logout (Authentication API), so it's easy for anyone to integrate this into CI/CD pipeline. Read the rest of Astra – API Automated Security Testing For REST now! Only available at Darknet. Tool
Pirate.webp 2020-02-19 15:22:49 Judas DNS – Nameserver DNS Poisoning Attack Tool (lien direct) Judas DNS – Nameserver DNS Poisoning Attack ToolJudas DNS is a Nameserver DNS Poisoning Attack Tool which functions as a DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation. Judas works by proxying all DNS queries to the legitimate nameservers for a domain. The magic comes with Judas's rule configurations which allow you to change DNS responses depending on source IP or DNS query type. This allows an attacker to configure a malicious nameserver to do things like selectively re-route inbound email coming from specified source IP ranges (via modified MX records), set extremely long TTLs to keep poisoned records cached, and more. Read the rest of Judas DNS – Nameserver DNS Poisoning Attack Tool now! Only available at Darknet. Tool
Pirate.webp 2020-02-14 14:46:40 dsniff Download – Tools for Network Auditing & Password Sniffing (lien direct) dsniff Download – Tools for Network Auditing & Password SniffingDsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network for interesting data (passwords, e-mail, files, etc.). ARPspoof, DNSspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI. Read the rest of dsniff Download – Tools for Network Auditing & Password Sniffing now! Only available at Darknet.
Pirate.webp 2020-02-10 14:05:43 OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery (lien direct) OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset DiscoveryThe OWASP Amass Project is a DNS Enumeration, Attack Surface Mapping & External Asset Discovery tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. Information Gathering Techniques Used by OWASP Amass for DNS Enumeration and More The main functionality of Amass is as follows: DNS: Basic enumeration, Brute forcing (optional), Reverse DNS sweeping, Subdomain name alterations/permutations, Zone transfers (optional) Scraping: Ask, Baidu, Bing, DNSDumpster, DNSTable, Dogpile, Exalead, Google, HackerOne, IPv4Info, Netcraft, PTRArchive, Riddler, SiteDossier, ViewDNS, Yahoo Certificates: Active pulls (optional), Censys, CertSpotter, Crtsh, Entrust, GoogleCT APIs: AlienVault, BinaryEdge, BufferOver, CIRCL, CommonCrawl, DNSDB, GitHub, HackerTarget, IPToASN, Mnemonic, NetworksDB, PassiveTotal, Pastebin, RADb, Robtex, SecurityTrails, ShadowServer, Shodan, Spyse (CertDB & FindSubdomains), Sublist3rAPI, TeamCymru, ThreatCrowd, Twitter, Umbrella, URLScan, VirusTotal, WhoisXML Web Archives: ArchiveIt, ArchiveToday, Arquivo, LoCArchive, OpenUKArchive, UKGovArchive, Wayback Usage of Amass for DNS Enumeration, Attack Surface Mapping & External Asset Discovery The Amass tool has several subcommands shown below for handling your Internet exposure investigation. Read the rest of OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery now! Only available at Darknet. Tool Guideline Yahoo
Pirate.webp 2020-01-29 09:27:23 Cameradar – Hack RTSP Video Surveillance CCTV Cameras (lien direct) Cameradar – Hack RTSP Video Surveillance CCTV CamerasCameradar is a Go-based tool to hack RTSP Video Surveillance CCTV Cameras, it can detect open RTSP hosts, detect device models and launch automated attacks. The main features of Cameradar are: Detect open RTSP hosts on any accessible target host Detect which device model is streaming Launch automated dictionary attacks to get their stream route (e.g.: /live.sdp) Launch automated dictionary attacks to get the username and password of the cameras Retrieve a complete and user-friendly report of the results Using Cameradar to Hack RTSP Video Cameras "-t, --targets": Set target. Read the rest of Cameradar – Hack RTSP Video Surveillance CCTV Cameras now! Only available at Darknet. Hack Tool
Pirate.webp 2020-01-15 10:11:53 dSploit APK Download – Hacking & Security Toolkit For Android (lien direct) dSploit APK Download – Hacking & Security Toolkit For AndroiddSploit APK Download is a Hacking & Security Toolkit For Android which can conduct network analysis and penetration testing activities. It aims to offer to IT security experts the most complete and advanced professional toolkit to perform network security assessments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many TCP protocols, perform man in the middle (MiTM) attacks such as password sniffing (with common protocols dissection), real-time traffic manipulation and more. Read the rest of dSploit APK Download – Hacking & Security Toolkit For Android now! Only available at Darknet.
Pirate.webp 2020-01-09 16:16:14 Scallion – GPU Based Onion Hash Generator (lien direct) Scallion – GPU Based Onion Hash GeneratorScallion is a GPU-driven Onion Hash Generator written in C#, it lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL. Scallion runs on Mono (tested in Arch Linux) and .NET 3.5+ (tested on Windows 7 and Server 2008) Scallion was used to find collisions for every 32bit key id in the Web of Trust's strong set demonstrating how insecure 32bit key ids are. Read the rest of Scallion – GPU Based Onion Hash Generator now! Only available at Darknet.
Pirate.webp 2019-12-19 15:06:54 WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords (lien direct) WiFi-Dumper – Dump WiFi Profiles and Cleartext PasswordsWiFi-Dumper is an open-source Python-based tool to dump WiFi profiles and cleartext passwords of the connected access points on a Windows machine. This tool will help you in a Wifi penetration testing and could also be useful when performing red team assessments or internal infrastructure engagements. Each option in the tool generates the “.txt” file as an output, if you run the tool multiple times, the output gets appended to the previous results. Read the rest of WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords now! Only available at Darknet. Tool
Pirate.webp 2019-12-02 07:09:50 truffleHog – Search Git for High Entropy Strings with Commit History (lien direct) truffleHog – Search Git for High Entropy Strings with Commit HistorytruffleHog is a Python-based tool to search Git for high entropy strings, digging deep into commit history and branches. This is effective at finding secrets accidentally committed. truffleHog previously functioned by running entropy checks on git diffs. This functionality still exists, but high signal regex checks have been added, and the ability to surpress entropy checking has also been added. truffleHog --regex --entropy=False https://github.com/dxa4481/truffleHog.git or truffleHog file:///user/dxa4481/codeprojects/truffleHog/ truffleHog will go through the entire commit history of each branch, and check each diff from each commit, and check for secrets. Read the rest of truffleHog – Search Git for High Entropy Strings with Commit History now! Only available at Darknet. Tool
Pirate.webp 2019-11-25 14:05:03 AIEngine – AI-driven Network Intrusion Detection System (lien direct) AIEngine – AI-driven Network Intrusion Detection SystemAIEngine is a next-generation interactive/programmable Python/Ruby/Java/Lua and Go AI-driven Network Intrusion Detection System engine with capabilities of learning without any human intervention, DNS domain classification, Spam detection, network collector, network forensics and many others. AIEngine also helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on. Functionality of AIEngine AI-driven Network Intrusion Detection System The main functionalities of AIEngine are: Support for interacting/programing with the user while the engine is running. Read the rest of AIEngine – AI-driven Network Intrusion Detection System now! Only available at Darknet. Spam
Pirate.webp 2019-11-01 15:21:01 Sooty – SOC Analyst All-In-One CLI Tool (lien direct) Sooty – SOC Analyst All-In-One CLI ToolSooty is a tool developed with the task of aiding a SOC analyst to automate parts of their workflow and speed up their process. The main goal of Sooty is to perform as much of the routine checks as possible which allows the analyst more time to spend on deeper analysis. Features of Sooty SOC Analyst CLI Tool Sanitise URL's to be safe to send in emails Perform reverse DNS and DNS lookups Perform reputation checks from: VirusTotal BadIP's Abuse IPDB Check if an IP address is a TOR exit node Decode Proofpoint URL's, UTF-8 encoded URLS, Office SafeLink URL's and Base64 Strings Get file hashes and compare them against VirusTotal (see requirements) Perform WhoIs Lookups Check Usernames and Emails against HaveIBeenPwned to see if a breach has occurred. Read the rest of Sooty – SOC Analyst All-In-One CLI Tool now! Only available at Darknet. Tool
Pirate.webp 2019-10-23 17:34:10 UBoat – Proof Of Concept PoC HTTP Botnet Project (lien direct) UBoat – Proof Of Concept PoC HTTP Botnet ProjectUBoat is a PoC HTTP Botnet designed to replicate a full weaponised commercial botnet like the famous large scale infectors Festi, Grum, Zeus and SpyEye. Reviews of popular botnets have shown HTTP-based botnets have a set of attributes that make it difficult for them to be detected. On the other hand, the number of studies focusing on the detection of HTTP-based botnets is relatively low (compared to the number of those on IRC-based and P2P botnets) especially in the HTTP-based mobile botnets which operate on the mobile devices and networks. Read the rest of UBoat – Proof Of Concept PoC HTTP Botnet Project now! Only available at Darknet. Studies
Pirate.webp 2019-10-07 07:46:46 LambdaGuard – AWS Lambda Serverless Security Scanner (lien direct) LambdaGuard –  AWS Lambda Serverless Security ScannerLambdaGuard is a tool which allows you to visualise and audit the security of your serverless assets, an open-source AWS Lambda Serverless Security Scanner. AWS Lambda is an event-driven, serverless computing platform provided by Amazon Web Services. It is a computing service that runs code in response to events and automatically manages the computing resources required by that code. LambdaGuard is an AWS Lambda auditing tool designed to create asset visibility and provide actionable results. Read the rest of LambdaGuard – AWS Lambda Serverless Security Scanner now! Only available at Darknet. Tool
Pirate.webp 2019-09-23 05:59:19 exe2powershell – Convert EXE to BAT Files (lien direct) exe2powershell – Convert EXE to BAT Filesexe2powershell is used to convert EXE to BAT files, the previously well known tool for this was exe2bat, this is a version for modern Windows. This will convert any binary file (*.exe) to a BAT file, the resulting BAT file contains only echo commands followed by a PowerShell command to re-create the original binary file. This kind of tool can be useful during a pen-test when you want to trigger a shell without any upload feature. Read the rest of exe2powershell – Convert EXE to BAT Files now! Only available at Darknet. Tool
Last update at: 2024-04-19 00:07:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter