PRINT
PRINT
SEND MAIL
SEND MAIL

Month: May 2020

Kali LinuxNEW TOOLSKaliDiscoveryPenetration TestScrapingBingSearch EngineScraperOSINT ReconnaissanceDiscover SubdomainsBing-Ip2HostsDiscover Hostnames

Bing-Ip2Hosts – Bingip2Hosts Is A Bing.com Web Scraper That Discovers Websites By IP Address

Bing-ip2hosts is a Bing.com web scraper to discover hostnames by IP address.DescriptionBing-ip2hosts is a Bing.com web scraper that discovers hostnames by IP address. Bing is the flagship Microsoft search engine formerly known as MSN Search and Live Search.It provides a feature unique to search engines - it allows searching by IP address. Bing-ip2hosts uses this feature.It can be used to discover subdomains and other related domains. It also helps to identify websites hosted in a shared hosting environment. This technique follows best practices during…

NEW TOOLSAWSAPI KeysVault

Vault – A Tool For Secrets Management, Encryption As A Service, And Privileged Access Management

Please note: We take Vault's security and our users' trust very seriously. If you believe you have found a security issue in Vault, please responsibly disclose by contacting us at security@hashicorp.com.Website: : #vault-tool on FreenodeAnnouncement list: Google GroupsDiscussion list: Google GroupsDocumentation: : HashiCorp's Learn PlatformCertification Exam: Vault AssociateVault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while…

TUTORIALSRed Teaming

Credential Dumping: LAPS

In this post, you will find out how Microsoft’s LAPs feature can be abused by the attacker in order to get the end-user password. Table of Content Local Administrator Password Solution LAPS Attack Walkthrough Configuration Metasploit Empire The “Local Administrator Password Solution” (LAPS) provides management of local account passwords of domain-joined computers. Passwords are stored in Active Directory (AD) and protected by ACL, so only eligible users can read it or request its reset. For environments in which users are required to log on…

NEW TOOLSPowerViewActive DirectoryLDAPDCSYNCSPNAdsecurityActivedirectoryADCollector

ADCollector – A Lightweight Tool To Quickly Extract Valuable Information From The Active Directory Environment For Both Attacking And Defending

ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you a basic understanding of the configuration/deployment of the environment as a starting point.Notes:ADCollector is not an alternative to the powerful PowerView, it just automates enumeration to quickly identify juicy information without thinking too much at the early Recon stage. Functions implemented in ADCollector are ideal for enumeration in a large Enterprise environment with lots of users/computers, without generating lots of traffic and taking a…

NEW TOOLSMetasploit Frameworkpenetration testingHacking ToolsANDRAXPenetration Testing Platform

ANDRAX v5R NH-Killer – Penetration Testing on Android

ANDRAX is a Penetration Testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it behaves like a common Linux distribution, But more powerful than a common distribution!The development of ANDRAX began on 08/09/2016 (DD/MM/YYYY) only for people in BrazilANDRAX has been fully redefined and reloaded on 05/10/2018 (DD/MM/YYYY) open to the international public.ANDRAX enable to all Android device with root access enabled and a good unlocked rom become a weapon for advanced Penetration Testing.Why is Android so powerful?Simple, everyone has…

NEW TOOLSDroidFiles

DroidFiles – Get Files From Android Directories

Get files from Android directories, internal and external storage (Pictures, Downloads, Whatsapp, Videos, ...)Legal disclaimer:Usage of DroidFiles for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this programRequirements:Android Studio ()Usage:# git clone cd droidfiles# bash droidfiles.shAuthor:  Droidfiles

TUTORIALSCTF Challenges

Sumo: 1 Vulnhub Walkthrough

Today, I am going to share a writeup for the boot2root challenge of the Vulnhub machine “Zion: 1.1”. It was an intermediate box based on the Linux machine. The goal for this machine is to read the flag file Penetration Testing Methodology Network Scanning Netdiscover scan Nmap Scan Enumeration Enumerating HTTP service on Browser Enumerating using Nikto Exploitation Exploiting Shellshock Vulnerability Gaining Meterpreter Post Exploitation Enumerating for Escalating Privileges Privilege Escalation Dirty Cow Reading Root Flag Walkthrough Network Scanning We begin by scanning our…

NEW TOOLSSecurity AuditSecurity AutomationAppsecVulnerability AssessmentVulnerability ManagementVulnerability ScannersDevsecopsSimplifyNestjsPurifyVuetify

Purify – All-in-one Tool For Managing Vulnerability Reports From AppSec Pipelines

All-in-one tool for managing vulnerability reportsWhyThe goal of Purify to be an easy-in-use and efficient tool to simplify a workflow of managing vulnerabilities delivered from various tools.Purify is designed to analyze the report of any tool, if the report is in JSON or XML format. This means you don't need any special plug-ins to process reports from your selection of tools.Purify is able to remove duplicate results among various vulnerability scanners or tools. In addition, it can combine several results of the same tool…

NEW TOOLSCryptographyAssembliesMemory AllocationMemory HackingMemory ManagementMemoryMapperNative Module

MemoryMapper – Lightweight Library Which Allows The Ability To Map Both Native And Managed Assemblies Into Memory

Memory Mapper is a lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a process specified by the user or self-injection; the technique of injecting an assembly into the currently running process attempting to do the injection. The library comes with tools not only to map assemblies, but with the capabilities to encrypt, decrypt, and generate various amounts of cryptographically strong data.RequirementsNote: (For the running assembly using Memory Mapper ONLY — not…