PRINT
PRINT
SEND MAIL
SEND MAIL

Intel Owl – Analyze Files, Domains, IPs In Multiple Ways From A Single API At Scale

Do you want to get threat intelligence data about a file, an IP or a domain?Do you want to get this kind of data from multiple sources at the same time using a single API request?You are in the right place!This application is built to scale out and to...

Continue reading

SkyArk – Helps To Discover, Assess And Secure The Most Privileged Entities In Azure And AWS

SkyArk is a cloud security project with two main scanning modules:AzureStealth - Scans Azure environmentsAWStealth - Scan AWS environmentsThese two scanning modules will discover the most privileged entities in the target AWS and Azure.The Main Goal ...

Continue reading

reNgine – An Automated Reconnaissance Framework Meant For Gathering Information During Penetration Testing Of Web Applications

reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. The beaut...

Continue reading

Lollipopz – Data Exfiltration Utility For Testing Detection Capabilities

Data exfiltration utility used for testing detection capabilities of security products. Obviously for legal purposes only.Exfiltration How-To/etc/shadow -> HTTP GET requestsServer# ./lollipopz-cli.py -m lollipopz.methods.http.param_cipher.GETServer ...

Continue reading

InQL Scanner – A Burp Extension For GraphQL Security Testing

A security testing tool to facilitate GraphQL technology security auditing efforts.InQL can be used as a stand-alone script, or as a Burp Suite extension.InQL Stand-AloneRunning inql from Python will issue an Introspection query to the target GraphQL e...

Continue reading

Dufflebag – Search Exposed EBS Volumes For Secrets

Dufflebag is a tool that searches through public Elastic Block Storage (EBS) snapshots for secrets that may have been accidentally left in. You may be surprised by all the passwords and secrets just laying around!The tool is organized as an Elastic Bea...

Continue reading

Attack Monitor – Endpoint Detection And Malware Analysis Software

Attack Monitor is Python application written to enhance security monitoring capabilites of Windows 7/2008 (and all later versions) workstations/servers and to automate dynamic analysis of malware.Current modes (mutually exclusive):Endpoint detection (E...

Continue reading

FudgeC2 – A Collaborative C2 Framework For Purple-Teaming Written In Python3, Powershell And .NET

FudgeC2 is a campaign orientated Powershell C2 framework built on Python3/Flask - Designed for team collaboration, client interaction, campaign timelining, and usage visibility.Note: FudgeC2 is currently in alpha stage, and should be used with caution ...

Continue reading

©2021 By Cyber Sec Labs

   

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account