این ابزار شماره کارت اعتباری، NTLM (DCE-RPC، HTTP، SQL، LDAP، و غیره)، Kerberos (AS-REQ Pre-Auth نوع 23)، HTTP Basic، SNMP، POP، SMTP، FTP، IMAP و غیره را از یک فایل pcap یا از یک اینترفیس لایو.
https://github.com/lgandx/PCredz
#pcap
#credential
#sniffer
@Netpentester
https://github.com/lgandx/PCredz
#pcap
#credential
#sniffer
@Netpentester
GitHub
GitHub - lgandx/PCredz: This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth…
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interfa...
This media is not supported in your browser
VIEW IN TELEGRAM
آیا تا به حال خواسته اید فایل ها را از طریق رکوردهای DNS A منتقل کنید؟ نه؟ خیلی بد است، من PowerDNS @domchell را بهروزرسانی کردهام تا این کار را همراه با برخی موارد دیگر انجام دهم. می تواند برای پنتست های بدون دسترسی استاندارد خارجی مفید باشد... که بله، من تا حد زیادی از آن استفاده می کنم.
https://github.com/icyguider/NewPowerDNS
#DNS
@NetPentester
https://github.com/icyguider/NewPowerDNS
#DNS
@NetPentester
Microsoft Activation Scripts (MAS)
A Windows and Office activator using HWID / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
https://github.com/massgravel/Microsoft-Activation-Scripts
#Microsoft
@Netpentester
A Windows and Office activator using HWID / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
https://github.com/massgravel/Microsoft-Activation-Scripts
#Microsoft
@Netpentester
GitHub
GitHub - massgravel/Microsoft-Activation-Scripts: Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and…
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting. - massgravel/Microsoft-Activation-Scripts
CVE-2022-24644
آسیبپذیری اجرای کد از راه دور ZZ Inc. KeyMouse 3.08 ( #Windows )
https://github.com/gerr-re/cve-2022-24644
#cve
#Vulnerability
@Netpentester
آسیبپذیری اجرای کد از راه دور ZZ Inc. KeyMouse 3.08 ( #Windows )
https://github.com/gerr-re/cve-2022-24644
#cve
#Vulnerability
@Netpentester
GitHub
GitHub - gar-re/cve-2022-24644
Contribute to gar-re/cve-2022-24644 development by creating an account on GitHub.
acltoolkit
ACL Toolkit is an ACL abuse swiss-knife.
https://github.com/zblurx/acltoolkit
#acl
@Netpentester
ACL Toolkit is an ACL abuse swiss-knife.
https://github.com/zblurx/acltoolkit
#acl
@Netpentester
GitHub
GitHub - zblurx/acltoolkit: ACL abuse swiss-knife
ACL abuse swiss-knife. Contribute to zblurx/acltoolkit development by creating an account on GitHub.
Poweshell tool to check for partially encrypted files with various techniques and sandbox them for analysis.
https://github.com/shadowdevnotreal/anti_Royal
#Powershell
@NetPentester
https://github.com/shadowdevnotreal/anti_Royal
#Powershell
@NetPentester
Ruler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol. The main aim is abuse the client-side Outlook features and gain a shell remotely.
https://github.com/sensepost/ruler
#exchange
@Netpentester
https://github.com/sensepost/ruler
#exchange
@Netpentester
GitHub
GitHub - sensepost/ruler: A tool to abuse Exchange services
A tool to abuse Exchange services. Contribute to sensepost/ruler development by creating an account on GitHub.
یک برگه تقلب که حاوی روش های رایج شمارش و حمله برای اکتیو دایرکتوری ویندوز است.
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
#ad #cheatsheet
@NetPenteste
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
#ad #cheatsheet
@NetPenteste
GitHub
GitHub - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods…
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
PowerShell-Deobfuscation-Exercise
تمرینی برای تمرین Deobfuscation اسکریپت های PowerShell.
https://github.com/trevormiller6/PowerShell-Deobfuscation-Exercise
#PowerShell #Deobfuscation
@NetPentester
تمرینی برای تمرین Deobfuscation اسکریپت های PowerShell.
https://github.com/trevormiller6/PowerShell-Deobfuscation-Exercise
#PowerShell #Deobfuscation
@NetPentester
GitHub
GitHub - CyberDefend3r/PowerShell-Deobfuscation-Exercise: An exercise to practice deobfuscating PowerShell Scripts.
An exercise to practice deobfuscating PowerShell Scripts. - CyberDefend3r/PowerShell-Deobfuscation-Exercise
Somnium
Script to test network prevention and detection capabilities.
https://github.com/asluppiter/Somnium
Script to test network prevention and detection capabilities.
https://github.com/asluppiter/Somnium
GitHub
GitHub - asluppiter/Somnium: Script to test NetSec capabilities.
Script to test NetSec capabilities. Contribute to asluppiter/Somnium development by creating an account on GitHub.
درباره Cloud Scout
Cloud Scout
پلاگینی است که در BloodHound کار می کند و از قابلیت های تجسم آن برای تجسم مسیرهای حمله متقابل پلت فرم استفاده می کند.
https://github.com/SygniaLabs/security-cloud-scout
#BloodHound
@NetPentester
Cloud Scout
پلاگینی است که در BloodHound کار می کند و از قابلیت های تجسم آن برای تجسم مسیرهای حمله متقابل پلت فرم استفاده می کند.
https://github.com/SygniaLabs/security-cloud-scout
#BloodHound
@NetPentester
Telegram
Red Blue Team
#Red_Team
BloodHound
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment.
Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise…
BloodHound
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment.
Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise…
Quick Network Scanner Library
Rust library for scanning network hosts asynchronously.
https://github.com/0xor0ne/qscan
Rust library for scanning network hosts asynchronously.
https://github.com/0xor0ne/qscan
GitHub
GitHub - 0xor0ne/qscan: Quick network scanner library. https://crates.io/crates/qscan
Quick network scanner library. https://crates.io/crates/qscan - 0xor0ne/qscan
AdReplStatus
ابزار وضعیت تکرار اکتیو دایرکتوری، با نام مستعار ADREPLSTATUS.
https://github.com/ryanries/ADReplStatus
#AD
@NetPentester
ابزار وضعیت تکرار اکتیو دایرکتوری، با نام مستعار ADREPLSTATUS.
https://github.com/ryanries/ADReplStatus
#AD
@NetPentester
GitHub
GitHub - ryanries/ADReplStatus: AD Replication Status Tool
AD Replication Status Tool. Contribute to ryanries/ADReplStatus development by creating an account on GitHub.
CVE-2023-28760
روتر TP-Link AX1800 WiFi 6 - آسیب پذیری خرابی حافظه (Exploit).
https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760
جزئیات:
https://www.tecsecurity.io/blog/tp-link_ax1800
#exploit
#cve
#tplink
@netpentester
روتر TP-Link AX1800 WiFi 6 - آسیب پذیری خرابی حافظه (Exploit).
https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760
جزئیات:
https://www.tecsecurity.io/blog/tp-link_ax1800
#exploit
#cve
#tplink
@netpentester
GitHub
exploits/CVE-2023-28760 at main · TecR0c/exploits
This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system security. - TecR0c/exploits
درود
بدلیل مشغله کاری از تمامی دوستان فعال در حوزه های سایبری دعوت میشود به آیدی زیر پیام داده و در صورت تایید به عنوان مدیر و ویراستار جدید کانال انتخاب شوند
@DK_HBB_Bot
بدلیل مشغله کاری از تمامی دوستان فعال در حوزه های سایبری دعوت میشود به آیدی زیر پیام داده و در صورت تایید به عنوان مدیر و ویراستار جدید کانال انتخاب شوند
@DK_HBB_Bot