Ruler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol. The main aim is abuse the client-side Outlook features and gain a shell remotely.
https://github.com/sensepost/ruler
#exchange
@Netpentester
https://github.com/sensepost/ruler
#exchange
@Netpentester
GitHub
GitHub - sensepost/ruler: A tool to abuse Exchange services
A tool to abuse Exchange services. Contribute to sensepost/ruler development by creating an account on GitHub.
یک برگه تقلب که حاوی روش های رایج شمارش و حمله برای اکتیو دایرکتوری ویندوز است.
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
#ad #cheatsheet
@NetPenteste
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
#ad #cheatsheet
@NetPenteste
GitHub
GitHub - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods…
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
PowerShell-Deobfuscation-Exercise
تمرینی برای تمرین Deobfuscation اسکریپت های PowerShell.
https://github.com/trevormiller6/PowerShell-Deobfuscation-Exercise
#PowerShell #Deobfuscation
@NetPentester
تمرینی برای تمرین Deobfuscation اسکریپت های PowerShell.
https://github.com/trevormiller6/PowerShell-Deobfuscation-Exercise
#PowerShell #Deobfuscation
@NetPentester
GitHub
GitHub - CyberDefend3r/PowerShell-Deobfuscation-Exercise: An exercise to practice deobfuscating PowerShell Scripts.
An exercise to practice deobfuscating PowerShell Scripts. - CyberDefend3r/PowerShell-Deobfuscation-Exercise
Somnium
Script to test network prevention and detection capabilities.
https://github.com/asluppiter/Somnium
Script to test network prevention and detection capabilities.
https://github.com/asluppiter/Somnium
GitHub
GitHub - asluppiter/Somnium: Script to test NetSec capabilities.
Script to test NetSec capabilities. Contribute to asluppiter/Somnium development by creating an account on GitHub.
درباره Cloud Scout
Cloud Scout
پلاگینی است که در BloodHound کار می کند و از قابلیت های تجسم آن برای تجسم مسیرهای حمله متقابل پلت فرم استفاده می کند.
https://github.com/SygniaLabs/security-cloud-scout
#BloodHound
@NetPentester
Cloud Scout
پلاگینی است که در BloodHound کار می کند و از قابلیت های تجسم آن برای تجسم مسیرهای حمله متقابل پلت فرم استفاده می کند.
https://github.com/SygniaLabs/security-cloud-scout
#BloodHound
@NetPentester
Telegram
Red Blue Team
#Red_Team
BloodHound
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment.
Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise…
BloodHound
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment.
Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise…
Quick Network Scanner Library
Rust library for scanning network hosts asynchronously.
https://github.com/0xor0ne/qscan
Rust library for scanning network hosts asynchronously.
https://github.com/0xor0ne/qscan
GitHub
GitHub - 0xor0ne/qscan: Quick network scanner library. https://crates.io/crates/qscan
Quick network scanner library. https://crates.io/crates/qscan - 0xor0ne/qscan
AdReplStatus
ابزار وضعیت تکرار اکتیو دایرکتوری، با نام مستعار ADREPLSTATUS.
https://github.com/ryanries/ADReplStatus
#AD
@NetPentester
ابزار وضعیت تکرار اکتیو دایرکتوری، با نام مستعار ADREPLSTATUS.
https://github.com/ryanries/ADReplStatus
#AD
@NetPentester
GitHub
GitHub - ryanries/ADReplStatus: AD Replication Status Tool
AD Replication Status Tool. Contribute to ryanries/ADReplStatus development by creating an account on GitHub.
CVE-2023-28760
روتر TP-Link AX1800 WiFi 6 - آسیب پذیری خرابی حافظه (Exploit).
https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760
جزئیات:
https://www.tecsecurity.io/blog/tp-link_ax1800
#exploit
#cve
#tplink
@netpentester
روتر TP-Link AX1800 WiFi 6 - آسیب پذیری خرابی حافظه (Exploit).
https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760
جزئیات:
https://www.tecsecurity.io/blog/tp-link_ax1800
#exploit
#cve
#tplink
@netpentester
GitHub
exploits/CVE-2023-28760 at main · TecR0c/exploits
This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system security. - TecR0c/exploits
درود
بدلیل مشغله کاری از تمامی دوستان فعال در حوزه های سایبری دعوت میشود به آیدی زیر پیام داده و در صورت تایید به عنوان مدیر و ویراستار جدید کانال انتخاب شوند
@DK_HBB_Bot
بدلیل مشغله کاری از تمامی دوستان فعال در حوزه های سایبری دعوت میشود به آیدی زیر پیام داده و در صورت تایید به عنوان مدیر و ویراستار جدید کانال انتخاب شوند
@DK_HBB_Bot