Peneter Tools – Telegram
Peneter Tools pinned «ابزارهای تست نفوذ هیچ کدام از ابزارها رو روی workstation خودتون در محل کار و منزل اکیدا RUN نکنید فقط VPS که اطلاعات محرمانه و حساس روی آن ها قرار ندارد برای تست می تونید استفاده کنید. کرک هیچ کدام را تایید نمی کنیم که دارای Malware (RAT) باشد یا نه ! #warning…»
#Karton Distributed malware processing framework based on Python, Redis, and MinIO.
karton

This repository. It contains the karton.system service - main service, responsible for dispatching tasks within the system. It also contains the karton.core module, that is used as a library by other systems.
karton-dashboard

A small Flask dashboard for task and queue management and monitoring.
karton-classifier

The "router". It recognises samples/files and produces various task types depending on the file format. Thanks to this, other systems may only listen for tasks with a specific format (for example, only zip archives).
karton-archive-extractor

Generic archive unpacker. Archives uploaded into the system will be extracted, and every file will be processed individually.
karton-config-extractor

Malware extractor. It uses Yara rules and Python modules to extract static configuration from malware samples and analyses. It's a fishing rod, not a fish - we don't share the modules themselves. But it's easy to write your own!
karton-mwdb-reporter

A very important part of the pipeline. Reporter submits all files, tags, comments and other intel produced during the analysis to MWDB. If you don't use MWDB yet or just prefer other backends, it's easy to write your own reporter.
karton-yaramatcher

Automatically runs Yara rules on all files in the pipeline, and tags samples appropriately. Rules not included ;).
karton-asciimagic

Karton system that decodes files encoded with common methods, like hex, base64, etc. (You wouldn't believe how common it is).
karton-autoit-ripper

A small wrapper around AutoIt-Ripper that extracts embedded AutoIt noscripts and resources from compiled AutoIt executables.
DRAKVUF Sandbox

Automated black-box malware analysis system with DRAKVUF engine under the hood, which does not require an agent on guest OS.
https://github.com/CERT-Polska/karton
Doc :
https://karton-core.readthedocs.io/en/latest/index.html
#NExfil is an #OSINT tool written in python for finding profiles by username. The provided usernames are checked on over 350 websites within few seconds. The goal behind this tool was to get results quickly while maintaining low amounts of false positives.
https://github.com/thewhiteh4t/nexfil
BloodHound
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.
https://github.com/BloodHoundAD/BloodHound/releases/tag/4.0.2
#bloodhound #postexploit #activedirectoy
image_2021-07-13_22-06-17.png
708.4 KB
Recon is a noscript to perform a full recon on a target with the main tools to search for vulnerabilities.
https://github.com/dirsoooo/Recon/releases/tag/v1.0
#recon #informationgathering #enumeration #scanning
MAN SPIDER
will crawl every share on every target system. If provided creds don't work, it will fall back to "guest", then to a null session.
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
https://github.com/blacklanternsecurity/MANSPIDER
#MANSPIDER #SMB #scrabbing
Injector
Complete Arsenal of Memory injection and other techniques for red-teaming in Windows
https://github.com/0xDivyanshu/Injector
#bypassAV #injector
rconn
rconn is a multiplatform program for creating generic reverse connections. Lets you consume services that are behind firewall or NAT without opening ports or port-forwarding.
https://github.com/jafarlihi/rconn
#rconn #postexploit #portforwarding