Peneter Tools – Telegram
BloodHound
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.
https://github.com/BloodHoundAD/BloodHound/releases/tag/4.0.2
#bloodhound #postexploit #activedirectoy
image_2021-07-13_22-06-17.png
708.4 KB
Recon is a noscript to perform a full recon on a target with the main tools to search for vulnerabilities.
https://github.com/dirsoooo/Recon/releases/tag/v1.0
#recon #informationgathering #enumeration #scanning
MAN SPIDER
will crawl every share on every target system. If provided creds don't work, it will fall back to "guest", then to a null session.
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
https://github.com/blacklanternsecurity/MANSPIDER
#MANSPIDER #SMB #scrabbing
Injector
Complete Arsenal of Memory injection and other techniques for red-teaming in Windows
https://github.com/0xDivyanshu/Injector
#bypassAV #injector
rconn
rconn is a multiplatform program for creating generic reverse connections. Lets you consume services that are behind firewall or NAT without opening ports or port-forwarding.
https://github.com/jafarlihi/rconn
#rconn #postexploit #portforwarding
ARTIF
An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and historical data.
Threat Detection
Logging and Monitoring
User profiling
Alerting automation
https://github.com/CRED-CLUB/ARTIF/releases/tag/1.0
#blueteam #TI #ARTIF
A powerful Bluetooth scanner

BR devices
LE devices
BR LMP features
LE LL features
SMP Pairing features
Real-time advertising physical channel PDU
SDP services
GATT services
Vulnerabilities (demo)
https://github.com/fO-000/bluescan/releases/tag/v0.6.5
#IoT #BLE #scanner
BoomBox
Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant
BoomBox is designed for malware analysts and incident responders. It allows for the rapid deployment of a dynamic malware analysis environment using Cuckoo Sandbox and a Windows 10 detonation chamber. Cuckoo is configured to use the physical machinery so that both Cuckoo and the Windows sandbox can be virtual machines on a single host.
https://github.com/nbeede/BoomBox/releases/tag/v1.0
#cuckoo #sandbox #malwareanalysis