Peneter Tools – Telegram
image_2021-07-13_22-06-17.png
708.4 KB
Recon is a noscript to perform a full recon on a target with the main tools to search for vulnerabilities.
https://github.com/dirsoooo/Recon/releases/tag/v1.0
#recon #informationgathering #enumeration #scanning
MAN SPIDER
will crawl every share on every target system. If provided creds don't work, it will fall back to "guest", then to a null session.
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
https://github.com/blacklanternsecurity/MANSPIDER
#MANSPIDER #SMB #scrabbing
Injector
Complete Arsenal of Memory injection and other techniques for red-teaming in Windows
https://github.com/0xDivyanshu/Injector
#bypassAV #injector
rconn
rconn is a multiplatform program for creating generic reverse connections. Lets you consume services that are behind firewall or NAT without opening ports or port-forwarding.
https://github.com/jafarlihi/rconn
#rconn #postexploit #portforwarding
ARTIF
An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and historical data.
Threat Detection
Logging and Monitoring
User profiling
Alerting automation
https://github.com/CRED-CLUB/ARTIF/releases/tag/1.0
#blueteam #TI #ARTIF
A powerful Bluetooth scanner

BR devices
LE devices
BR LMP features
LE LL features
SMP Pairing features
Real-time advertising physical channel PDU
SDP services
GATT services
Vulnerabilities (demo)
https://github.com/fO-000/bluescan/releases/tag/v0.6.5
#IoT #BLE #scanner
BoomBox
Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant
BoomBox is designed for malware analysts and incident responders. It allows for the rapid deployment of a dynamic malware analysis environment using Cuckoo Sandbox and a Windows 10 detonation chamber. Cuckoo is configured to use the physical machinery so that both Cuckoo and the Windows sandbox can be virtual machines on a single host.
https://github.com/nbeede/BoomBox/releases/tag/v1.0
#cuckoo #sandbox #malwareanalysis
BruteShark
Network Analysis Tool
We need extract credential from PCAP after Sniffing !
Extracting and encoding usernames and passwords (HTTP, FTP, Telnet, IMAP, SMTP...)
Extract authentication hashes and crack them using Hashcat (Kerberos, NTLM, CRAM-MD5, HTTP-Digest...)
Build visual network diagram (Network nodes & users)
Extract DNS queries
Reconstruct all TCP & UDP Sessions
File Carving
Extract Voip calls (SIP, RTP)
https://github.com/odedshimon/BruteShark/releases/tag/v1.2.2
Similar Tools :
1) Xplico (free)
2) Netwitness (Commercial maybe crack !)
https://github.com/xplico/xplico/releases/tag/v.1.2.2
https://www.netwitness.com/
#scrabbling #postExploit
PingCastle
It does quickly collect the most important information of the Active Directory to establish an overview on it. Based on a model and rules, it evalutes the score of the sub-processes of the Active Directory. Then based on this evaluation, it report the risk evaluation of it.
https://www.pingcastle.com/download/
#activedirectory #pingcastle #risk #windows
Splunk Security Content
This project gives you access to our repository of Analytic Stories that are security guides the provide background on TTPs, mapped to the MITRE framework, the Lockheed Martin Kill Chain, and CIS controls. They include Splunk searches, machine-learning algorithms, and Splunk Phantom playbooks (where available)—all designed to work together to detect, investigate, and respond to threats.
https://github.com/splunk/security_content/releases/tag/v3.25.1
#splunk #blueteam