Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
https://github.com/BullsEye0/ghost_eye
#Ghost_eye #informationGathering
https://github.com/BullsEye0/ghost_eye
#Ghost_eye #informationGathering
GitHub
GitHub - BullsEye0/ghost_eye: Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information…
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye ...
#Exegol is a fully featured and community-driven hacking environment
It can be used in pentest engagements, #bugbounty, #CTF, #HackTheBox, #OSCP lab & exam and so on. Exegol's original fate was to be a ready-to-hack docker in case of emergencies during engagements.
https://github.com/ShutdownRepo/Exegol
It can be used in pentest engagements, #bugbounty, #CTF, #HackTheBox, #OSCP lab & exam and so on. Exegol's original fate was to be a ready-to-hack docker in case of emergencies during engagements.
https://github.com/ShutdownRepo/Exegol
GitHub
GitHub - ThePorgs/Exegol: Fully featured and community-driven hacking environment
Fully featured and community-driven hacking environment - ThePorgs/Exegol
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
https://github.com/HuskyHacks/ShadowSteal
#LPE
https://github.com/HuskyHacks/ShadowSteal
#LPE
GitHub
GitHub - HuskyHacks/ShadowSteal: Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation - HuskyHacks/ShadowSteal
https://us-cert.cisa.gov/ics/Downloading-and-Installing-CSET
https://github.com/cisagov/cset
#ICS #CSET
https://github.com/cisagov/cset
#ICS #CSET
www.cisa.gov
Downloading and Installing CSET | CISA
The Cyber Security Evaluation Tool (CSET®) provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture. CSET is a desktop software tool that guides asset owners and operators through a step-by-step process…
Authentication testing framework
https://github.com/DigeeX/raider
https://github.com/DigeeX/raider
GitHub
GitHub - DigeeX/raider: DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider
DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider - GitHub - DigeeX/raider: DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider
We developed GRAT2 Command & Control (C2) project for learning purpose.
https://github.com/r3nhat/GRAT2
https://hakin9.org/grat2-command-and-control-c2-tool-written-in-python3-and-the-client-in-net-4-0/
#C2 #python
https://github.com/r3nhat/GRAT2
https://hakin9.org/grat2-command-and-control-c2-tool-written-in-python3-and-the-client-in-net-4-0/
#C2 #python
GitHub
GitHub - r3nhat/GRAT2: We developed GRAT2 Command & Control (C2) project for learning purpose.
We developed GRAT2 Command & Control (C2) project for learning purpose. - r3nhat/GRAT2
DNS Reset Checker
Tools to assess the DNS security of web applications
https://github.com/The-Login/DNS-Reset-Checker
#DNS #Email
Tools to assess the DNS security of web applications
https://github.com/The-Login/DNS-Reset-Checker
#DNS #Email
GitHub
GitHub - The-Login/DNS-Reset-Checker: Tools to assess the DNS security of web applications
Tools to assess the DNS security of web applications - The-Login/DNS-Reset-Checker
Recon Script in VB . In case Powershell is disabled
https://chaah.awankloud.my/recon-in-vb/
#Recon #VB #Powershell
https://chaah.awankloud.my/recon-in-vb/
#Recon #VB #Powershell
Chaah
Recon in VB
Hardening results
Top 30+ Most Popular Red Team Tools
لیست معروف ترین ابزارهای تست نفوذ ، Red team که مراحل
#Reconnaissance
#Weaponization
#Delivery
#Exploitation
#Privilege_escalation
#Lateral_movement
#C2
#Exfiltrate_and_complete
https://securitytrails.com/blog/red-team-tools
#redteam
#pentest_tools
لیست معروف ترین ابزارهای تست نفوذ ، Red team که مراحل
#Reconnaissance
#Weaponization
#Delivery
#Exploitation
#Privilege_escalation
#Lateral_movement
#C2
#Exfiltrate_and_complete
https://securitytrails.com/blog/red-team-tools
#redteam
#pentest_tools
Testimo is PowerShell module for running health checks for Active Directory (and later on any other server type) against a bunch of different tests
https://github.com/EvotecIT/Testimo
#powershell #activedirectory #Testimo
https://github.com/EvotecIT/Testimo
#powershell #activedirectory #Testimo
GitHub
GitHub - EvotecIT/Testimo: Testimo is a PowerShell module for running health checks for Active Directory against a bunch of different…
Testimo is a PowerShell module for running health checks for Active Directory against a bunch of different tests - EvotecIT/Testimo
GitLab Releases Open Source Tool for Hunting Malicious Code in Dependencies
https://gitlab.com/gitlab-org/security-products/package-hunter
#hunting
https://gitlab.com/gitlab-org/security-products/package-hunter
#hunting
GitLab
GitLab.org / security-products / Package Hunter · GitLab
Violent Fungus is a command and control (C2) software suite, providing red teams post-exploitation persistence and other juicy stuff. WIP.
https://github.com/sogonsec/ViolentFungus-C2
#c2 #python
https://github.com/sogonsec/ViolentFungus-C2
#c2 #python
WebContent->EL1 LPE: OOBR in AppleCLCD / IOMobileFrameBuffer
https://saaramar.github.io/IOMobileFrameBuffer_LPE_POC/
این آسیب پذیری توسط اپل در نسخه 14.7.1 رفع شده است.
https://saaramar.github.io/IOMobileFrameBuffer_LPE_POC/
این آسیب پذیری توسط اپل در نسخه 14.7.1 رفع شده است.