검색 결과

  1. K

    제목 : Crawlergo-to-Xray를 사용하여 자동 취약성을위한 수동 스캐닝 플랫폼 구성을 달성했습니다.

    一、xray的安装和配置 1. Linux에서 Xray 실행 파일을 다운로드 [root@instance-7q32v011 opt] #wget https://github.com/chaitin/xray/releases/download/0.21.8/xray_linux_amd64.zip 2. [root@instance-7q32v011 opt] #unzip xray_linux_amd64.zip 3 파일을 압축합니다. 인증서 및 구성 파일을 생성하려면 Xray 실행 파일을 실행합니다. [root@instance-7q32v011 opt]#...
  2. K

    제목 : CTF의 암호화 연습 2

    一、js代码分析之编码转换 WRITEUP:OPEN index.htmlscript src='script-min.js'/script //먼저 .js 스크립트 유형='text/javaScript'var ic=false; #기본 IC 값은 false var fg=''입니다. 함수 getflag () {//함수 함수의 getfflag 버튼은 해당 이벤트 var token=document.getElementById ( 'sectoken'). //#텍스트 입력 상자의 값을 get token ic=checktoken (token); //확인...
  3. K

    제목 : CVE-2020-17049 Kerberos Bronze Bit Attack

    0x01 前言 은 getst.py (https://github.com/secureauthcorp/impacket/blob/master/examples/)에 새로운 PR-Force-Forwardable 로고를 추가했습니다. 이 식별을 활성화 한 후 프로그램은 다음 단계를 수행합니다 (새로 추가 된 컨텐츠는 BOLD로 표시됨) : 프로그램은 -HASH 또는 -AESKEY 매개 변수에서 제공하는 키를 사용하여 명령 줄에서 지정된 서비스 원금으로 TGT를 얻습니다. 이 프로그램은 TGT를 통해 S4U2Self Exchange를...
  4. K

    Telegram-Story-Scraper - A Python Script That Allows You To Automatically Scrape And Download Stories From Your Telegram Friends

    A Python script that allows you to automatically scrape and download stories from your Telegram friends using the Telethon library. The script continuously monitors and saves both photos and videos from stories, along with their metadata. Important Note About Story Access ⚠️ Due to Telegram API...
  5. K

    Snoop - OSINT Tool For Research Social Media Accounts By Username

    OSINT Tool for research social media accounts by username Install Requests ```Install Requests pip install requests #### Install BeautifulSoup ```Install BeautifulSoup pip install beautifulsoup4 Execute the program Execute Snoop python3 snoop.py
  6. K

    Lazywarden - Automatic Bitwarden Backup

    Secure, Automated, and Multi-Cloud Bitwarden Backup and Import System Lazywarden is a Python automation tool designed to Backup and Restore data from your vault, including Bitwarden attachments. It allows you to upload backups to multiple cloud storage services and receive notifications across...
  7. K

    Docf-Sec-Check - DockF-Sec-Check Helps To Make Your Dockerfile Commands More Secure

    DockF-Sec-Check helps to make your Dockerfile commands more secure. Done [x] First-level security notification in the Dockerfile TODO List [ ] Correctly detect the Dockerfile. [ ] Second-level security notification in the Dockerfile. [ ] Security notification in Docker images. [ ] *****...
  8. K

    SafeLine - Serve As A Reverse Proxy To Protect Your Web Services From Attacks And Exploits

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as...
  9. K

    PolyDrop - A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit

    BYOSI - Bring-Your-Own-Script-Interpreter - Leveraging the abuse of trusted applications, one is able to deliver a compatible script interpreter for a Windows, Mac, or Linux system as well as malicious source code in the form of the specific script interpreter of choice. Once both the malicious...
  10. K

    Secator - The Pentester'S Swiss Knife

    secator is a task and workflow runner used for security assessments. It supports dozens of well-known security tools and it is designed to improve productivity for pentesters and security researchers. Features Curated list of commands Unified input options Unified output schema CLI and library...
  11. K

    File-Unpumper - Tool That Can Be Used To Trim Useless Things From A PE File Such As The Things A File Pumper Would Add

    file-unpumper is a powerful command-line utility designed to clean and analyze Portable Executable (PE) files. It provides a range of features to help developers and security professionals work with PE files more effectively. Features PE Header Fixing: file-unpumper can fix and align the PE...
  12. K

    Mass-Assigner - Simple Tool Made To Probe For Mass Assignment Vulnerability Through JSON Field Modification In HTTP Requests

    Mass Assigner is a powerful tool designed to identify and exploit mass assignment vulnerabilities in web applications. It achieves this by first retrieving data from a specified request, such as fetching user profile data. Then, it systematically attempts to apply each parameter extracted from...
  13. K

    Imperius - Make An Linux Kernel Rootkit Visible Again

    A make an LKM rootkit visible again. This tool is part of research on LKM rootkits that will be launched. It involves getting the memory address of a rootkit's "show_module" function, for example, and using that to call it, adding it back to lsmod, making it possible to remove an LKM rootkit...
  14. K

    BYOSI - Evade EDR's The Simple Way, By Not Touching Any Of The API's They Hook

    Evade EDR's the simple way, by not touching any of the API's they hook. Theory I've noticed that most EDRs fail to scan scripting files, treating them merely as text files. While this might be unfortunate for them, it's an opportunity for us to profit. Flashy methods like residing in memory or...
  15. K

    Psobf - PowerShell Obfuscator

    Tool for obfuscating PowerShell scripts written in Go. The main objective of this program is to obfuscate PowerShell code to make its analysis and detection more difficult. The script offers 5 levels of obfuscation, from basic obfuscation to script fragmentation. This allows users to tailor the...
  16. K

    ModTracer - ModTracer Finds Hidden Linux Kernel Rootkits And Then Make Visible Again

    ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again. Another way to make an LKM visible is using the imperius trick: https://github.com/MatheuZSecurity/Imperius
  17. K

    DockerSpy - DockerSpy Searches For Images On Docker Hub And Extracts Sensitive Information Such As Authentication Secrets, Private Keys, And More

    DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more. What is Docker? Docker is an open-source platform that automates the deployment, scaling, and management of applications using containerization technology...
  18. K

    Ashok - A OSINT Recon Tool, A.K.A Swiss Army Knife

    Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is an Incredible fast recon tool for penetration tester which is specially designed for Reconnaissance" title="Reconnaissance">Reconnaissance phase. And in...
  19. K

    CloudBrute - Awesome Cloud Enumerator

    A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. The complete writeup is available. here...
  20. K

    Hfinger - Fingerprinting HTTP Requests

    Tool for Fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage :-) Its main objective is to provide unique representations (fingerprints) of malware requests, which help in their identification. Unique means here that each fingerprint should be...
뒤로
상단