β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Domain #Analysis- #gathering information
[badips.com](https://www.badips.com/) - Community based IP blacklist service.
boomerang - A tool designed
for consistent and safe capture of off network web resources.
[Cymon](https://cymon.io/) - Threat intelligence tracker, with IP/domain/hash
search.
Desenmascara.me - One click tool to retrieve as
much metadata as possible for a website and to assess its good standing.
[Dig](https://networking.ringofsaturn.com/) - Free online dig and other
network tools.
dnstwist - Domain name permutation
engine for detecting typo squatting, phishing and corporate espionage.
[IPinfo](https://github.com/hiddenillusion/IPinfo) - Gather information
about an IP or domain by searching online resources.
Machinae - OSINT tool for
gathering information about URLs, IPs, or hashes. Similar to Automator.
[mailchecker](https://github.com/FGRibreau/mailchecker) - Cross-language
temporary email detection library.
MaltegoVT - Maltego transform
for the VirusTotal API. Allows domain/IP research, and searching for file
hashes and scan reports.
[Multi rbl](http://multirbl.valli.org/) - Multiple DNS blacklist and forward
confirmed reverse DNS lookup over more than 300 RBLs.
NormShield Services - Free API Services
for detecting possible phishing domains, blacklisted ip addresses and breached
accounts.
[SpamCop](https://www.spamcop.net/bl.shtml) - IP based spam block list.
SpamHaus - Block list based on
domains and IPs.
[Sucuri SiteCheck](https://sitecheck.sucuri.net/) - Free Website Malware
and Security Scanner.
Talos Intelligence - Search for IP, domain
or network owner. (Previously SenderBase.)
[TekDefense Automater](http://www.tekdefense.com/automater/) - OSINT tool
for gathering information about URLs, IPs, or hashes.
URLQuery - Free URL Scanner.
[urlscan.io](https://urlscan.io/) - Free URL Scanner & domain information.
Whois - DomainTools free online whois
search.
[Zeltser's List](https://zeltser.com/lookup-malicious-websites/) - Free
online tools for researching malicious websites, compiled by Lenny Zeltser.
ZScalar Zulu - Zulu URL Risk Analyzer.
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Domain #Analysis- #gathering information
[badips.com](https://www.badips.com/) - Community based IP blacklist service.
boomerang - A tool designed
for consistent and safe capture of off network web resources.
[Cymon](https://cymon.io/) - Threat intelligence tracker, with IP/domain/hash
search.
Desenmascara.me - One click tool to retrieve as
much metadata as possible for a website and to assess its good standing.
[Dig](https://networking.ringofsaturn.com/) - Free online dig and other
network tools.
dnstwist - Domain name permutation
engine for detecting typo squatting, phishing and corporate espionage.
[IPinfo](https://github.com/hiddenillusion/IPinfo) - Gather information
about an IP or domain by searching online resources.
Machinae - OSINT tool for
gathering information about URLs, IPs, or hashes. Similar to Automator.
[mailchecker](https://github.com/FGRibreau/mailchecker) - Cross-language
temporary email detection library.
MaltegoVT - Maltego transform
for the VirusTotal API. Allows domain/IP research, and searching for file
hashes and scan reports.
[Multi rbl](http://multirbl.valli.org/) - Multiple DNS blacklist and forward
confirmed reverse DNS lookup over more than 300 RBLs.
NormShield Services - Free API Services
for detecting possible phishing domains, blacklisted ip addresses and breached
accounts.
[SpamCop](https://www.spamcop.net/bl.shtml) - IP based spam block list.
SpamHaus - Block list based on
domains and IPs.
[Sucuri SiteCheck](https://sitecheck.sucuri.net/) - Free Website Malware
and Security Scanner.
Talos Intelligence - Search for IP, domain
or network owner. (Previously SenderBase.)
[TekDefense Automater](http://www.tekdefense.com/automater/) - OSINT tool
for gathering information about URLs, IPs, or hashes.
URLQuery - Free URL Scanner.
[urlscan.io](https://urlscan.io/) - Free URL Scanner & domain information.
Whois - DomainTools free online whois
search.
[Zeltser's List](https://zeltser.com/lookup-malicious-websites/) - Free
online tools for researching malicious websites, compiled by Lenny Zeltser.
ZScalar Zulu - Zulu URL Risk Analyzer.
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Memory #Analysis Tools topic 2020 :
* [Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
* [inVtero.net](https://github.com/ShaneK2/inVtero.net) - Advanced memory analysis for Windows x64 with nested hypervisor support
* [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
* [LiME](https://github.com/504ensicsLabs/LiME) - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices
* [Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis
* [Memoryze for Mac](https://www.fireeye.com/services/freeware/memoryze-for-the-mac.html) - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however
* [Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
* [Responder PRO](http://www.countertack.com/responder-pro) - Responder PRO is the industry standard physical memory and automated malware analysis solution
* [Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework
* [VolatilityBot](https://github.com/mkorman90/VolatilityBot) - VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation
* [VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility
* [WindowsSCOPE](http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=35&category_id=3&option=com_virtuemart) - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeCourses
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Memory #Analysis Tools topic 2020 :
* [Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
* [inVtero.net](https://github.com/ShaneK2/inVtero.net) - Advanced memory analysis for Windows x64 with nested hypervisor support
* [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
* [LiME](https://github.com/504ensicsLabs/LiME) - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices
* [Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis
* [Memoryze for Mac](https://www.fireeye.com/services/freeware/memoryze-for-the-mac.html) - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however
* [Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
* [Responder PRO](http://www.countertack.com/responder-pro) - Responder PRO is the industry standard physical memory and automated malware analysis solution
* [Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework
* [VolatilityBot](https://github.com/mkorman90/VolatilityBot) - VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation
* [VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility
* [WindowsSCOPE](http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=35&category_id=3&option=com_virtuemart) - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeCourses
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - JamesHabben/evolve: Web interface for the Volatility Memory Forensics Framework
Web interface for the Volatility Memory Forensics Framework - JamesHabben/evolve
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Memory #Analysis Tools topic 2020 :
[Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
inVtero.net - Advanced memory analysis for Windows x64 with nested hypervisor support
[KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
LiME - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices
[Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis
Memoryze for Mac - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however
[Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
Responder PRO - Responder PRO is the industry standard physical memory and automated malware analysis solution
[Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework
VolatilityBot - VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation
[VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility
WindowsSCOPE - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Memory #Analysis Tools topic 2020 :
[Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
inVtero.net - Advanced memory analysis for Windows x64 with nested hypervisor support
[KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
LiME - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices
[Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis
Memoryze for Mac - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however
[Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
Responder PRO - Responder PRO is the industry standard physical memory and automated malware analysis solution
[Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework
VolatilityBot - VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation
[VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility
WindowsSCOPE - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - JamesHabben/evolve: Web interface for the Volatility Memory Forensics Framework
Web interface for the Volatility Memory Forensics Framework - JamesHabben/evolve
β β β Uππ»βΊπ«6π¬πβ β β β
π¦#Log #Analysis #Tools 2020
[AppCompatProcessor](https://github.com/mbevilacqua/appcompatprocessor) - AppCompatProcessor has been designed to extract additional value from enterprise-wide AppCompat / AmCache data beyond the classic stacking and grepping techniques.
Lorg - Tool for advanced HTTPD logfile security analysis and forensics.
[Logdissect](https://github.com/dogoncouch/logdissect) - CLI utility and Python API for analyzing log files and other data.
Sigma - Generic signature format for SIEM systems already containing an extensive ruleset.
[StreamAlert](https://github.com/airbnb/streamalert) - Serverless, real-time log data analysis framework, capable of ingesting custom data sources and triggering alerts using user-defined logic.
SysmonSearch - SysmonSearch makes Windows event log analysis more effective and less time consuming by aggregation of event logs.
β git sources 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦#Log #Analysis #Tools 2020
[AppCompatProcessor](https://github.com/mbevilacqua/appcompatprocessor) - AppCompatProcessor has been designed to extract additional value from enterprise-wide AppCompat / AmCache data beyond the classic stacking and grepping techniques.
Lorg - Tool for advanced HTTPD logfile security analysis and forensics.
[Logdissect](https://github.com/dogoncouch/logdissect) - CLI utility and Python API for analyzing log files and other data.
Sigma - Generic signature format for SIEM systems already containing an extensive ruleset.
[StreamAlert](https://github.com/airbnb/streamalert) - Serverless, real-time log data analysis framework, capable of ingesting custom data sources and triggering alerts using user-defined logic.
SysmonSearch - SysmonSearch makes Windows event log analysis more effective and less time consuming by aggregation of event logs.
β git sources 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - mbevilacqua/appcompatprocessor: "Evolving AppCompat/AmCache data analysis beyond grep"
"Evolving AppCompat/AmCache data analysis beyond grep" - mbevilacqua/appcompatprocessor
π¦Full analysis/exploit of the Netgear Nighthawk R8300 using PreAuth RCE
#Exploit #Analysis
#Advanced level !
https://undercode.help/full-analysis-exploit-of-the-netgear-nighthawk-r8300-using-preauth-rce
#Exploit #Analysis
#Advanced level !
https://undercode.help/full-analysis-exploit-of-the-netgear-nighthawk-r8300-using-preauth-rce
Forwarded from UNDERCODE NEWS