AttackSurfaceMapper:-- #AttackSurfaceMapper is a #tool that aims to #automate the #reconnaissance #process.
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
AttackSurfaceMapper:-- #AttackSurfaceMapper is a #tool that aims to #automate the #reconnaissance #process.
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
AttackSurfaceMapper:-- #AttackSurfaceMapper is a #tool that aims to #automate the #reconnaissance #process.
Attack Surface Mapper is a reconnaissance tool that uses a mixture of #opensource #intelligence and #active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, #subdomains, and IP addresses and it uses numerous techniques to find more targets. It #enumerates subdomains with #bruteforcing and passive lookups, Other IPs of the same network block owner, IPs that have multiple domain names pointing to them and so on.
Once the target list is fully expanded it performs passive reconnaissance on them, taking screenshots of #websites, generating visual #maps, looking up credentials in public breaches, passive port scanning with #Shodan and scraping #employees from #LinkedIn.
Add optional API keys to enable more data gathering
Register and obtain an API key from:-
1. #VirusTotal
2. #ShodanIO
3. #HunterIO
4. #WeLeakInfo
5. LinkedIn
6. #GrayHatWarfare
#Download #Link:-
https://github.com/superhedgy/AttackSurfaceMapper
Photos from National Cyber Security Services's post
Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.
Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.
#Download #Link:-
https://github.com/marcosd4h/memhunter
Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.
Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.
#Download #Link:-
https://github.com/marcosd4h/memhunter
Photos from National Cyber Security Services's post
DWKit:-- DWKit is a #Business #Process #Management #System based on .NET Core and React.
DWKit is a .NET BPM system made with simplicity and flexibility in mind. DWKit allows you to model, automate and execute mission-critical business processes, whatever #industry you’re operating in.
Features:-
1. Drag-&-drop form builder
2. Designer of workflow
3. User Interface on #React (JSX)
4. Role-based access control
5. #Admin panel
6. Support #MSSQL/ #PostgreSQL/ #Oracle #databases
7. Works fine on #Windows/ #Linux/ #MacOSX
#Download #Link:-
https://github.com/optimajet/DWKit
DWKit:-- DWKit is a #Business #Process #Management #System based on .NET Core and React.
DWKit is a .NET BPM system made with simplicity and flexibility in mind. DWKit allows you to model, automate and execute mission-critical business processes, whatever #industry you’re operating in.
Features:-
1. Drag-&-drop form builder
2. Designer of workflow
3. User Interface on #React (JSX)
4. Role-based access control
5. #Admin panel
6. Support #MSSQL/ #PostgreSQL/ #Oracle #databases
7. Works fine on #Windows/ #Linux/ #MacOSX
#Download #Link:-
https://github.com/optimajet/DWKit
Purify:-- All-in-one tool for #managing #vulnerability #reports.
The goal of #Purify to be an easy-in-use and efficient tool to simplify a workflow of managing #vulnerabilities delivered from various #tools.
Purify is designed to #analyze the report of any tool if the report is in #JSON or #XML format. This means you don't need any special plug-ins to #process reports from your selection of tools.
Collect all #security findings in one place, review/validate/track them, collaborate, get notifications, export them into tracking systems (e.g. Jira) and so on.
The logic hierarchy of Purify is simple:
1. Project (the root component)
2. Units (the direct child of a project)
3. Reports (belong to a unit)
4. Templates (attached to a report and used to parse issues)
5. Issues (extracted from a report and formatted based on a template)
#Download #Link:-
https://github.com/faloker/purify
Purify:-- All-in-one tool for #managing #vulnerability #reports.
The goal of #Purify to be an easy-in-use and efficient tool to simplify a workflow of managing #vulnerabilities delivered from various #tools.
Purify is designed to #analyze the report of any tool if the report is in #JSON or #XML format. This means you don't need any special plug-ins to #process reports from your selection of tools.
Collect all #security findings in one place, review/validate/track them, collaborate, get notifications, export them into tracking systems (e.g. Jira) and so on.
The logic hierarchy of Purify is simple:
1. Project (the root component)
2. Units (the direct child of a project)
3. Reports (belong to a unit)
4. Templates (attached to a report and used to parse issues)
5. Issues (extracted from a report and formatted based on a template)
#Download #Link:-
https://github.com/faloker/purify
The goal of #Purify to be an easy-in-use and efficient tool to simplify a workflow of managing #vulnerabilities delivered from various #tools.
Purify is designed to #analyze the report of any tool if the report is in #JSON or #XML format. This means you don't need any special plug-ins to #process reports from your selection of tools.
Collect all #security findings in one place, review/validate/track them, collaborate, get notifications, export them into tracking systems (e.g. Jira) and so on.
The logic hierarchy of Purify is simple:
1. Project (the root component)
2. Units (the direct child of a project)
3. Reports (belong to a unit)
4. Templates (attached to a report and used to parse issues)
5. Issues (extracted from a report and formatted based on a template)
#Download #Link:-
https://github.com/faloker/purify
Purify:-- All-in-one tool for #managing #vulnerability #reports.
The goal of #Purify to be an easy-in-use and efficient tool to simplify a workflow of managing #vulnerabilities delivered from various #tools.
Purify is designed to #analyze the report of any tool if the report is in #JSON or #XML format. This means you don't need any special plug-ins to #process reports from your selection of tools.
Collect all #security findings in one place, review/validate/track them, collaborate, get notifications, export them into tracking systems (e.g. Jira) and so on.
The logic hierarchy of Purify is simple:
1. Project (the root component)
2. Units (the direct child of a project)
3. Reports (belong to a unit)
4. Templates (attached to a report and used to parse issues)
5. Issues (extracted from a report and formatted based on a template)
#Download #Link:-
https://github.com/faloker/purify