Photos from National Cyber Security Services's post
Android-Security-Evaluation-Environment:-- An #emulated, disposable, efficient #Android #pentesting and #security evaluation #environment.
Creating a #penetration #testing environment using Android Studio: Android #Virtual #Devices (#AVD)
#Downlaod #Link:-
https://github.com/TheSeanis/Android-Security-Evaluation-Environment
Android-Security-Evaluation-Environment:-- An #emulated, disposable, efficient #Android #pentesting and #security evaluation #environment.
Creating a #penetration #testing environment using Android Studio: Android #Virtual #Devices (#AVD)
#Downlaod #Link:-
https://github.com/TheSeanis/Android-Security-Evaluation-Environment
GitHub
TheSeanis/Android-Security-Evaluation-Environment
An emulated, disposable, efficient Android pentesting and security evaluation environment. - TheSeanis/Android-Security-Evaluation-Environment
CrackMapExtreme:-- For all your #network #pentesting needs.
This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.
Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.
The same cme feels, just a bit different under-the-hood.
#Doownload #Link:-
https://github.com/awsmhacks/CrackMapExtreme
CrackMapExtreme:-- For all your #network #pentesting needs.
This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.
Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.
The same cme feels, just a bit different under-the-hood.
#Doownload #Link:-
https://github.com/awsmhacks/CrackMapExtreme
This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.
Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.
The same cme feels, just a bit different under-the-hood.
#Doownload #Link:-
https://github.com/awsmhacks/CrackMapExtreme
CrackMapExtreme:-- For all your #network #pentesting needs.
This started off as a #python3 update to #CrackMapExec.
As I was converting, several issues came up due to dependencies that I ended up changing a bit of how things work.
Not all #modules have been carried over yet and this is still a work in progress.
Feel free to open issues, I know of a few (usually due to target #OS compatibility)
but will still use the issue log to track/address.
The same cme feels, just a bit different under-the-hood.
#Doownload #Link:-
https://github.com/awsmhacks/CrackMapExtreme
Photos from National Cyber Security Services's post
ClobberTime:-- #ClobberTime is a 3graphical frontend that provides functionality for the manipulation of #MAC (Modified, Accessed, Created) #timestamps during Windows Red Team or #Pentesting #engagements, without modifying current #system time and without invoking the #traditional timestomp binary. It is also designed as an #educational tool to demonstrate the difference between userland timestamps (which can be easily manipulated) and timestamps recorded in the #filesystem MFT.
#Windows #RedTeam
#Downlaod #Link:-
https://github.com/vhoudoverdov/Windows-RedTeam/tree/master/ClobberTime
ClobberTime:-- #ClobberTime is a 3graphical frontend that provides functionality for the manipulation of #MAC (Modified, Accessed, Created) #timestamps during Windows Red Team or #Pentesting #engagements, without modifying current #system time and without invoking the #traditional timestomp binary. It is also designed as an #educational tool to demonstrate the difference between userland timestamps (which can be easily manipulated) and timestamps recorded in the #filesystem MFT.
#Windows #RedTeam
#Downlaod #Link:-
https://github.com/vhoudoverdov/Windows-RedTeam/tree/master/ClobberTime
Photos from National Cyber Security Services's post
Hyperion:-- Hyperion-Project #Automate #recognition Pentesting "passif".
The program #Hyperion is a program called "Automate", playing the role of #Swiss #Knife in the step of recognition, #pentesting.
This one, gathers several programs in 1 only, to facilitate the so-called "passive" Pentesting step. The objective is to facilitate the testing of networks, #machines, services, as well as the detection of potential security #flaws constituting the #audited network.
#Download #Link:-
https://github.com/F0rbidden-Equation/Hyperion
Hyperion:-- Hyperion-Project #Automate #recognition Pentesting "passif".
The program #Hyperion is a program called "Automate", playing the role of #Swiss #Knife in the step of recognition, #pentesting.
This one, gathers several programs in 1 only, to facilitate the so-called "passive" Pentesting step. The objective is to facilitate the testing of networks, #machines, services, as well as the detection of potential security #flaws constituting the #audited network.
#Download #Link:-
https://github.com/F0rbidden-Equation/Hyperion
Photos from National Cyber Security Services's post
PwnDoc:-- #Pentesting #report generator.
#PwnDoc is a #pentest reporting #application making it simple and easy to write your findings and generate a customizable docx report. The main goal is to have more time to Pwn and less time to Doc by mutualizing data like #vulnerabilities between users.
#Download #Link:-
https://github.com/pwndoc/pwndoc
PwnDoc:-- #Pentesting #report generator.
#PwnDoc is a #pentest reporting #application making it simple and easy to write your findings and generate a customizable docx report. The main goal is to have more time to Pwn and less time to Doc by mutualizing data like #vulnerabilities between users.
#Download #Link:-
https://github.com/pwndoc/pwndoc
Photos from National Cyber Security Services's post
DroneSploit:-- #Drone #Pentesting #Framework console.
This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.
#Download #Link:-
https://github.com/dhondta/dronesploit
DroneSploit:-- #Drone #Pentesting #Framework console.
This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.
#Download #Link:-
https://github.com/dhondta/dronesploit