Photos from National Cyber Security Services's post
DevAudit:-- Open-source, cross-platform, multi-purpose #security #auditing #tool targeted at #developers and #teams adopting #DevOps and #DevSecOps that detects security #vulnerabilities at multiple levels of the solution stack.
Features:-
1. Cross-platform with a #Docker image also available.
2. #CLI interface.
3. Continuously updated vulnerabilities data.
4. Audit #operating #system and #development package dependencies.
5. Audit application #server configurations.
6. Audit application #configurations.
7. Audit application #code by #static analysis.
8. #Remote agentless auditing.
9. Agentless Docker container auditing.
10. #GitHub repository auditing.
11. #PowerShell support.
#Download #Link:-
https://github.com/OSSIndex/DevAudit
DevAudit:-- Open-source, cross-platform, multi-purpose #security #auditing #tool targeted at #developers and #teams adopting #DevOps and #DevSecOps that detects security #vulnerabilities at multiple levels of the solution stack.
Features:-
1. Cross-platform with a #Docker image also available.
2. #CLI interface.
3. Continuously updated vulnerabilities data.
4. Audit #operating #system and #development package dependencies.
5. Audit application #server configurations.
6. Audit application #configurations.
7. Audit application #code by #static analysis.
8. #Remote agentless auditing.
9. Agentless Docker container auditing.
10. #GitHub repository auditing.
11. #PowerShell support.
#Download #Link:-
https://github.com/OSSIndex/DevAudit
Photos from National Cyber Security Services's post
AutoXploit:-- Fast #exploitation based on #metasploit.
Auto #Payload Generator & #Exploiter
#AutoXploit is simply a shell script that helps you to generate Metasploit payloads and starts the #meterpreter handler quickly. At times, #security #researchers have to generate payloads and listen to the connection through handler constantly, AutoXploit not only allows you to quickly generate payloads but it also has an option to start the handler automatically.
#Download #Link:-
https://github.com/Yashvendra/AutoXploit
AutoXploit:-- Fast #exploitation based on #metasploit.
Auto #Payload Generator & #Exploiter
#AutoXploit is simply a shell script that helps you to generate Metasploit payloads and starts the #meterpreter handler quickly. At times, #security #researchers have to generate payloads and listen to the connection through handler constantly, AutoXploit not only allows you to quickly generate payloads but it also has an option to start the handler automatically.
#Download #Link:-
https://github.com/Yashvendra/AutoXploit
Forwarded from NusurTech 2 ©️
IDACyber- Data Visualization Plugin for IDA Pro
IDACyber:-- #Data #Visualization #Plugin for #IDA #Pro.
#IDACyber is an interactive data visualization plugin for IDA Pro. It consists of external "color filters" that transform raw data bytes into a canvas that can be used to inspect and navigate data interactively. Depending on the filter in context, browsing this data visually can reveal particular structures and patterns, literally from a zoomed-out perspective.
Requirements
1. IDA 7.3+
2. This #IDAPython project is compatible with #Python3 only. For compatibility with older versions of IDA, you may want to check out the Python2 branch of this project. The Python2 branch is no longer maintained and thus contains outdated code.
#Download #Link:-
https://github.com/patois/IDACyber
(Feed generated with FetchRSS (http://fetchrss.com/))
IDACyber:-- #Data #Visualization #Plugin for #IDA #Pro.
#IDACyber is an interactive data visualization plugin for IDA Pro. It consists of external "color filters" that transform raw data bytes into a canvas that can be used to inspect and navigate data interactively. Depending on the filter in context, browsing this data visually can reveal particular structures and patterns, literally from a zoomed-out perspective.
Requirements
1. IDA 7.3+
2. This #IDAPython project is compatible with #Python3 only. For compatibility with older versions of IDA, you may want to check out the Python2 branch of this project. The Python2 branch is no longer maintained and thus contains outdated code.
#Download #Link:-
https://github.com/patois/IDACyber
(Feed generated with FetchRSS (http://fetchrss.com/))
Forwarded from NusurTech 2 ©️
Forwarded from NusurTech 2 ©️
Forwarded from NusurTech 2 ©️
A game for computer geeks in which you use your SQL knowledge and SQL commands to figure out the murder mystery 💪
The Hacking Library pinned «https://www.programmer-tech.ml/2019/12/ecstasy.html»
Forwarded from Caito Ceed
Photos from National Cyber Security Services's post
Ropper:-- Display #information about files in different file formats and find gadgets to build #rop chains for different #architectures (x86/x86_64, #ARM/ #ARM64, #MIPS, #PowerPC, #SPARC64). For #disassembly, ropper uses the awesome Capstone #Framework.
$ git clone https://github.com/sashs/ropper.git
$ cd ropper
$ git submodule init
$ git submodule update
$ ./Ropper.py
#Download #Link:-
https://github.com/sashs/Ropper
Ropper:-- Display #information about files in different file formats and find gadgets to build #rop chains for different #architectures (x86/x86_64, #ARM/ #ARM64, #MIPS, #PowerPC, #SPARC64). For #disassembly, ropper uses the awesome Capstone #Framework.
$ git clone https://github.com/sashs/ropper.git
$ cd ropper
$ git submodule init
$ git submodule update
$ ./Ropper.py
#Download #Link:-
https://github.com/sashs/Ropper