Photos from National Cyber Security Services's post
Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.
Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.
#Download #Link:-
https://github.com/marcosd4h/memhunter
Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.
Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.
#Download #Link:-
https://github.com/marcosd4h/memhunter
Forwarded from NusurTech 2 ©️
YouTube
استخراج البيانات الوصفية من الصور الملتقطة بالهاتف و معرفة نوع الجهاز و موقعه و عدة معلومات اخرى
#محمد_تركي_العلوش #Programmer_Tech
قناتنا التلغرام
https://t.me/Programmer_Tech
الموقع
https://www.programmer-tech.com
صفحة الفيسبوك
https://www.facebook.com/ProgrammerTech.net
قناة اليوتيوب 1:
https://www.youtube.com/ahmadkaissar
قناة اليوتيوب 2:
https…
قناتنا التلغرام
https://t.me/Programmer_Tech
الموقع
https://www.programmer-tech.com
صفحة الفيسبوك
https://www.facebook.com/ProgrammerTech.net
قناة اليوتيوب 1:
https://www.youtube.com/ahmadkaissar
قناة اليوتيوب 2:
https…
Photos from National Cyber Security Services's post
Maltrail:-- #Malicious #traffic #detection #system.
Maltrail is a #malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from #domain name (e.g. zvpprsensinaix.com for #Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or #HTTP User-Agent header value (e.g. #sqlmap for automatic #SQL #injection and #database takeover tool). Also, it uses (optional) advanced heuristic #mechanisms that can help in the discovery of unknown threats (e.g. new #malware).
#Downlaod #Link:-
https://github.com/stamparm/maltrail
Maltrail:-- #Malicious #traffic #detection #system.
Maltrail is a #malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from #domain name (e.g. zvpprsensinaix.com for #Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or #HTTP User-Agent header value (e.g. #sqlmap for automatic #SQL #injection and #database takeover tool). Also, it uses (optional) advanced heuristic #mechanisms that can help in the discovery of unknown threats (e.g. new #malware).
#Downlaod #Link:-
https://github.com/stamparm/maltrail
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.
By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.
After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.
#Download #Link:-
https://github.com/globocom/secDevLabs
secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.
By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.
After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.
#Download #Link:-
https://github.com/globocom/secDevLabs
By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.
After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.
#Download #Link:-
https://github.com/globocom/secDevLabs
secDevLabs:-- A #laboratory for learning #secure #web #development in a #practical manner.
By provisioning local #environments via docker-compose, you will learn how the most #critical web #application #security risks are #exploited and how these #vulnerable codes can be fixed to mitigate them.
After forking this repository, you will find multiple intended vulnerable apps based on real-life scenarios in various languages such as #Golang, #Python and #PHP. A good start would be installing the ones you are most familiar with. You can find instructions to do this on each of the apps.
#Download #Link:-
https://github.com/globocom/secDevLabs
Photos from National Cyber Security Services's post
UFONet - #Denial of #Service Toolkit.
#UFONet is a #toolkit designed to launch #DDoS and #DoS #attacks.it runs on many platforms. It requires #Python (>=3) and requires :-#whois,#pycurl,#geoip,#crypto,#scanpy,#requests.
#Download #Link:-
https://github.com/epsylon/ufonet
UFONet - #Denial of #Service Toolkit.
#UFONet is a #toolkit designed to launch #DDoS and #DoS #attacks.it runs on many platforms. It requires #Python (>=3) and requires :-#whois,#pycurl,#geoip,#crypto,#scanpy,#requests.
#Download #Link:-
https://github.com/epsylon/ufonet
Photos from National Cyber Security Services's post
hidden-tear- #ransomware #open-#sources
It's a ransomware-like file #crypter sample which can be modified for specific purposes.
Features:-
-Uses #AES #algorithm to #encrypt files.
-Sends encryption key to a #server.
-Encrypted files can be #decrypt in #decrypter program with encryption key.
-Creates a text file in Desktop with given message.
-Small file size (12 KB)
-Doesn't detected to #antivirus programs
#Download #Link:-
https://github.com/goliate/hidden-tear
hidden-tear- #ransomware #open-#sources
It's a ransomware-like file #crypter sample which can be modified for specific purposes.
Features:-
-Uses #AES #algorithm to #encrypt files.
-Sends encryption key to a #server.
-Encrypted files can be #decrypt in #decrypter program with encryption key.
-Creates a text file in Desktop with given message.
-Small file size (12 KB)
-Doesn't detected to #antivirus programs
#Download #Link:-
https://github.com/goliate/hidden-tear