Creando tu propio C2 con Python (Ingles) 📡🐍
https://g3tsyst3m.github.io/c2/python/Create-your-own-C2-using-Python-Part-1/
https://g3tsyst3m.github.io/c2/python/Create-your-own-C2-using-Python-Part-2/
https://g3tsyst3m.github.io/c2/python/Create-your-own-C2-using-Python-Part-3/
#articulo #c2 #python #dev
https://g3tsyst3m.github.io/c2/python/Create-your-own-C2-using-Python-Part-1/
https://g3tsyst3m.github.io/c2/python/Create-your-own-C2-using-Python-Part-2/
https://g3tsyst3m.github.io/c2/python/Create-your-own-C2-using-Python-Part-3/
#articulo #c2 #python #dev
G3tSyst3m's Infosec Blog
Create your own C2 using Python- Part 1
Back in the good ole days of my adolescence, I was fascinated with all things Metasploit. I was a ripe old teenager when Metasploit first came out, and I was enamored by it’s inginuity and multifaceted offerings. You could simply use it to get a shell,…
🤣1
Онлайн 🛠 инструменты для работы с JWT
JSON Web Token - специальный формат токена, который позволяет безопасно(в идеале 😁) передавать данные между клиентом и сервером.
Состоит из трёх частей: заголовок, пейлоад и подпись
Мой любимый - https://token.dev
По классике - https://jwt.io
Еще неплохой вариант
Отдельно декодер для Flask Session Cookie
Пример простейшей реализации на Python 🐍
#jwt #token #flask #python
JSON Web Token - специальный формат токена, который позволяет безопасно(в идеале 😁) передавать данные между клиентом и сервером.
Состоит из трёх частей: заголовок, пейлоад и подпись
Мой любимый - https://token.dev
По классике - https://jwt.io
Еще неплохой вариант
Отдельно декодер для Flask Session Cookie
Пример простейшей реализации на Python 🐍
import json
import hmac
import hashlib
import base64
import uuid
header = {"typ": "JWT", "alg": "HS256"}
payload = {"name": "exited3n", "isAdmin": True}
secret = str(uuid.uuid4())
def jwt_gen(header: dict, payload: dict, secret: str) -> bytes:
jwt_parts = []
json_header = json.dumps(header).encode()
json_payload = json.dumps(payload).encode()
jwt_parts.append(base64.urlsafe_b64encode(json_header))
jwt_parts.append(base64.urlsafe_b64encode(json_payload))
merge_payload_header = b'.'.join(jwt_parts)
signature = hmac.new(secret.encode(), merge_payload_header, hashlib.sha256).digest()
jwt_parts.append(base64.urlsafe_b64encode(signature))
return b'.'.join(jwt_parts)
print(f'Secret: {secret}')
print(jwt_gen(header, payload, secret))
#jwt #token #flask #python
Security Token Debugger
JWT Debugger
Create and Debug JWT Tokens
⚙️SploitScan v0.13.0
Установка в 🐧 Debian like:
Github:
PyPi:
Источники PoC'ов:
Импорт из:
API ключи поддерживаемых сервисов (config.json)
Поиск по CVE:
Поиск по ключевым словам:
Импорт и экспорт:
Помощь AI:
#sploitscan #poc #cve #python
Установка в 🐧 Debian like:
sudo apt install sploitscan
Github:
git clone https://github.com/xaitax/SploitScan.git
cd sploitscan
pip install -r requirements.txt
PyPi:
pip install --user sploitscan
Источники PoC'ов:
➡️GitHub
➡️ExploitDB
➡️VulnCheck (нужен free API key)
➡️Packet Storm
➡️Nuclei
Импорт из:
Nessus (.nessus)
Nexpose (.xml)
OpenVAS (.xml)
Docker (.json)
API ключи поддерживаемых сервисов (config.json)
{
"vulncheck_api_key": "",
"openai_api_key": "",
"google_api_key": "",
"grok_api_key": "",
"deepseek_api_key": ""
}Поиск по CVE:
sploitscan CVE-2024-1709
sploitscan CVE-2024-1709 CVE-2024-21413
Поиск по ключевым словам:
sploitscan -k "Outlook Express"
Импорт и экспорт:
sploitscan --import-file path/to/yourfile.nessus --type nessus
sploitscan CVE-2024-1709 -e {json,csv,html}
Помощь AI:
sploitscan --ai openai CVE-2024-21413
┌───[ 🤖 AI-Powered Risk Assessment ]
|
| 1. Risk Assessment
| -------------------
| ...
#sploitscan #poc #cve #python
OSINT Tube
#python tool to automate the collection of YouTube channel info by ID: date of registration, number of views/subscribers/videos, earnings and other details. Use in combination with XARGS and other Python tools for YouTube #osint #socmint
#python tool to automate the collection of YouTube channel info by ID: date of registration, number of views/subscribers/videos, earnings and other details. Use in combination with XARGS and other Python tools for YouTube #osint #socmint
❤1
Python OSINT Notebook
- Core Tools & Libraries
- Installation & Configuration
- Using OSINT Tools via CLI
- Python Scripting with OSINT Libraries
- Combining Tools in a Script
- OSINT Data Integration
#osint #python
- Core Tools & Libraries
- Installation & Configuration
- Using OSINT Tools via CLI
- Python Scripting with OSINT Libraries
- Combining Tools in a Script
- OSINT Data Integration
#osint #python
❤2
bloodhound-quickwin
Простой скрипт для извлечения полезных данных из Neo4j базы, которую использует Bloodhound
Наглядно выводит информацию в консоль, коротко и по делу
#redteam #bloodhound #soft #python @reconcore
Простой скрипт для извлечения полезных данных из Neo4j базы, которую использует Bloodhound
Наглядно выводит информацию в консоль, коротко и по делу
python3 bhqc.py -h
python3 bhqc.py -p passwordNeo4JHere -d domain.local --heavy
#redteam #bloodhound #soft #python @reconcore
Python uv v0.9.3
Home
Docs
Start uv
#python #uvx #venv #uv @reconcore
install linux:
curl -LsSf https://astral.sh/uv/install.sh | sh
install windows:
powershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex"
Home
Docs
Start uv
#python #uvx #venv #uv @reconcore
👍1
REMOTE WINDOWS CREDENTIAL DUMP WITH SHADOW SNAPSHOTS: EXPLOITATION AND DETECTION
[SECRETSDUMP] New Dump Method - Shadow Snapshot Method via WMI
#python #smb #wmi #kerberos #impacket #netbios #dcom #msrpc #dcerpc @reconcore
Техника удалённого извлечения локальных учётных данных Windows (SAM) через Shadow Snapshots, что позволяет получать доступ к необходимым веткам реестра (SAM, SYSTEM, SECURITY) через SMB, без запуска исполняемого кода на целевой машине.
[SECRETSDUMP] New Dump Method - Shadow Snapshot Method via WMI
impacket-secretsdump -use-remoteSSMethod “./Admin:1234@192.168.1.161”
#python #smb #wmi #kerberos #impacket #netbios #dcom #msrpc #dcerpc @reconcore
Python for Cybersecurity.zip
1.5 GB
Python for Cybersecurity | Infosec Skills
#cybersecurity #infosec #python @reconcore
├─ 1. Introduction to Python for Cybersecurity
├─ 2. Python for PRE-ATT&CK
├─ 3. Python for intial access
├─ 4. Python for execution
├─ 5. Python for persistence
├─ 6. Python for privilege escalation
├─ 7. Python for defense evasion
├─ 8. Python for credential access
├─ 9. Python for discovery
├─ 10. Python for lateral movement
├─ 11. Python for collection
├─ 12. Python for command-and-control
├─ 13. Python exfiltration
├─ 14. Python for impact
├─ 15. Python for active defense: Decoys
├─ 16. Python for active defense: Network
├─ 17. Python for active defense: Monitoring
└─ 18. Python for Cybersecurity Cyber Range
#cybersecurity #infosec #python @reconcore
Mobile Forensics.zip
1.1 GB
Mobile Forensic | Infosec Skills
#cybersecurity #infosec #mobile #forensics @reconcore
├─ Introduction to Mobile Forensics
├─ Mobile Forensics Process
├─ Android Forensics
├─ iOS Forensics
└─ Windows Phone and Features Phone Forensics
#cybersecurity #infosec #mobile #forensics @reconcore
Windows Registry Forensics.zip
1.7 GB
Windows Registry Forensics | Infosec Skills
#cybersecurity #research #infosec #windows #forensic @reconcore
├─ Introduction to the Windows Registry
├─ Preparing to Examine the Windows Registry
├─ NTUser.Dat Hive File Analysis
├─ SAM Hive File
├─ Software Hive File
├─ System Hive File
├─ USRClass.dat Hive File
├─ AmCache Hive File
└─ Windows Registry Forensic Project
#cybersecurity #research #infosec #windows #forensic @reconcore
🔥2
ArkhamMirror
#python #opensource #osint #sqlite #data #visualization #embeddings #llm #localllm @reconcore
Local-first AI-powered document intelligence platform for investigative journalism
#python #opensource #osint #sqlite #data #visualization #embeddings #llm #localllm @reconcore
update: commix
#commix #python #pentest #injection #tools #web @reconcore
Automated All-in-One OS Command Injection Exploitation Tool.
Usage examples
#commix #python #pentest #injection #tools #web @reconcore
hexstrike-ai
#pentest #mcp #artificial #python #intelligence #linux #ctf #tools #security #cybersecurity @reconcore
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capabilities.
www.hexstrike.com/
#pentest #mcp #artificial #python #intelligence #linux #ctf #tools #security #cybersecurity @reconcore
❤1
EVA
#offensivesecurity #python #linux #cli #automation #intelligence #pentest #ctf #postexploitation #pe #vulnerability #assessment #llm #cybersecurity @reconcore
AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, contextual analysis, and multi-backend AI integration.
#offensivesecurity #python #linux #cli #automation #intelligence #pentest #ctf #postexploitation #pe #vulnerability #assessment #llm #cybersecurity @reconcore
ExecSentry — Arbitrary Binary Execution Vulnerability Scanner
#tools #python #vulnerability #scanner @reconcore
ExecSentry is a professional-grade, rule-based security scanner designed to detect Arbitrary Binary Execution (ABE) vulnerabilities in: Web applications, Backend microservices, Local software components, CI/CD pipelines, Plugin-based systems, Script runners and scheduled tasks
#tools #python #vulnerability #scanner @reconcore
GitHub
GitHub - errorfiathck/execsentry: ExecSentry — Arbitrary Binary Execution Vulnerability Scanner
ExecSentry — Arbitrary Binary Execution Vulnerability Scanner - errorfiathck/execsentry
BOF_RunPe
#python #windows #automation #scripts #incident #response #re #hunting #tools #malware #analysis #forensics #security #bof #pe #runpe #exploit #dev @reconcore
Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles for stealthy operations and efficient output handling.
#python #windows #automation #scripts #incident #response #re #hunting #tools #malware #analysis #forensics #security #bof #pe #runpe #exploit #dev @reconcore
ZeroPulse: Modern Command & Control (C2) Platform with Cloudflare Tunnel Integration
#javascript #python #ssh #backdoor #powershell #cloudflare #rat #pentest #postexploitation #winrm #linux #kali #c2 #redteam #commandandcontrol #fastapi #framework @reconcore
Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built with FastAPI & React
#javascript #python #ssh #backdoor #powershell #cloudflare #rat #pentest #postexploitation #winrm #linux #kali #c2 #redteam #commandandcontrol #fastapi #framework @reconcore
Media is too big
VIEW IN TELEGRAM
cheatengine-mcp-bridge
#engine #code #llm #python #debugging #automation #mcp #re #pentest #memory #analysis #ctf #tools @reconcore
Connect Cursor, Copilot & Claude directly to Cheat Engine via MCP. Automate reverse engineering, pointer scanning, and memory analysis using natural language.
#engine #code #llm #python #debugging #automation #mcp #re #pentest #memory #analysis #ctf #tools @reconcore