reconcore
1.93K subscribers
1.16K photos
164 videos
298 files
2.5K links
#pentest #vulnerability #research #malware #analysis #redteam #blueteam #tools #cve #rce #lpe

#offensivesecurity #methods #technique

The channel does not call for any action.
The posts are taken from public sources.
The @reconcore is not responsible.
Download Telegram
Онлайн 🛠 инструменты для работы с JWT

JSON Web Token - специальный формат токена, который позволяет безопасно(в идеале 😁) передавать данные между клиентом и сервером.

Состоит из трёх частей: заголовок, пейлоад и подпись

Мой любимый - https://token.dev
По классике - https://jwt.io
Еще неплохой вариант
Отдельно декодер для Flask Session Cookie

Пример простейшей реализации на Python 🐍
import json
import hmac
import hashlib
import base64
import uuid

header = {"typ": "JWT", "alg": "HS256"}
payload = {"name": "exited3n", "isAdmin": True}
secret = str(uuid.uuid4())


def jwt_gen(header: dict, payload: dict, secret: str) -> bytes:
jwt_parts = []
json_header = json.dumps(header).encode()
json_payload = json.dumps(payload).encode()
jwt_parts.append(base64.urlsafe_b64encode(json_header))
jwt_parts.append(base64.urlsafe_b64encode(json_payload))

merge_payload_header = b'.'.join(jwt_parts)

signature = hmac.new(secret.encode(), merge_payload_header, hashlib.sha256).digest()
jwt_parts.append(base64.urlsafe_b64encode(signature))

return b'.'.join(jwt_parts)

print(f'Secret: {secret}')
print(jwt_gen(header, payload, secret))


#jwt #token #flask #python
⚙️SploitScan v0.13.0


Установка в 🐧 Debian like:
sudo apt install sploitscan


Github
:
git clone https://github.com/xaitax/SploitScan.git
cd sploitscan
pip install -r requirements.txt


PyPi:
pip install --user sploitscan


Источники PoC'ов:
➡️GitHub
➡️ExploitDB
➡️VulnCheck (нужен free API key)
➡️Packet Storm
➡️Nuclei


Импорт из:
Nessus (.nessus)
Nexpose (.xml)
OpenVAS (.xml)
Docker (.json)


API ключи поддерживаемых сервисов (config.json)
{
"vulncheck_api_key": "",
"openai_api_key": "",
"google_api_key": "",
"grok_api_key": "",
"deepseek_api_key": ""
}


Поиск по CVE:
sploitscan CVE-2024-1709
sploitscan CVE-2024-1709 CVE-2024-21413


Поиск по ключевым словам:
sploitscan -k "Outlook Express"


Импорт и экспорт:
sploitscan --import-file path/to/yourfile.nessus --type nessus

sploitscan CVE-2024-1709 -e {json,csv,html}


Помощь AI:
sploitscan --ai openai CVE-2024-21413

┌───[ 🤖 AI-Powered Risk Assessment ]
|
| 1. Risk Assessment
| -------------------
| ...

#sploitscan #poc #cve #python
OSINT Tube
#python tool to automate the collection of YouTube channel info by ID: date of registration, number of views/subscribers/videos, earnings and other details. Use in combination with XARGS and other Python tools for YouTube #osint #socmint
1
Python OSINT Notebook
- Core Tools & Libraries
- Installation & Configuration
- Using OSINT Tools via CLI
- Python Scripting with OSINT Libraries
- Combining Tools in a Script
- OSINT Data Integration
#osint #python
2
bloodhound-quickwin

Простой скрипт для извлечения полезных данных из Neo4j базы, которую использует Bloodhound
Наглядно выводит информацию в консоль, коротко и по делу

python3 bhqc.py -h
python3 bhqc.py -p passwordNeo4JHere -d domain.local --heavy

#redteam #bloodhound #soft #python @reconcore
11
Python uv v0.9.3
install linux:
curl -LsSf https://astral.sh/uv/install.sh | sh
install windows:
powershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex"

Home
Docs
Start uv

#python #uvx #venv #uv @reconcore
👍1
REMOTE WINDOWS CREDENTIAL DUMP WITH SHADOW SNAPSHOTS: EXPLOITATION AND DETECTION
Техника удалённого извлечения локальных учётных данных Windows (SAM) через Shadow Snapshots, что позволяет получать доступ к необходимым веткам реестра (SAM, SYSTEM, SECURITY) через SMB, без запуска исполняемого кода на целевой машине.

[SECRETSDUMP] New Dump Method - Shadow Snapshot Method via WMI
impacket-secretsdump -use-remoteSSMethod “./Admin:1234@192.168.1.161”

#python #smb #wmi #kerberos #impacket #netbios #dcom #msrpc #dcerpc @reconcore
Python for Cybersecurity.zip
1.5 GB
Python for Cybersecurity | Infosec Skills
├─ 1. Introduction to Python for Cybersecurity
├─ 2. Python for PRE-ATT&CK
├─ 3. Python for intial access
├─ 4. Python for execution
├─ 5. Python for persistence
├─ 6. Python for privilege escalation
├─ 7. Python for defense evasion
├─ 8. Python for credential access
├─ 9. Python for discovery
├─ 10. Python for lateral movement
├─ 11. Python for collection
├─ 12. Python for command-and-control
├─ 13. Python exfiltration
├─ 14. Python for impact
├─ 15. Python for active defense: Decoys
├─ 16. Python for active defense: Network
├─ 17. Python for active defense: Monitoring
└─ 18. Python for Cybersecurity Cyber Range

#cybersecurity #infosec #python @reconcore
Mobile Forensics.zip
1.1 GB
Mobile Forensic | Infosec Skills
├─ Introduction to Mobile Forensics
├─ Mobile Forensics Process
├─ Android Forensics
├─ iOS Forensics
└─ Windows Phone and Features Phone Forensics

#cybersecurity #infosec #mobile #forensics @reconcore
Windows Registry Forensics.zip
1.7 GB
Windows Registry Forensics | Infosec Skills
├─ Introduction to the Windows Registry
├─ Preparing to Examine the Windows Registry
├─ NTUser.Dat Hive File Analysis
├─ SAM Hive File
├─ Software Hive File
├─ System Hive File
├─ USRClass.dat Hive File
├─ AmCache Hive File
└─ Windows Registry Forensic Project

#cybersecurity #research #infosec #windows #forensic @reconcore
🔥2
ArkhamMirror
Local-first AI-powered document intelligence platform for investigative journalism

#python #opensource #osint #sqlite #data #visualization #embeddings #llm #localllm @reconcore
update: commix
Automated All-in-One OS Command Injection Exploitation Tool.
Usage examples

#commix #python #pentest #injection #tools #web @reconcore
hexstrike-ai
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capabilities.
www.hexstrike.com/

#pentest #mcp #artificial #python #intelligence #linux #ctf #tools #security #cybersecurity @reconcore
1
EVA
AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, contextual analysis, and multi-backend AI integration.

#offensivesecurity #python #linux #cli #automation #intelligence #pentest #ctf #postexploitation #pe #vulnerability #assessment #llm #cybersecurity @reconcore
ExecSentry — Arbitrary Binary Execution Vulnerability Scanner
ExecSentry is a professional-grade, rule-based security scanner designed to detect Arbitrary Binary Execution (ABE) vulnerabilities in: Web applications, Backend microservices, Local software components, CI/CD pipelines, Plugin-based systems, Script runners and scheduled tasks

#tools #python #vulnerability #scanner @reconcore
BOF_RunPe
Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles for stealthy operations and efficient output handling.

#python #windows #automation #scripts #incident #response #re #hunting #tools #malware #analysis #forensics #security #bof #pe #runpe #exploit #dev @reconcore
ZeroPulse: Modern Command & Control (C2) Platform with Cloudflare Tunnel Integration
Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built with FastAPI & React

#javascript #python #ssh #backdoor #powershell #cloudflare #rat #pentest #postexploitation #winrm #linux #kali #c2 #redteam #commandandcontrol #fastapi #framework @reconcore
Media is too big
VIEW IN TELEGRAM
cheatengine-mcp-bridge
Connect Cursor, Copilot & Claude directly to Cheat Engine via MCP. Automate reverse engineering, pointer scanning, and memory analysis using natural language.

#engine #code #llm #python #debugging #automation #mcp #re #pentest #memory #analysis #ctf #tools @reconcore