Data Exfiltration – Evasion – Social Engineering

Cloakify Toolset * Data Exfiltration In Plain Sight * Evade DLP/MLS Devices * Social Engineering of Analysts * Evade AV…

A powerful DNS toolkit for python

nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS)…

Ask questions about your Linux and OSX infrastructure

Kolide is an agentless osquery web interface and remote api server. Kolide uses the osquery remote apis to do ad-hoc…

Unit testing framework for C

Check is a unit testing framework for C. It features a simple interface for defining unit tests, putting little in…

5 Phases of Penetration Testing

Phase 1 – Reconnaissance Gathering preliminary data or intelligence on your target. Reconnaissance can be performed actively or passively. In…

Change Ubuntu server from DHCP to a static IP address

1. Open interfaces file for editing: sudo nano / etc/network/interfaces 2. Change interfaces file contents to: auto eth0 iface eth0…

Analyze Microsoft Office OLE2 files

libolecf is a library to access the OLE 2 Compound File (OLECF) format. The OLE 2 Compound File format is…

Malware Memory Footprint Analysis

VolDiff is a Python script that leverages the Volatility framework to identify malware threats on Windows 7 memory images. VolDiff…

Intercept, Inspect, Modify and Replay HTTP traffic

mitmproxy is an interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers. mitmproxy allows HTTP traffic flows to…

Command line HTTP client

HTTPie is a command line HTTP client. Its goal is to make CLI interaction with web services as human-friendly as…

Next Page