Ghost Framework – An Android Post-Exploitation Framework That Exploits The Android Debug Bridge To R emotely Access An Android Device

About Ghost Framework Ghost Framework is an Android post-exploitation framework that exploits theAndroid Debug Bridge to remotely access an Android device. Ghost Frameworkgives you the power and convenience of remote Android device administration. Getting started Ghost installation To install Ghost Framework you shouldexecute the following commands. cd ghost chmod +x install.sh ./install.sh Ghost uninstallation ToRead More

Slipstream – NAT Slipstreaming Allows An Attacker To Remotely Access Any TCP/UDP Services Bound To A Victim Machine, Bypassing The Victim’s NAT/firewall, Just By The Victim Visiting A Website

NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall (arbitrary firewall pinhole control), just by the victim visiting a website. Developed by: @SamyKamkar // https://samy.pl Released: October 31, 2020 Source code: https://github.com/samyk/slipstream   animated version here generated with my fork of draw.io, allowing exportable edgeRead More

paradoxiaRAT – Native Windows Remote Access Tool

Paradoxia Remote Access Tool.  Features Paradoxia Console Feature Description Easy to use Paradoxia is extremely easy to use, So far the easiest rat! Root Shell – Automatic Client build Build Paradoxia Client easily with or without the icon of your choice. Multithreaded Multithreaded Console server, You can get multiple sessions. Toast Notifications Desktop notification onRead More

Rakkess – Kubectl Plugin To Show An Access Matrix For K8S Server Resources

Review Access – kubectl plugin to show an access matrix for server resources IntroHave you ever wondered what access rights you have on a provided kubernetes cluster? For single resources you can use kubectl auth can-i list deployments, but maybe you are looking for a complete overview? This is what rakkess is for. It listsRead More

Bastillion – A Web-Based SSH Console That Centrally Manages Administrative Access To Systems

Bastillion is a web-based SSH console that centrally manages administrative access to systems. Web-based administration is combined with management and distribution of user’s public SSH keys. Key management and administration is based on profiles assigned to defined users.Administrators can login using two-factor authentication with Authy or Google Authenticator. From there they can manage their publicRead More

Needle – Instant Access To You Bug Bounty Submission Dashboard On Various Platforms + Publicly Disclosed Reports + #Bugbountytip

Chrome extension for Instant access to your bug bounty submission dashboard of various platforms + publicly disclosed reports + #bugbountytip Needle is the only chrome extension you may need to have one click access to your bug submissions across various platforms. No need to create any bookmark, type on the url bar and have fussRead More

Vault – A Tool For Secrets Management, Encryption As A Service, And Privileged Access Management

Please note: We take Vault’s security and our users’ trust very seriously. If you believe you have found a security issue in Vault, please responsibly disclose by contacting us at [email protected] Website: https://www.vaultproject.io IRC: #vault-tool on Freenode Announcement list: Google Groups Discussion list: Google Groups Documentation: https://www.vaultproject.io/docs/ Tutorials: HashiCorp’s Learn Platform Certification Exam: Vault AssociateRead More

Wifipumpkin3 – Powerful Framework For Rogue Access Point Attack

wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.Main Features Rogue access point attack Man-in-the-middle attack Rogue Dns Server Captive portal attack (captiveflask) Intercept, inspect, modify and replay web trafficRead More

Awspx – A Graph-Based Tool For Visualizing Effective Access And Resource Relationships In AWS Environments

auspex [ˈau̯s.pɛks] noun: An augur of ancient Rome, especially one who interpreted omens derived from the observation of birds. awspx is a graph-based tool for visualizing effective access and resource relationships within AWS. It resolves policy information to determine what actions affect which resources, while taking into account how these actions may be combined toRead More

X