PyRDP – RDP Monster-In-The-Middle (Mitm) And Library For Python With The Ability To Watch Connections Live Or After The Fact

PyRDP is a Python Remote Desktop Protocol (RDP) Monster-in-the-Middle (MITM) tool and library. It features a few tools: RDP Monster-in-the-Middle Logs credentials used when connecting Steals data copied to the clipboard Saves a copy of the files transferred over the network Crawls shared drives in the background and saves them locally Saves replays of connectionsRead More

LDAPmonitor – Monitor Creation, Deletion And Changes To LDAP Objects Live During Your Pentest Or System Administration!

Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! With this tool you can quickly see if your attack worked and if it changed LDAP attributes of the target object. Features Feature Python (.py) CSharp (.exe) Powershell (.ps1) LDAPS support ✔️ ✔️ ✔️ Random delay in seconds between queriesRead More

Simple-Live-Data-Collection – Simple Live Data Collection Tool

How it works? 1- Build server 2- Connect with admin and client to server 3- To collect information, send the request to the server through the admin, and then to the client Installation git clone https://github.com/LetsDefend/Simple-Live-Data-Collection Server cd serverpython main.py Admin cd adminpython main.py Client cd clientpython main.py Change the “HOST” variable in main.py fileRead More

Tails 4.5 – Live System to Preserve Your Privacy and Anonymity

The Tails team is happy to publish Tails 4.5, the first version of Tails to support Secure Boot.This release also fixes many security vulnerabilities. You should upgrade as soon as possible. New features Secure Boot Tails now starts on computers with Secure Boot enabled.If your Mac displays the following error:Security settings do not allow this MacRead More

Memhunter – Live Hunting Of Code Injection Techniques

Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known malicious memory injection techniques. The detection process is performed through live analysis and without needing memory dumps. The toolRead More

X