pyfiscan: A Local Web Application Vulnerability Scanner!

A problem with remote web application vulnerability scanners is that sometimes they have false positives. The only way to get good results is by launching an actual exploit, which if not treated with caution can lead to problems with the web application itself. This is where pyfiscan comes into picture and helps you perform a non-intrusive vulnerability scan on your own web application.

pyfiscan
pyfiscan

Continue reading “pyfiscan: A Local Web Application Vulnerability Scanner!”

PwnBack: Wayback Machine Leveraging Burp Extender Plugin!

This post is about a functionality which was untill today was not automated, yet very important in real world and bug bounty scenarios. The name is – PwnBack, a open source Burp Extender plugin, coded in JAVA which leverages the Wayback search engine and generates a sitemap accordingly.

PwnBack
PwnBack

Continue reading “PwnBack: Wayback Machine Leveraging Burp Extender Plugin!”

howmanypeoplearearound: Detect People Around You!

This is a short post about howmanypeoplearearound, an open source tool in Python that can help you identify the number of people in the vicinity of your WiFi connection.

howmanypeoplearearound
howmanypeoplearearound

Continue reading “howmanypeoplearearound: Detect People Around You!”

Wanacrypt: What Do We Know About It As Of Now?

Since Friday this week has been most eventful because of a malware – Wanacrypt, infecting thousands of computer networks in a jiffy. As speculated, it leveraged a very potent exploit that was made public by the Shadow Brokers. The name of the exploit is ETERNALBLUE, which was used by the Equation Group to exploit a large number of systems right untill Windows 10. List of Equation Group Exploits lists the exploits and their targets.

Wanacrypt
Wanacrypt

Continue reading “Wanacrypt: What Do We Know About It As Of Now?”

Invoke-Obfuscation: A PowerShell Command & Script Obfuscator!

This is a short post about a cool PowerShell script – Invoke-Obfuscation that can help us a lot post exploitation. Why PowerShell? It is because, this shell and scripting language is already present on most modern Windows operating systems. It also has memory only execution capabilities that can help you evade anti-viruses and the likes, with almost no logging in the eventlog! Imagine if you are able to execute PowerSploit, obfuscating all your “stuff”!

Invoke-Obfuscation
Invoke-Obfuscation

Continue reading “Invoke-Obfuscation: A PowerShell Command & Script Obfuscator!”

Jackhammer: A Vulnerability Assessment Collaboration Tool!

A lot many good things are being done in Docker. Jackhammer is another good example of this. The authors have gone ahead and put almost everything you would need for vulnerability assessment and vulnerability management, dockerized it, made it an all-in-one tool and put it up for us to use! A few other security related docker projects can be found here.

Jackhammer
Jackhammer

Continue reading “Jackhammer: A Vulnerability Assessment Collaboration Tool!”

SecretServerSecretStealer: Decrypt Thycotic Server Passwords!

Exciting things are being done in PowerShell now-a-days and it is becoming like Python. A good example is my last post about PivotAll. This post is about another such tool – SecretServerSecretStealer.

SecretServerSecretStealer
SecretServerSecretStealer

Continue reading “SecretServerSecretStealer: Decrypt Thycotic Server Passwords!”