Получи случайную криптовалюту за регистрацию!

HackGit

Логотип телеграм канала @hackgit — HackGit H
Логотип телеграм канала @hackgit — HackGit
Адрес канала: @hackgit
Категории: Софт, приложения
Язык: Русский
Количество подписчиков: 21.29K
Описание канала:

The channel was created for cybersecurity specialists.
• Offensive Security
• RedTeam
• Malware Research
• BugBounty
• OSINT
• etc
Disclaimer:
t.me/hackgit/2082
Donations - Ads:
t.me/hackgit/5423

Рейтинги и Отзывы

3.67

3 отзыва

Оценить канал hackgit и оставить отзыв — могут только зарегестрированные пользователи. Все отзывы проходят модерацию.

5 звезд

2

4 звезд

0

3 звезд

0

2 звезд

0

1 звезд

1


Последние сообщения 35

2022-05-03 15:15:00wifi-password

Quickly fetch your WiFi password and if needed, generate a QR code of your WiFi to allow phones to easily connect.

Works on macOS and Linux, Windows

https://github.com/sdushantha/wifi-password
187 views12:15
Открыть/Комментировать
2022-05-03 14:14:00 Package Analysis

This repo contains a few components to aid in the analysis of open source packages, in particular to look for malicious software.

For examples of what this project has detected, checkout the case studies

This code is designed to work with the Package Feeds project, and originally started there.

The components are:
A scheduler - creates jobs for the analysis worker from Package Feeds.
Analysis (one-shot analyze and worker) - collects package behavior data through static and dynamic analysis of each package.
A loader - pushes the analysis results into BigQuery.

The goal is for all of these components to work together and provide extensible, community-run infrastructure to study behavior of open source packages and to look for malicious software. We also hope that the components can be used independently, to provide package feeds or runtime behavior data for anyone interested.

https://github.com/ossf/package-analysis
217 views11:14
Открыть/Комментировать
2022-05-03 14:14:00Rip Raw

Small tool to analyse the memory of compromised Linux systems. It is similar in purpose to Bulk Extractor, but particularly focused on extracting system Logs from memory dumps from Linux systems. This enables you to analyse systems without needing to generate a profile.

This is not a replacement for tools such as Rekall and Volatility which use a profile to perform a more structured analysis of memory.

Rip Raw works by taking a Raw Binary such as a Memory Dump and carves files and logs using:

Text/binary boundaries
File headers and file magic
Log entries

Then puts them in a zip file for secondary processing by other tools such as Cado Response or a SIEM such as Splunk (examples below).

https://github.com/cado-security/rip_raw
192 views11:14
Открыть/Комментировать
2022-05-03 10:04:12 PlanFuzz

Novel dynamic testing tool to automatically discover semantic DoS vulnerabilities in Autonomous Driving (AD) behavioral planning.

Semantic DoS vulnerability refers to the vulnerabilities inside AD planning which can be exploited by external attacker and lead to overly-conservative decisions.

https://github.com/ASGuard-UCI/PlanFuzz

Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks
https://sites.google.com/view/cav-sec/planfuzz
261 views07:04
Открыть/Комментировать
2022-05-03 09:52:38PoC for CVE-2022-24707

SQL Injection Vulnerability on Puncher plugin. A POST request can be crafted to exploit SQL Injection and leak database contents.

https://github.com/Altelus1/CVE-2022-24707

#redteam #hackers #exploit #inject #cve #poc
327 views06:52
Открыть/Комментировать
2022-05-02 16:16:00 Sharperner

Simple executable generator with encrypted shellcode.

Sharperner is a tool written in CSharp that generates a .NET dropper with AES and XOR obfuscated shellcode.

Features:
PE binary
Process Hollowing
PPID Spoofing
Random generated AES key and iv
Final Shellcode, Key, and IV are translated to morse code

.NET binary:
AES + XOR encrypted shellcode
APC Process Injection (explorer.exe)
Random function names
Random generated AES key and iv
Final Shellcode, Key, and IV are translated to morse code

https://github.com/aniqfakhrul/Sharperner
135 views13:16
Открыть/Комментировать
2022-05-02 16:16:00Malwarescanner

Simple Malware Scanner Written In Python.

Very basic malware Scanner by hash comparison
Sometimes this can be needed when an incident response.
If you found new or suspicious files when you do response, you want to check out where these files exist in systems. so then you may need like this tool. this is a demo version. not complete. you have to change and modify code and make it yours.
Let me know if there are any changes required or additional features need it.

https://github.com/password123456/malwarescanner
116 views13:16
Открыть/Комментировать
2022-05-02 15:15:00 DDexec

In Linux in order to run a program it must exist as a file, it must be accessible in some way through the file system hierarchy (this is just how execve() works).

This file may reside on disk or in ram (tmpfs, memfd) but you need a filepath. This has made very easy to control what is run on a Linux system, it makes easy to detect threats and attacker's tools or to prevent them from trying to execute anything of theirs at all (e. g. not allowing unprivileged users to place executable files anywhere).

https://github.com/arget13/DDexec
169 views12:15
Открыть/Комментировать
2022-05-02 11:11:00XSSTRON

Powerful Chromium Browser to find XSS Vulnerabilites automatically while browsing web, it can detect many case scenarios with support for POST requests too

https://github.com/RenwaX23/XSSTRON

#chrome #soft #infosec #web #xss #soft
246 views08:11
Открыть/Комментировать
2022-05-02 09:35:58PowerLadon

Ladon Scanner For #PowerShell.

PortScan/OnlinePC/ VulScan/ Struts2/ Weblogic/ Exploit/GetShell/ MS17010

Ladon is a multi-threaded plug-in integrated scanning artifact for large #network penetration, including port scanning, service identification, network assets, password blasting, high-risk vulnerability detection, and one-click GetShell, supporting batch A/B/C segments and cross Network segment scanning, support URL, host, #Domain name list scanning.

The 5.5 version has 39 function modules built-in, which can quickly obtain the target network surviving host IP, #computer name, workgroup, shared resource, network card address, operating system version, website, and sub-domain name through multiple protocols and methods.

https://github.com/k8gege/PowerLadon
333 views06:35
Открыть/Комментировать