Получи случайную криптовалюту за регистрацию!

HackGit

Логотип телеграм канала @hackgit — HackGit H
Логотип телеграм канала @hackgit — HackGit
Адрес канала: @hackgit
Категории: Софт, приложения
Язык: Русский
Количество подписчиков: 18.68K
Описание канала:

The channel was created for cybersecurity specialists.
• Offensive Security
• RedTeam
• Malware Research
• BugBounty
• OSINT
• etc
Disclaimer:
t.me/hackgit/2082
Donations - Ads:
t.me/hackgit/5423

Рейтинги и Отзывы

3.67

3 отзыва

Оценить канал hackgit и оставить отзыв — могут только зарегестрированные пользователи. Все отзывы проходят модерацию.

5 звезд

2

4 звезд

0

3 звезд

0

2 звезд

0

1 звезд

1


Последние сообщения 8

2022-06-23 16:16:03 ​​Fzshell

Fuzzy shell completions you didn't know you needed.

Fuzzy command line completer that fetches completions from sources predefined by a user. What does it mean? It means that now you can create custom completions for anything you want. All fzshell needs is a pattern to match and command to generate completion list. It can even insert a completion at any point in a line, not just at the end. See for yourself:

https://github.com/mnowotnik/fzshell

@HackGit
302 views13:16
Открыть/Комментировать
2022-06-23 16:16:02 ​​APIClarity

Reconstruct Open #API Specifications from real-time workload traffic seamlessly.

Microservices API challenges:
Not all applications have an OpenAPI specification available
How can we get this for legacy or external applications?
Detect whether microservices still use deprecated APIs (a.k.a. Zombie APIs)
Detect whether microservices use undocumented APIs (a.k.a. Shadow APIs)
Generate OpenAPI specifications without code instrumentation or modifying existing workloads (seamless documentation)

Solution:
Capture all API traffic in an existing environment using multiple traffic sources
Construct an OpenAPI specification by observing API traffic or upload a reference OpenAPI spec
Review, modify and approve automatically generated OpenAPI specs
Alert on any differences between the approved API specification and the API calls observed at runtime; detects shadow & zombie APIs
UI dashboard to audit and monitor the findings

https://github.com/openclarity/apiclarity

@HackGit
288 views13:16
Открыть/Комментировать
2022-06-23 16:16:01 ​​OpenAPI fuzzer

Black-box fuzzer that fuzzes APIs based on OpenAPI specification. All you need to do is to supply URL of the API and its specification. Find bugs for free!

https://github.com/matusf/openapi-fuzzer

@HackGit
310 views13:16
Открыть/Комментировать
2022-06-23 16:16:00 ​​brutas

Wordlists and passwords handcrafted with

A pretty comprehensive set of password dictionaries and wordlists designed for quick wins in red teaming scenarios or general blackbox pentesting.

https://github.com/tasooshi/brutas

@HackGit
333 views13:16
Открыть/Комментировать
2022-06-23 11:11:04 ​​Recon Hunter

A tool to map the attack surface discovery of any target.

Features:
Sub-Domains Passive Scraping
Sub-Domains Brute Force
Sub-Domains Wildcard Removal
Sub-Domains Spidering
Sub-Domains Takeover
IPs Enumeration using Censys
Port Scanning
Websites' Screenshots
Directories & Files Brute Force
Internet Archive
AWS S3 Buckets
Github Leaked Secrets

https://github.com/hassan0x/ReconHunter

@HackGit
386 views08:11
Открыть/Комментировать
2022-06-23 11:11:03 ​​Mangle

Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL). Mangle can remove known Indicators of Compromise (IoC) based strings and replace them with random characters, change the file by inflating the size to avoid EDRs, and can clone code-signing certs from legitimate files. In doing so, Mangle helps loaders evade on-disk and in-memory scanners.

https://github.com/optiv/Mangle

#av #edr #memory #evasion #redteam
363 views08:11
Открыть/Комментировать
2022-06-23 11:11:02 ​​Schemathesis

Schemathesis is a modern API testing tool for web applications built with Open API and GraphQL specifications.

It reads the application schema and generates test cases, which will ensure that your application is compliant with its schema (read more about how it works in our research paper).

The application under test could be written in any language; the only thing you need is a valid API schema in a supported format.

Simple to use and yet powerful to uncover hard-to-find errors thanks to the property-based testing approach backed by state-of-the-art Hypothesis library.

Features:
Open API: Schema conformance, explicit examples, stateful testing;
GraphQL: queries generation;
Multi-worker test execution;
Storing and replaying tests;
ASGI / WSGI support;
Generated code samples (cURL, Python);
Docker image;
Customizable checks & test generation

https://github.com/schemathesis/schemathesis

@HackGit
334 views08:11
Открыть/Комментировать
2022-06-23 11:11:01 ​​ElevatedEvents

EventViewer UAC bypass via .NET Deserialization discovered by @OrangeTsai made into a Reflective DLL to use with Cobalt Strike.

Supports direct execution of executables, and doesn't rely on spawning cmd.exe through mmc.exe as shown in the original POC. However due to this command agruements are not supported.

As this UAC bypass is currently detected by Defender, a simple bypass is utilized that renames the file back to the original after its created to avoid detection.

https://github.com/jsecu/ElevatedEvents

@HackGit
329 views08:11
Открыть/Комментировать
2022-06-23 11:11:00 Forensic Imaging quickstarts!

https://github.com/jnbdz/forensic-imaging-quickstarts

@HackGit
370 views08:11
Открыть/Комментировать
2022-06-23 08:50:10 ​​Remote Exploitation Technique For CVE 2022-31626

https://github.com/CFandR-github/PHP-binary-bugs/tree/main/cve_2022_31626_remote_exploit

#php #cve
420 views05:50
Открыть/Комментировать