A tool written for cobalt-strike’s
execute-assembly command that allows for more efficent querying of AD.
Key Features Continue reading “ADSearch – A Tool To Help Query AD Via The LDAP Protocol”
HiJackThis Fork is a free utility for
Microsoft Windows that scans your computer for settings changed by adware, spyware, malware and other unwanted programs. Read more
This is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net-core application framework 3.1.The main idea of the code is to make it as readable as possible so that people have an idea of how this type of malware acts and works.
Continue reading “Baphomet – Basic Concept Of How A Ransomware Works”
Static analysis to search for vulnerabilities in WordPress plugins.
__ ____________ ___ ___ __
/ \ / \______ \/ | \ __ __ _____/ |_ ___________ \ \/\/ /| ___/ ~ \ | \/ \ __\/ __ \_ __ \ \ / | | \ Y / | / | \ | \ ___/| | \/ \__/\ / |____|____\___|_ /|____/|___| /__| \___ >__| \/ /_____/ \/ \/ \/ |__ Author: @JosueEncinar [*] Starting the process [*] Total plugins 87509 [*] Starting the analisys How to add a module The tool has been uploaded without regex, for the search you need to add your regular expressions. The key to reduce false positives is here, go for it. To know how to do this, check out modules/php/test.py and modules/js/test.py. It is not complicated. How to use To use the tool, follow the instructions below:
git clone https://github.com/Josue87/wp_hunter.git
cd wp_hunter pip3 install -r requirements.txt python3 wp_hunter.py The tests have been carried out with the Linux operating system
This is only an educational purposes only I am not responsible for further activities
Join my forum and learn more ethical hacking and penetration testing
Get me at alex14324.blogspot.com