KitPloit
11,003 FOLLOWERS
Leading source of security tools, hacking tools, cybersecurity, and network security. Blog posts cover exploits, malware, Windows, Linux, Android, iPhone, and MAC OS.
KitPloit
10m ago
Infromations Web Application Security
install :
sudo apt install python3 python3-pippip3 install termcolorpip3 install googlepip3 install optioncompletepip3 install bs4pip3 install prettytablegit clone https://github.com/Matrix07ksa/HackerInfo/cd HackerInfochmod +x HackerInfo./HackerInfo -h
python3 HackerInfo.py -d www.facebook.com -f pdf [+] <-- Running Domain_filter_File ....-->[+] <-- Searching [www.facebook.com] Files [pdf] ....-->https://www.facebook.com/gms_hub/share/dcvsda_wf.pdfhttps://www.facebook.com/gms_hub/share/facebook_groups_for_pages.pdfhttps://www.fac ..read more
KitPloit
10h ago
Free to use IOC feed for various tools/malware. It started out for just C2 tools but has morphed into tracking infostealers and botnets as well. It uses shodan.io/">Shodan searches to collect the IPs. The most recent collection is always stored in data; the IPs are broken down by tool and there is an all.txt.
The feed should update daily. Actively working on making the backend more reliable
Honorable Mentions
Many of the Shodan queries have been sourced from other CTI researchers:
BushidoToken
Michael Koczwara
ViriBack
Gi7W0rm
@Glacius_
Huge shoutout to them!
Thanks to BertJanCyber for ..read more
KitPloit
6d ago
PoCs for Kernelmode rootkit techniques research or education. Currently focusing on Windows OS. All modules support 64bit OS only.
NOTE
Some modules use ExAllocatePool2 API to allocate kernel pool memory. ExAllocatePool2 API is not supported in OSes older than Windows 10 Version 2004. If you want to test the modules in old OSes, replace ExAllocatePool2 API with ExAllocatePoolWithTag API.
Environment
All modules are tested in Windows 11 x64. To test drivers, following options can be used for the testing machine:
Enable Loading of Test Signed Drivers
debugging-in-windbg--cdb--or-nt ..read more
KitPloit
1w ago
Steal browser cookies for edge, chrome and firefox through a BOF or exe! Cookie-Monster will extract the WebKit master key, locate a browser process with a handle to the Cookies and Login Data files, copy the handle(s) and then filelessly download the target. Once the Cookies/Login Data file(s) are downloaded, the python decryption script can help extract those secrets! Firefox module will parse the profiles.ini and locate where the logins.json and key4.db files are located and download them. A seperate github repo is referenced for offline decryption.
BOF Usage
Usage: cookie-monster ..read more
KitPloit
1w ago
NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly.
Default Cmd:
Windows Event Logs:
Using NoArgs:
Windows Event Logs:
Functionality Overview
The tool primarily operates by intercepting process creation calls made by the Windows API function CreateProcessW. When a process is initiated, this function is responsible for spawning the new process, along with any specified com ..read more
KitPloit
1w ago
A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented by login pages like Microsoft.
This POC code is built for using this new BITB with Evilginx, and a Microsoft Enterprise phishlet.
Before diving deep into this, I recommend that you first check my talk at BSides 2023, where I first introduced this concept along with important details on how to craft the "perfect" phishing attack. ▶ Watch Video
☕︎ Buy Me A Coffee
Video Tutorial: ?
Disclaimer
This tool is for educational and research purposes only. It demonst ..read more
KitPloit
1w ago
This tool compilation is carefully crafted with the purpose of being useful both for the beginners and veterans from the malware analysis world. It has also proven useful for people trying their luck at the cracking underworld.
It's the ideal complement to be used with the manuals from the site, and to play with the numbered theories mirror.
Advantages
To be clear, this pack is thought to be the most complete and robust in existence. Some of the pros are:
It contains all the basic (and not so basic) tools that you might need in a real life scenario, be it a simple or a complex one.
The ..read more
KitPloit
1w ago
Porch Pirate started as a tool to quickly uncover Postman secrets, and has slowly begun to evolve into a multi-purpose reconaissance / OSINT framework for Postman. While existing tools are great proof of concepts, they only attempt to identify very specific keywords as "secrets", and in very limited locations, with no consideration to recon beyond secrets. We realized we required capabilities that were "secret-agnostic", and had enough flexibility to capture false-positives that still provided offensive value.
Porch Pirate enumerates and presents sensitive results (global secrets, unique hea ..read more
KitPloit
1w ago
APKDeepLens is a Python based tool designed to scan Android applications (APK files) for security vulnerabilities. It specifically targets the OWASP Top 10 mobile vulnerabilities, providing an easy and efficient way for developers, penetration testers, and security researchers to assess the security posture of Android apps.
Features
APKDeepLens is a Python-based tool that performs various operations on APK files. Its main features include:
APK Analysis -> Scans Android application package (APK) files for security vulnerabilities.
OWASP Coverage -> Covers OWASP Top 10 vulnerabilities ..read more
KitPloit
2w ago
This method utilizes TLS callbacks to execute a payload without spawning any threads in a remote process. This method is inspired by Threadless Injection as RemoteTLSCallbackInjection does not invoke any API calls to trigger the injected payload.
Quick Links
Maldev Academy Home
Maldev Academy Syllabus
Related Maldev Academy Modules
New Module 34: TLS Callbacks For Anti-Debugging
New Module 35: Threadless Injection
Implementation Steps
The PoC follows these steps:
Create a suspended process using the CreateProcessViaWinAPIsW function (i.e. RuntimeBroker.exe).
Fetc ..read more