top of page

Changes is the only thing which never change
IT news & Information Technology Comparison


kerbrute
Kerbrute is an open-source command-line tool made for attacking Active Directory (AD) domains with the Kerberos protocol. Red teams,...


Hackers Target Recruiters with Fake Job Applications
Hackers use fake job applications to target recruiters. The cybercriminal gang FIN6 is using a clever new method to infiltrate HR...


Osintgram: OSINT Tool for Instagram
Osintgram is an open-source intelligence (OSINT) tool designed for collecting publicly available information from Instagram profiles....


NIVOS is a WIFI hacking tool
NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating...


System Design for Uber Find Nearby Drivers
Uber uses real-time GPS data, algorithms, and mapping technology to find nearby drivers. The app sends the rider's GPS location to Uber's...


Coercer
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through many methods. Features: Lists...


linWinPwn
linWinPwn is a bash script that automates a number of Active Directory Enumeration and Vulnerability checks. The script uses a number of...


Snaffler
Snaffler is an advanced credential scanner/collector for Active Directory environments. With a great README . Snaffler uses a system of...


BloodHound
An application used to visualize active directory environments. A quick way to visualise attack paths and understand victims' active...


Coercer
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through many methods. Features: Lists...


ADFSpoof
Created by Doug Bienstock @doughsec while at Mandiant FireEye. ADFSpoof has two main functions: Given the EncryptedPFX blob from the AD...
Jenkins reverse shell
If you gain access to a jenkins script console you can use this to gain a reverse shell on the node. r = Runtime.getRuntime() p =...
Forwarding Ports
Sometimes, after gaining access to an endpoint there are local ports. Making these internal ports external routable can help for lateral...


Upgrading shell to meterpreter
Shells ( https://infinitelogins.com/tag/payloads/ ) After getting basic shell access to an endpoint a meterpreter is nicer to continue...
Enabling RDP
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f netsh...
bottom of page