Modules

osquery

osquery is an operating system instrumentation framework for OS X/macOS, Windows, and Linux. The tools make low-level operating system analytics and monitoring both performant and intuitive. What is osquery? osquery exposes an operating system as a high-performance relational database. This allows you to write SQL-based queries to explore operating system data. With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes. SQL tables are implemented via a simple plugin and extensions API. A variety of tables already exist and more are being written: https://osquery.io/tables. To best understand the […]

Patator

Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors. More information about Patator https://github.com/lanjelot/patator

THC-Hydra 8.6

Hydra is born more than 10 years ago, this page is used as a recap of the functionalities it provides, but also the differences in feature sets, services coverage and code between the most popular network authentication cracker tools available. Each feature is compared against Hydra as of the current version. This table is updated as new features are added to the project. If you find any inaccuracies on this page please do not hesitate to contact us. [0x00] News and Changelog Check out the feature sets and services coverage page – including a speed comparison against ncrack and medusa (yes, we […]

SpiderFoot 2.9.0

SpiderFoot 2.9.0 is now out, totaling almost 60 data collection/analysis modules for your reconnaissance, footprinting and OSINT needs. Here’s what’s new since 2.7.0 was announced here… *9* new modules: -Base64 string finder -Binary string searches (identifies file meta data) -Censys.io data collection (device info) -Cymon.io data collection (threat intel) -Hunter.io data collection (e-mail addresses) -psbdmp.com data collection (password dumps/breaches) -ThreatCrowd data collection (threat intel) -Squatted domain identification -Wikileaks.org data searches Search by e-mail addresses in addition to IPs, subnets, domains and hosts Massive reduction in false positives of junk files and social media accounts German, French and Spanish dictionaries added […]

SpiderFoot 2.7.0

SpiderFoot 2.7.0: An open source intelligence automation tool to automate the process of gathering intelligence about a given target: IP address, domain name, hostname or network subnet. SpiderFoot can be used offensively, i.e. as part of a black-box penetration test to gather information about the target or defensively to identify what information your organisation is freely providing for attackers to use against you. Six (6) new modules: BotScout.com search for malicious e-mail addresses MalwarePatrol.net search IBM X-Force Threat Exchange search Amazon S3 bucket search Phone number identification Public vulnerability search (PunkSpider and XSSposed) Authentication and HTTPS support Scan by use […]

Adquisición de datos volátiles

File System Security PowerShell Module 3.2.3

Source are available on CodePlex https://ntfssecurity.codeplex.com/ Download https://gallery.technet.microsoft.com/scriptcenter/1abd77a5-9c0b-4a2b-acef-90dbb2b84e85/file/48905/1/NTFSSecurity%201.3.zip Introduction Managing permissions with PowerShell is only a bit easier than in VBS or the command line as there are no cmdlets for most day-to-day tasks like getting a permission report or adding permission to an item. PowerShell only offers Get-Acl and Set-Acl but everything in between getting and setting the ACL is missing. This module closes the gap. Documentation For documentation plese refer to: NTFSSecurity Tutorial 1 – Getting, adding and removing permissions NTFSSecurity Tutorial 2 – Managing NTFS Inheritance and Using Privileges Comments, feature requests and bug reports are very […]

Cmdlets relacionados con tareas básicas y de administración en el sistema operativo Windows

Gestión del hardware Gestión de archivos Agregar/Eliminar software Actualizar Gestión de procesos Programación de tareas Gestión de usuarios Gestión del almacenamiento Gestión de la red Copias de seguridad Reparación del sistema Rendimiento del sistema Gestión del hardware

Ejemplos

Gestión de archivos

Ejemplos

  Agregar/Eliminar software

Ejemplos

  Actualizar

Ejemplos

  Gestión de procesos

Ejemplos

  Programación de tareas

Ejemplos

  Gestión de usuarios

  Gestión del almacenamiento

Ejemplos

  Gestión de la red

Ejemplos

  Copias de seguridad

  Reparación del sistema […]