Reading view
AgentSmith HIDS β Host Based Intrusion Detection
padre β Padding Oracle Attack Exploiter Tool
Privacy Implications of Web 3.0 and Darknets
DataSurgeon β Extract Sensitive Information (PII) From Logs
Pwnagotchi β Maximize Crackable WPA Key Material For Bettercap
HardCIDR β Network CIDR and Range Discovery Tool
Socialscan β Command-Line Tool To Check For Email And Social Media Username Usage
CFRipper β CloudFormation Security Scanning & Audit Tool
CredNinja β Test Credential Validity of Dumped Credentials or Hashes
assetfinder β Find Related Domains and Subdomains
Karkinos β Beginner Friendly Penetration Testing Tool
Aclpwn.Py β Exploit ACL Based Privilege Escalation Paths in Active Directory
Vulhub β Pre-Built Vulnerable Docker Environments For Learning To Hack
LibInjection β Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
Grype β Vulnerability Scanner For Container Images & Filesystems
APT-Hunter β Threat Hunting Tool via Windows Event Log
Socialscan β Command-Line Tool To Check For Email And Social Media Username Usage
CFRipper β CloudFormation Security Scanning & Audit Tool
CredNinja β Test Credential Validity of Dumped Credentials or Hashes
assetfinder β Find Related Domains and Subdomains
Karkinos β Beginner Friendly Penetration Testing Tool
Aclpwn.Py β Exploit ACL Based Privilege Escalation Paths in Active Directory
Vulhub β Pre-Built Vulnerable Docker Environments For Learning To Hack
LibInjection β Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
Grype β Vulnerability Scanner For Container Images & Filesystems
APT-Hunter β Threat Hunting Tool via Windows Event Log
GitLab Watchman β Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an application that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally β this includes code, commits, wiki pages and more.
GitLab Watchman searches GitLab for internally shared projects and looks at:
- Code
- Commits
- Wiki pages
- Issues
- Merge requests
- Milestones
For the following data:
- GCP keys and service account files
- AWS keys
- Azure keys and service account files
- Google API keys
- Slack API tokens & webhooks
- Private keys (SSH, PGP, any other misc private key)
- Exposed tokens (Bearer tokens, access tokens, client_secret etc.)
- S3 config files
- Passwords in plaintext
- CICD variables exposed publicly
- and more
Using GitLab Watchman to Audit Gitlab For Sensitive Data
GitLab Watchman will be installed as a global command, use as follows:
usage: gitlab-watchman [-h] --timeframe {d,w,m,a} --output
{file,stdout,stream} [--version] [--all] [--blobs]
[--commits] [--wiki-blobs] [--issues] [--merge-requests]
[--milestones] [--comments]
Monitoring GitLab for sensitive data shared publicly
optional arguments:
-h, --help show this help message and exit
--version show program's version number and exit
--all Find everything
--blobs Search code blobs
--commits Search commits
--wiki-blobs Search wiki blobs
--issues Search issues
--merge-requests Search merge requests
--milestones Search milestones
--comments Search comments
required arguments:
--timeframe {d,w,m,a}
How far back to search: d = 24 hours w = 7 days, m =
30 days, a = all time
--output {file,stdout,stream}
Where to send results
You can run GitLab Watchman to look for everything, and output to default Stdout:
gitlab-watchman --timeframe a --all
Or arguments can be grouped together to search more granularly.
GKE Auditor β Detect Google Kubernetes Engine Misconfigurations
GKE Auditor is a Java-based tool to detect Google Kubernetes Engine misconfigurations, it aims to help security and development teams streamline the configuration process and save time looking for generic bugs and vulnerabilities.
[ad name=βDarknet_Body_468_Linksβ]
The tool consists of individual modules called Detectors, each scanning for a specific vulnerability.
Installing and Using GKE Auditor to Detect Google Kubernetes Engine Misconfigurations
Installation
git clone https://github.com/google/gke-auditor
cd ./gke-auditor/
./build.sh
Usage
The tool has to be built by running the build.sh script first.