Advanced Search
Search Results
120 total results found
PDF to Hashcat
#!/usr/bin/env python # Copyright (c) 2013 Shane Quigley, < shane at softwareontheside.info > # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in ...
PDF to John
#!/usr/bin/env python3 # This software is Copyright (c) 2023 Benjamin Dornel <[email protected]> # and it is hereby released to the general public under the following terms: # Redistribution and use in source and binary forms, with or without # modific...
Steg
#!/usr/bin/env python3 """ Steganography Extraction Tool This script extracts hidden data from images using various steganography techniques. Usage: python steg_extract.py <image_file> """ import sys import os import numpy as np from PIL import Image import ...
Binary Log Parser and Anomaly Detector
#!/usr/bin/env python3 """ Binary Log Parser and Anomaly Detector This script parses a custom binary format for login attempt logs and identifies potentially compromised accounts based on anomalous behavior. Format: - username_length: 4-byte integer (big-en...
Forensic Report
Investigator Information David RizzoB.S. Cyber SecurityWilmington University, New Castle, DelawareDigital Forensic Examiner Case Details Subject: Digital Forensics Examination ReportOffence: Illegal purchase, sale, or trade of owlsAccused: Sarah McAvoyD...
Elastic Stack Deployment
The files in this repository were used to configure the network depicted below. These files have been tested and used to generate a live ELK deployment on Azure. They can be used to either recreate the entire deployment pictured above. Alternatively, select...
FileBeat Config
######################## Filebeat Configuration ############################ # This file is a full configuration example documenting all non-deprecated # options in comments. For a shorter configuration example, that contains only # the most common options, pl...
FileBeat
GNU nano 4.8 filebeat.yml --- - name: Installing and Launching Filebeat hosts: webservers become: yes tasks: - name: Download filebeat deb command: curl -L -O https://artifacts.e...
Docker Install
--- - name: InstallDVWA hosts: webservers become: true tasks: - name: Uninstall apache httpd apt: name: apache2 state: absent - name: docker.io apt: update_cache: yes name: docker.io state: present - na...
ELK Install
--- - hosts: elk become: true tasks: - name: Set vm.max_map_count to 262144 ansible.posix.sysctl: name: vm.max_map_count value: 262144 state: present reload: yes - name: docker.io ...
MetricBeat Config
###################### Metricbeat Configuration Example ####################### # This file is an example configuration file highlighting only the most common # options. The metricbeat.reference.yml file from the same directory contains all the # supported op...
MetricBeat
GNU nano 4.8 metricbeat.yml --- - name: Install metric beat hosts: webservers become: true tasks: - name: Download metricbeat command: curl -L -O https://artifacts.elastic.co/d...
Ansible Config
# config file for ansible -- https://ansible.com/ # =============================================== # nearly all parameters can be overridden in ansible-playbook # or with command line flags. ansible will read ANSIBLE_CONFIG, # ansible.cfg in the current work...
Hosts
# This is the default ansible 'hosts' file. # # It should live in /etc/ansible/hosts # # - Comments begin with the '#' character # - Blank lines are ignored # - Groups of hosts are delimited by [header] elements # - You can enter hostnames or ip addres...
Project Write Up
RedTeam vs. BlueTeam Devices Kali Capstone Elk Set Up Beats Need to set up beats in order to log the attacks. Steps to set up: Log into Capstone vagrant:tnargav sudo su filebeat modules enable apache filebeat setup metricbeat mod...
The Important of the Scope of Engagement
Penetration testing is a critical part of securing businesses; however, without limitations, it can be very damaging to an organization. The scope of engagement provides a concrete definition of what the penetration tester is allowed to do. Without that list, ...
Notes
Setting up Beats on Capstone This is done for logging that attacks before attacking Log into capstone - Vagrant:tnargav Sudo su Filebeat modules enable apace Filebeat setup Metricbeat modules enable apache Metricbeat setup Packetbeat setup Systemctl restar...
Symmetric Encryption
Overview Symmetric encryption, or secret-key encryption, is a fundamental cryptographic method where the same key (the secret key) is used for both encryption (converting plaintext to ciphertext) and decryption (recovering the plaintext from the ciphertext). T...