Cyberonix

Cyberonix Contact information, map and directions, contact form, opening hours, services, ratings, photos, videos and announcements from Cyberonix, Digital creator, KOLKATA.

08/10/2023

11/03/2023

- Quickly Extracts 's, Email Addresses, , Files, Credit Cards, Social Secuirty Numbers And More From Text

DataSurgeon (ds) is a versatile tool designed for incident response, *******on testing, and challenges. It allows for the extraction of various types of sensitive information including emails, phone numbers, hashes, credit cards, URLs, IP addresses, MAC addresses, SRV DNS records and a lot more!

:- https://github.com/Drew-Alleman/DataSurgeon

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

  - Comprehensive Static Code Analysis Tool For   Apps That Is Based On The   MASVS FrameworkAPKHunt is a comprehensive ...
06/03/2023

- Comprehensive Static Code Analysis Tool For Apps That Is Based On The MASVS Framework

APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code.

- https://github.com/Cyber-Buddy/APKHunt

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

18/02/2023

-gui - Tool With GUI For

DNSRecon is a and tool written in Python, which allows you to perform different tasks, such as enumeration of standard records for a defined domain (A, NS, SOA, and MX). Top-level domain expansion for a defined domain.

With this graph-oriented user interface, the different records of a specific domain can be observed, classified and ordered in a simple way.

:- https://github.com/micro-joan/DNSrecon-gui

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

 -  -   Clipboard Data TransferThis tool helps you to send files in highly restricted environments such as Citrix,  ,  ,...
17/02/2023

- - Clipboard Data Transfer

This tool helps you to send files in highly restricted environments such as Citrix, , , Guacamole.. using the clipboard function.

As long as you can send text through the clipboard, you can send files in text format, in small Base64 encoded chunks. Additionally, you can transfer files from a screenshot, using the native function of Microsoft Windows.

:- https://github.com/JoelGMSec/Invoke-Transfer

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

 - -  - Web Application With   Found In Real Cases, Both In   And In      Web Hacking Playground is a controlled web   e...
16/02/2023

- - - Web Application With Found In Real Cases, Both In And In

Web Hacking Playground is a controlled web environment. It consists of found in real cases, both in pentests and in Bug Bounty programs. The objective is that users can practice with them, and learn to detect and them.

Other topics of interest will also be addressed, such as: bypassing filters by creating custom payloads, executing chained attacks exploiting various vulnerabilities, developing proof-of-concept scripts, among others.

:- https://github.com/takito1812/web-hacking-playground

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

 -Backdoor-Generator - Obfuscated       With Flipper Zero And USB Rubber Ducky PayloadsReverse backdoor written in Power...
12/02/2023

-Backdoor-Generator - Obfuscated With Flipper Zero And USB Rubber Ducky Payloads

Reverse backdoor written in Powershell and obfuscated with . Allowing the backdoor to have a new signature after every run. Also can generate auto run scripts for Flipper Zero and USB Rubber Ducky.

:- https://github.com/Drew-Alleman/powershell-backdoor-generator

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

   - The Simple Way To Detect Heap Memory Pitfalls In C++ And CThis tool uses the taint analysis technique for static an...
11/02/2023

- The Simple Way To Detect Heap Memory Pitfalls In C++ And C

This tool uses the taint analysis technique for static analysis and aims to identify points of heap memory usage vulnerabilities in C and C++ languages. The tool uses a common approach in the first phase of static analysis, using tokenization to collect information.

The second phase has a different approach to common lessons of the legendary dragon book, yes the tool doesn't use AST or resources like LLVM following parsers' and standard tips. The approach present aims to study other ways to detect vulnerabilities, using custom vector structures and typical recursive traversal with ranking following taint point. So the result of the sum of these techniques is the Heap_detective.

:- https://github.com/CoolerVoid/heap_detective

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

  - Tool That Helps Blue Teams Pinpoint The Security Issues That Actually MatterBlueHound is an open-source tool that he...
06/02/2023

- Tool That Helps Blue Teams Pinpoint The Security Issues That Actually Matter

BlueHound is an open-source tool that helps pinpoint the security issues that actually matter. By combining information about user permissions, network access and unpatched , BlueHound reveals the paths attackers would take if they were inside your network.

:- https://github.com/zeronetworks/BlueHound

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

  - Extensible     Tool - DocumentationExtensible Azure Security Tool (Later referred as E.A.S.T) is tool for assessing ...
06/02/2023

- Extensible Tool - Documentation

Extensible Azure Security Tool (Later referred as E.A.S.T) is tool for assessing Azure and to some extent Azure AD security controls. Primary use case of EAST is Security data collection for evaluation in Azure Assessments. This information (JSON content) can then be used in various reporting tools, which we use to further correlate and investigate the data.

:- https://github.com/jsa2/EAST

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

 -Entropyscan - Tool To Detect Packed Or   Binaries Related To  , Finds Malicious Files And   Processes And Gives Output...
01/02/2023

-Entropyscan - Tool To Detect Packed Or Binaries Related To , Finds Malicious Files And Processes And Gives Output With Hashes

sandfly-entropyscan is a utility to quickly scan files or running processes and report on their entropy (measure of randomness) and if they are a Linux/Unix ELF type executable. Some malware for Linux is packed or encrypted and shows very high entropy. This tool can quickly find high entropy executable files and processes which often are malicious.

:-https://github.com/sandflysecurity/sandfly-entropyscan

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

  - .NET Application That Allows You To Obfuscate C #, VBA/VB6 (Macros), And   Source CodeCodecepticon is a .NET applica...
02/01/2023

- .NET Application That Allows You To Obfuscate C #, VBA/VB6 (Macros), And Source Code

Codecepticon is a .NET application that allows you to obfuscate C #, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams. What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically for AV/EDR evasion.

:- https://github.com/Accenture/Codecepticon

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

  - A   eBPF Rootkit With A Backdoor, C2, Library Injection, Ex*****on Hijacking, Persistence And Stealth Capabilities.T...
17/11/2022

- A eBPF Rootkit With A Backdoor, C2, Library Injection, Ex*****on Hijacking, Persistence And Stealth Capabilities.

TripleCross is inspired by previous implant designs in this area, notably the works of Jeff Dileo at 271, Pat Hogan at DEFCON 292, Guillaume Fournier and Sylvain Afchain also at DEFCON 293, and Kris NĂ³va's Boopkit4. We reuse and extend some of the techniques pioneered by these previous explorations of the offensive capabilities of eBPF technology.

:- https://github.com/h3xduck/TripleCross

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

  terminal, no special skills required. Once started, you can forget it is running. It provides several flags; each flag...
15/11/2022

terminal, no special skills required. Once started, you can forget it is running. It provides several flags; each flag lets you customize your experience and change PartyLoud behaviour according to your needs.

:- https://github.com/davideolgiati/PartyLoud

*******ontester
Visit Us:- http://www.cyberonix.in/
Call/WA:- +91-9830188199
E-mail:- [email protected]
an *******on School and Service Provider Company

Address

Kolkata
700091

Alerts

Be the first to know and let us send you an email when Cyberonix posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Cyberonix:

Share