PyREBox

PyREBox

PyREBox PyREBox is a Python scriptable Reverse Engineering sandbox that is based on QEMU. It provides dynamic analysis and debugging features to aid in reverse engineering, such as inspecting a running QEMU VM, modifying memory or registers, and instrumenting execution with Python scripts. It also offers a shell based on IPython with a range of commands and a Python API. Warning! PyREBox is a powerful tool that can be used to reverse engineer software and systems. Use caution when running scripts or commands, as they can potentially cause irreparable damage to your system.

Peepdf

Peepdf

Peepdf Peepdf is a Python tool designed to help security researchers analyze PDF documents and detect possible harm. It offers all the components needed for analysis, including viewing all objects, filtering, encoding, and parsing different versions and encrypted files. Additionally, it supports Javascript and shellcode analysis as well as creating, modifying, and obfuscating PDF files. Warning! Peepdf is a powerful tool that can be used to analyze PDF files for potential security threats. It is important to use this tool responsibly, as misuse may result in harm to your computer or network.

Sooty

Sooty

Sooty Sooty is a tool designed to assist security analysts in automating their workflow, freeing up time for more in-depth analysis. Developed with the help of Tines.io, the SOAR Platform for Enterprise Security Teams, its features can be found in more detail on GitHub: https://github.com/TheresAFewConors/Sooty   Warning! This tool is provided for educational purposes only. It should not be used for malicious purposes. The developers of Sooty are not responsible for any damages caused by the misuse of this tool.

VirusTotal

VirusTotal

VirusTotal VirusTotal is an online service that allows users to upload files from their computer and analyze them with over 70 antivirus scanners and URL/domain blocklisting services to detect malicious activity.   Warning! VirusTotal can only detect malicious content, but cannot protect against it. It is important to use reliable antivirus software and keep it up to date to safeguard against malicious content.

Shodan

Shodan

Shodan Shodan is a search engine that allows users to locate and identify connected devices on the Internet. It provides users with useful information that helps with decision-making. Warning! When using Shodan, be aware that your searches may reveal sensitive information about connected devices and networks. Make sure to take appropriate security measures when using the service, such as using a secure connection and keeping a record of your searches.

PhishTank

PhishTank

PhishTank is a free platform that allows users to gather and share information related to phishing attacks. Additionally, the platform provides an open API for developers and researchers to integrate anti-phishing data into their applications.   Warning! Be aware of potential phishing scams and never provide personal or financial information to someone claiming to be from a legitimate company or website. Always verify the identity of the sender and check the website URL before submitting any information.   #help #cyber #FOCSC #cyberattack #cyberawareness #cybersecuritytraining #cybersecurity #computerscience

‘;–have i been pwned?

';--have i been pwned?

‘;–have i been pwned?   The service allows users to search across multiple data breaches to see if their email address has been compromised. It provides a list of all the breaches a user has been involved in, as well as details about the breach and what type of data was exposed. It also offers advice on how to protect yourself in the future.   Warning!   Be aware that any online accounts you have could be vulnerable to data breaches, so it’s important to check on Have I Been Pwned to see if any of your accounts have been compromised. Don’t Get Pwned! Protect Your Data with Have I Been Pwned

Arbitrary Code Execution

Arbitrary Code Execution

Arbitrary Code Execution In an arbitrary code execution attack, an attacker is able to execute or run commands on a victim’s computer. This can allow the attacker to take control of the victim’s computer, steal sensitive information, or cause other harm.   Warning! There are a few things you can do to avoid these attacks, such as keeping your software up to date and being careful when opening email attachments or clicking on links.

Indicator of compromise

Indicator of compromise

Indicator of compromise A possible indicator of compromise (IOC) is a piece of objective evidence that identifies an attack or threat. This could be a file, registry key, or network signature associated with a malware sample, or a domain or IP address known to be used by an attacker.   How to Spot Indicators of Compromise & Protect Your Data

Fuzzing

Fuzzing

Fuzzing Injection of random data into a software program in order to find system failures, memory leaks, error handling issues, and improper input validation.