<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[I Red Team DEV - Popular tools ]]></title>
		<link>https://ired.dev/</link>
		<description><![CDATA[I Red Team DEV - https://ired.dev]]></description>
		<pubDate>Tue, 05 May 2026 12:15:39 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Compiled tools for internal assessments]]></title>
			<link>https://ired.dev/showthread.php?tid=49</link>
			<pubDate>Sat, 26 Jul 2025 12:15:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=49</guid>
			<description><![CDATA[This repository is intended for pentesters and red teamers using a variety of offensive security tools during their assessments. The repository is a collection of useful tools suitable for assessments in internal environments. We fetch and compile the latest version of each tool on a regular basis and provide it to you as a release.<br />
You don't have to worry about updating and compiling the tools yourself. Just download the latest release and find all the awesome tools you will need in a single archive.<br />
<a href="https://github.com/Syslifters/offsec-tools" target="_blank" rel="noopener" class="mycode_url">https://github.com/Syslifters/offsec-tools</a>]]></description>
			<content:encoded><![CDATA[This repository is intended for pentesters and red teamers using a variety of offensive security tools during their assessments. The repository is a collection of useful tools suitable for assessments in internal environments. We fetch and compile the latest version of each tool on a regular basis and provide it to you as a release.<br />
You don't have to worry about updating and compiling the tools yourself. Just download the latest release and find all the awesome tools you will need in a single archive.<br />
<a href="https://github.com/Syslifters/offsec-tools" target="_blank" rel="noopener" class="mycode_url">https://github.com/Syslifters/offsec-tools</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[BrowserBruter]]></title>
			<link>https://ired.dev/showthread.php?tid=37</link>
			<pubDate>Sun, 06 Jul 2025 21:11:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=37</guid>
			<description><![CDATA[BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python-based tool leverages Selenium and Selenium-Wire to automate web form fuzzing, making it easier to identify potential vulnerabilities in web applications. <br />
<a href="https://github.com/netsquare/BrowserBruter" target="_blank" rel="noopener" class="mycode_url">https://github.com/netsquare/BrowserBruter</a><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://ired.dev/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=11" target="_blank" title="">banner.png</a> (Size: 114.6 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python-based tool leverages Selenium and Selenium-Wire to automate web form fuzzing, making it easier to identify potential vulnerabilities in web applications. <br />
<a href="https://github.com/netsquare/BrowserBruter" target="_blank" rel="noopener" class="mycode_url">https://github.com/netsquare/BrowserBruter</a><br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://ired.dev/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=11" target="_blank" title="">banner.png</a> (Size: 114.6 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Sn1per]]></title>
			<link>https://ired.dev/showthread.php?tid=23</link>
			<pubDate>Thu, 19 Jun 2025 06:21:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=62">zed</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=23</guid>
			<description><![CDATA[<img src="https://camo.githubusercontent.com/e54477e31deb2ed47c9d6ceae625819397196e59998df76640919d2cae2e7a7f/68747470733a2f2f736e3170657273656375726974792e636f6d2f696d616765732f536e3170657253656375726974792d41747461636b2d537572666163652d4d616e6167656d656e742d686561646572322e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...322e706e67]" class="mycode_img" /><br />
Attack Surface Management Platform<br />
Discover hidden assets and vulnerabilities in your environment<br />
[Find out more]<br />
<img src="https://camo.githubusercontent.com/d7dc92ffdd37b1682ad6ad709707680eab82f7dc3bc4a9fe13b0f112123fc09d/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d776f726b73706163652d6e6176696761746f72312d332e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...332e706e67]" class="mycode_img" /><br />
<br />
The ultimate pentesting toolkit<br />
Integrate with the leading commercial and open source vulnerability scanners to scan for the latest CVEs and vulnerabilities.<br />
<br />
<img src="https://camo.githubusercontent.com/4219bd8d7425bba9ce8e95fee08030c4ba75e7321186714c9006d26020f87c1b/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d776f726b73706163652d7265706f7274312d332e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...332e706e67]" class="mycode_img" /><br />
<br />
Automate the most powerful tools<br />
Security tools are expensive and time-consuming, but with Sn1per, you can save time by automating the execution of these open source and commercial tools to discover vulnerabilities across your entire attack surface.<br />
<br />
<img src="https://camo.githubusercontent.com/bd29c532185fa95f835e8cac98b0b87612caf5abbe7d6c3a9748a5b5d8c96143/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d686f73742d6c697374332d312e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...312e706e67]" class="mycode_img" /><br />
<br />
Find what you can't see<br />
Hacking is a problem that's only getting worse. But, with Sn1per, you can find what you can’t see—hidden assets and vulnerabilities in your environment.<br />
<br />
<img src="https://camo.githubusercontent.com/601264e3f92f1871cb8487e095cb0a886bf8ed875d16fc630c4c118a946112a6/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d686f73742d6c697374322d312e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...312e706e67]" class="mycode_img" /><br />
<br />
Discover and prioritize risks in your organization<br />
Sn1per is a next-generation information gathering tool that provides automated, deep, and continuous security for organizations of all sizes.<br />
<br />
<br />
<img src="https://camo.githubusercontent.com/99ce650db4fc7584a2913d65c8c580117098b47e5006d333d92e5a82c11c1a07/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d76756c6e65726162696c6974792d7265706f7274312d332e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...332e706e67]" class="mycode_img" /><br />
<br />
Github :  <a href="https://github.com/1N3/Sn1per" target="_blank" rel="noopener" class="mycode_url">https://github.com/1N3/Sn1per</a>]]></description>
			<content:encoded><![CDATA[<img src="https://camo.githubusercontent.com/e54477e31deb2ed47c9d6ceae625819397196e59998df76640919d2cae2e7a7f/68747470733a2f2f736e3170657273656375726974792e636f6d2f696d616765732f536e3170657253656375726974792d41747461636b2d537572666163652d4d616e6167656d656e742d686561646572322e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...322e706e67]" class="mycode_img" /><br />
Attack Surface Management Platform<br />
Discover hidden assets and vulnerabilities in your environment<br />
[Find out more]<br />
<img src="https://camo.githubusercontent.com/d7dc92ffdd37b1682ad6ad709707680eab82f7dc3bc4a9fe13b0f112123fc09d/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d776f726b73706163652d6e6176696761746f72312d332e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...332e706e67]" class="mycode_img" /><br />
<br />
The ultimate pentesting toolkit<br />
Integrate with the leading commercial and open source vulnerability scanners to scan for the latest CVEs and vulnerabilities.<br />
<br />
<img src="https://camo.githubusercontent.com/4219bd8d7425bba9ce8e95fee08030c4ba75e7321186714c9006d26020f87c1b/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d776f726b73706163652d7265706f7274312d332e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...332e706e67]" class="mycode_img" /><br />
<br />
Automate the most powerful tools<br />
Security tools are expensive and time-consuming, but with Sn1per, you can save time by automating the execution of these open source and commercial tools to discover vulnerabilities across your entire attack surface.<br />
<br />
<img src="https://camo.githubusercontent.com/bd29c532185fa95f835e8cac98b0b87612caf5abbe7d6c3a9748a5b5d8c96143/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d686f73742d6c697374332d312e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...312e706e67]" class="mycode_img" /><br />
<br />
Find what you can't see<br />
Hacking is a problem that's only getting worse. But, with Sn1per, you can find what you can’t see—hidden assets and vulnerabilities in your environment.<br />
<br />
<img src="https://camo.githubusercontent.com/601264e3f92f1871cb8487e095cb0a886bf8ed875d16fc630c4c118a946112a6/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d686f73742d6c697374322d312e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...312e706e67]" class="mycode_img" /><br />
<br />
Discover and prioritize risks in your organization<br />
Sn1per is a next-generation information gathering tool that provides automated, deep, and continuous security for organizations of all sizes.<br />
<br />
<br />
<img src="https://camo.githubusercontent.com/99ce650db4fc7584a2913d65c8c580117098b47e5006d333d92e5a82c11c1a07/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d76756c6e65726162696c6974792d7265706f7274312d332e706e67" loading="lazy"  alt="[Image: 68747470733a2f2f736e31706572736563757269...332e706e67]" class="mycode_img" /><br />
<br />
Github :  <a href="https://github.com/1N3/Sn1per" target="_blank" rel="noopener" class="mycode_url">https://github.com/1N3/Sn1per</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Fuji: Forensic Unattended Juicy Imaging]]></title>
			<link>https://ired.dev/showthread.php?tid=21</link>
			<pubDate>Tue, 17 Jun 2025 21:30:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=21</guid>
			<description><![CDATA[Fuji is a free, open source program for performing forensic acquisition of Mac computers. It should work on any modern Intel or Apple Silicon device, as it leverages standard executables provided by macOS.Fuji performs a so-called live acquisition (the computer must be turned on) of logical nature, i.e. it includes only existing files. The tool generates a DMG file that can be imported in several digital forensics programs.<br />
Link:<br />
<a href="https://github.com/Lazza/Fuji" target="_blank" rel="noopener" class="mycode_url">https://github.com/Lazza/Fuji</a><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://ired.dev/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=9" target="_blank" title="">screenshot.png</a> (Size: 189.11 KB / Downloads: 6)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Fuji is a free, open source program for performing forensic acquisition of Mac computers. It should work on any modern Intel or Apple Silicon device, as it leverages standard executables provided by macOS.Fuji performs a so-called live acquisition (the computer must be turned on) of logical nature, i.e. it includes only existing files. The tool generates a DMG file that can be imported in several digital forensics programs.<br />
Link:<br />
<a href="https://github.com/Lazza/Fuji" target="_blank" rel="noopener" class="mycode_url">https://github.com/Lazza/Fuji</a><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://ired.dev/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=9" target="_blank" title="">screenshot.png</a> (Size: 189.11 KB / Downloads: 6)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Builder for analysis-aware Windows droppers]]></title>
			<link>https://ired.dev/showthread.php?tid=19</link>
			<pubDate>Tue, 17 Jun 2025 21:02:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=19</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Cheska is intended for red teamers, researchers, and malware analysts operating within legal boundaries and in controlled, consented environments. Unauthorized deployment or use against systems you do not own or have explicit permission to test is illegal.<br />
<br />
Requirements<br />
Python 3<br />
MinGW-w64 (sudo apt install mingw-w64)<br />
How it works<br />
Cheska is a builder for analysis-aware Windows droppers. All the user has to provide is the payload file and an optional output path where the resulting dropper will be saved.<br />
<br />
When executed, the build script does the following in a nutshell:<br />
<br />
validates that the provided payload is a valid Windows PE executable.<br />
generates a random 3-character key used to XOR encode the payload and strings in the stub (e.g. DLL names).<br />
generates a random 3-5-character string to be used as the resource name for the encoded payload.<br />
configures the stub with the key and now encoded string values.<br />
compiles the stub and embeds the encoded payload as a resource.<br />
The dropper, upon execution, does the following:<br />
<br />
Performs anti-analysis checks (detailed below)<br />
Loads and decodes the payload from the resources section<br />
Drops and executes the payload<br />
Anti-Analysis Techniques<br />
Category Technique Description<br />
Anti-debugging Unhandled exception filter Detects attached debugger via custom exception logic.<br />
Anti-sandbox Mouse presence check Detects whether a mouse device is installed.<br />
Number of processors (&lt;=2) Flags limited CPU environments.<br />
RAM size (&lt;2GB) Detects low-memory VMs or sandboxes.<br />
Anti-VM Virtualization feature flag Uses PF_VIRTUALIZATION_ENABLED to detect VT-x/AMD-V.<br />
Native VHD boot check Detects OS booted from VHD, common in VMs/sandboxes.<br />
Additional Defense Evasion Techniques<br />
To further minimize detection and complicate analysis, the stub also employs:<br />
<br />
PEB walking for stealthy module enumeration<br />
Dynamic API resolution to bypass static import detection<br />
String obfuscation (e.g. XOR-encoded DLL and function names)<br />
Setup<br />
The builder was developed and tested on a Linux environment, leveraging MinGW-w64 for cross-compiling Windows binaries.<br />
<br />
Clone this repository<br />
git clone <a href="https://github.com/nemuelw/cheska.git" target="_blank" rel="noopener" class="mycode_url">https://github.com/nemuelw/cheska.git</a><br />
Navigate to the project directory<br />
Create a virtual environment and activate it<br />
python3 -m venv .venv<br />
. .venv/bin/activate<br />
Install project dependencies<br />
pip3 install -r requirements.txt<br />
Usage<br />
python3 cheska.py -p &lt;PAYLOAD_FILE&gt; [-o &lt;OUTPUT_FILE&gt;]<br />
Contribution<br />
Contributions are welcome! Ideas for improvement include:<br />
<br />
Better anti-VM techniques (e.g. VM driver or MAC address checks)<br />
Additional anti-sandbox methods<br />
Stub optimization or improved evasion heuristics <br />
Link:<br />
<a href="https://github.com/nemuelw/cheska" target="_blank" rel="noopener" class="mycode_url">https://github.com/nemuelw/cheska</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Cheska is intended for red teamers, researchers, and malware analysts operating within legal boundaries and in controlled, consented environments. Unauthorized deployment or use against systems you do not own or have explicit permission to test is illegal.<br />
<br />
Requirements<br />
Python 3<br />
MinGW-w64 (sudo apt install mingw-w64)<br />
How it works<br />
Cheska is a builder for analysis-aware Windows droppers. All the user has to provide is the payload file and an optional output path where the resulting dropper will be saved.<br />
<br />
When executed, the build script does the following in a nutshell:<br />
<br />
validates that the provided payload is a valid Windows PE executable.<br />
generates a random 3-character key used to XOR encode the payload and strings in the stub (e.g. DLL names).<br />
generates a random 3-5-character string to be used as the resource name for the encoded payload.<br />
configures the stub with the key and now encoded string values.<br />
compiles the stub and embeds the encoded payload as a resource.<br />
The dropper, upon execution, does the following:<br />
<br />
Performs anti-analysis checks (detailed below)<br />
Loads and decodes the payload from the resources section<br />
Drops and executes the payload<br />
Anti-Analysis Techniques<br />
Category Technique Description<br />
Anti-debugging Unhandled exception filter Detects attached debugger via custom exception logic.<br />
Anti-sandbox Mouse presence check Detects whether a mouse device is installed.<br />
Number of processors (&lt;=2) Flags limited CPU environments.<br />
RAM size (&lt;2GB) Detects low-memory VMs or sandboxes.<br />
Anti-VM Virtualization feature flag Uses PF_VIRTUALIZATION_ENABLED to detect VT-x/AMD-V.<br />
Native VHD boot check Detects OS booted from VHD, common in VMs/sandboxes.<br />
Additional Defense Evasion Techniques<br />
To further minimize detection and complicate analysis, the stub also employs:<br />
<br />
PEB walking for stealthy module enumeration<br />
Dynamic API resolution to bypass static import detection<br />
String obfuscation (e.g. XOR-encoded DLL and function names)<br />
Setup<br />
The builder was developed and tested on a Linux environment, leveraging MinGW-w64 for cross-compiling Windows binaries.<br />
<br />
Clone this repository<br />
git clone <a href="https://github.com/nemuelw/cheska.git" target="_blank" rel="noopener" class="mycode_url">https://github.com/nemuelw/cheska.git</a><br />
Navigate to the project directory<br />
Create a virtual environment and activate it<br />
python3 -m venv .venv<br />
. .venv/bin/activate<br />
Install project dependencies<br />
pip3 install -r requirements.txt<br />
Usage<br />
python3 cheska.py -p &lt;PAYLOAD_FILE&gt; [-o &lt;OUTPUT_FILE&gt;]<br />
Contribution<br />
Contributions are welcome! Ideas for improvement include:<br />
<br />
Better anti-VM techniques (e.g. VM driver or MAC address checks)<br />
Additional anti-sandbox methods<br />
Stub optimization or improved evasion heuristics <br />
Link:<br />
<a href="https://github.com/nemuelw/cheska" target="_blank" rel="noopener" class="mycode_url">https://github.com/nemuelw/cheska</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[MacOS forensic acquisition made simple]]></title>
			<link>https://ired.dev/showthread.php?tid=18</link>
			<pubDate>Tue, 17 Jun 2025 14:03:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=18</guid>
			<description><![CDATA[Link:<br />
<a href="https://github.com/Lazza/Fuji" target="_blank" rel="noopener" class="mycode_url">https://github.com/Lazza/Fuji</a><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://ired.dev/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=8" target="_blank" title="">screenshot.png</a> (Size: 189.11 KB / Downloads: 2)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Link:<br />
<a href="https://github.com/Lazza/Fuji" target="_blank" rel="noopener" class="mycode_url">https://github.com/Lazza/Fuji</a><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://ired.dev/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=8" target="_blank" title="">screenshot.png</a> (Size: 189.11 KB / Downloads: 2)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[WPProbe is a lightweight, fast and reliable tool to discover WordPress.]]></title>
			<link>https://ired.dev/showthread.php?tid=9</link>
			<pubDate>Sat, 14 Jun 2025 10:44:44 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=9</guid>
			<description><![CDATA[Especially useful for cybersecurity professionals looking for maximum coverage with minimal detection. ‚<br />
? Operation modes<br />
1️⃣ Stealthy (stealth) - Default method:<br />
- Check for exposed routes, such as? rest_route=/plugins/...<br />
- Compare discovered routes with known patterns<br />
- Get the module version (when available) and compare it to known vulnerabilities (CVE)<br />
2️⃣ Brute Force<br />
- Try to access the plugin directory directly (p. EJ. : /wp-content/plugins/name)<br />
- Detect modules whose route does not throw a 404 error<br />
- Get versions and CVE maps<br />
3️⃣ Hybrid<br />
- Start in stealth mode.<br />
- Then brute force it into what was not initially detected<br />
- Provides maximum range while maintaining discretion<br />
?️ <a href="https://github.com/Chocapikk/wpprobe" target="_blank" rel="noopener" class="mycode_url">https://github.com/Chocapikk/wpprobe</a><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://ired.dev/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1" target="_blank" title="">504614554_1232844045089563_5084319758723932978_n.jpg</a> (Size: 138.86 KB / Downloads: 12)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Especially useful for cybersecurity professionals looking for maximum coverage with minimal detection. ‚<br />
? Operation modes<br />
1️⃣ Stealthy (stealth) - Default method:<br />
- Check for exposed routes, such as? rest_route=/plugins/...<br />
- Compare discovered routes with known patterns<br />
- Get the module version (when available) and compare it to known vulnerabilities (CVE)<br />
2️⃣ Brute Force<br />
- Try to access the plugin directory directly (p. EJ. : /wp-content/plugins/name)<br />
- Detect modules whose route does not throw a 404 error<br />
- Get versions and CVE maps<br />
3️⃣ Hybrid<br />
- Start in stealth mode.<br />
- Then brute force it into what was not initially detected<br />
- Provides maximum range while maintaining discretion<br />
?️ <a href="https://github.com/Chocapikk/wpprobe" target="_blank" rel="noopener" class="mycode_url">https://github.com/Chocapikk/wpprobe</a><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://ired.dev/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1" target="_blank" title="">504614554_1232844045089563_5084319758723932978_n.jpg</a> (Size: 138.86 KB / Downloads: 12)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[ZigStrike]]></title>
			<link>https://ired.dev/showthread.php?tid=4</link>
			<pubDate>Fri, 13 Jun 2025 19:35:34 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=1">Mr.Z</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=4</guid>
			<description><![CDATA[I have released ZigStrike toolkit last year and it is still under heavy development. I decided to code in Zig which I believe the next C successor. ZigStrike is designed to assist Offsec in their operations, converting a shellcode into portable extension(DLL/XLL/CPL) which can be used to leveraged to execute the shellcode, ZigStrike offers several features and powerful options with frequent updates. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Features ( release 2.0 )</span><ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Multiple Injection Techniques</span>:<ul class="mycode_list"><li>Local Thread<br />
</li>
<li>Local Mapping<br />
</li>
<li>Remote Mapping<br />
</li>
<li>Remote Thread hijacking<br />
</li>
<li>EarlyCascade injection<br />
</li>
</ul>
</li>
<li><span style="font-weight: bold;" class="mycode_b">Anti-Sandbox Protection</span>:<ul class="mycode_list"><li>TPM Presence Check.<br />
</li>
<li>Domain Join Check.<br />
</li>
<li>Run-Time protection.<br />
</li>
</ul>
</li>
<li><span style="font-weight: bold;" class="mycode_b">Output Formats</span>:<ul class="mycode_list"><li>XLL (Excel Add-in)<br />
</li>
<li>DLL<br />
</li>
<li>CPL<br />
</li>
</ul>
</li>
<li><span style="font-weight: bold;" class="mycode_b">Advanced Features</span>:<ul class="mycode_list"><li>Shellcode advanced allocation.<br />
</li>
<li>Payload Runtime protection; preventing emulation and sandbox dynamic anaylsis.<br />
</li>
<li>Bypass common detection rules.<br />
</li>
</ul>
</li>
<li><span style="font-weight: bold;" class="mycode_b">Front-end enhancement</span>:<ul class="mycode_list"><li>Added new page to view generated payloads.<br />
</li>
<li>Detailed information for each created payload.<br />
</li>
<li>Fix flask issue to support uploading large shellcode.<br />
</li>
</ul>
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Prerequisites</span><br />
<ul class="mycode_list"><li>Zig 0.14.0<br />
</li>
<li>Ubuntu / Debian<br />
</li>
<li>Python 3.x (for the web interface) with Flask <br />
</li>
</ul>
<br />
Link : <a href="https://github.com/0xsp-SRD/zigStrike/" target="_blank" rel="noopener" class="mycode_url">https://github.com/0xsp-SRD/zigStrike/</a>]]></description>
			<content:encoded><![CDATA[I have released ZigStrike toolkit last year and it is still under heavy development. I decided to code in Zig which I believe the next C successor. ZigStrike is designed to assist Offsec in their operations, converting a shellcode into portable extension(DLL/XLL/CPL) which can be used to leveraged to execute the shellcode, ZigStrike offers several features and powerful options with frequent updates. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Features ( release 2.0 )</span><ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Multiple Injection Techniques</span>:<ul class="mycode_list"><li>Local Thread<br />
</li>
<li>Local Mapping<br />
</li>
<li>Remote Mapping<br />
</li>
<li>Remote Thread hijacking<br />
</li>
<li>EarlyCascade injection<br />
</li>
</ul>
</li>
<li><span style="font-weight: bold;" class="mycode_b">Anti-Sandbox Protection</span>:<ul class="mycode_list"><li>TPM Presence Check.<br />
</li>
<li>Domain Join Check.<br />
</li>
<li>Run-Time protection.<br />
</li>
</ul>
</li>
<li><span style="font-weight: bold;" class="mycode_b">Output Formats</span>:<ul class="mycode_list"><li>XLL (Excel Add-in)<br />
</li>
<li>DLL<br />
</li>
<li>CPL<br />
</li>
</ul>
</li>
<li><span style="font-weight: bold;" class="mycode_b">Advanced Features</span>:<ul class="mycode_list"><li>Shellcode advanced allocation.<br />
</li>
<li>Payload Runtime protection; preventing emulation and sandbox dynamic anaylsis.<br />
</li>
<li>Bypass common detection rules.<br />
</li>
</ul>
</li>
<li><span style="font-weight: bold;" class="mycode_b">Front-end enhancement</span>:<ul class="mycode_list"><li>Added new page to view generated payloads.<br />
</li>
<li>Detailed information for each created payload.<br />
</li>
<li>Fix flask issue to support uploading large shellcode.<br />
</li>
</ul>
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Prerequisites</span><br />
<ul class="mycode_list"><li>Zig 0.14.0<br />
</li>
<li>Ubuntu / Debian<br />
</li>
<li>Python 3.x (for the web interface) with Flask <br />
</li>
</ul>
<br />
Link : <a href="https://github.com/0xsp-SRD/zigStrike/" target="_blank" rel="noopener" class="mycode_url">https://github.com/0xsp-SRD/zigStrike/</a>]]></content:encoded>
		</item>
	</channel>
</rss>