XUJ OSINT Links & Tools https://www.osinttechniques.com/osint-tools.html Maltego https://www.maltego.com/downloads/ Recon-ng https://github.com/lanmaster53/recon-ng Google dorks https://www.abw.gov.pl/download/1/2783/MidlerGarlickiMincewicz-PL.pdf https://www.exploit-db.com/google-hacking-database PHP Code saving POST data: Certificates https://www.certificate-transparency.org/what-is-ct https://transparencyreport.google.com/https/certificates https://certstream.calidog.io Domains Name Generation https://github.com/elceef/dnstwist Scoring / Ranking https://www.alexa.com/siteinfo WHOIS privacy / history https://whois-history.whoisxmlapi.com Ageing https://www.expireddomains.net/ Web Archive https://web.archive.org Categorization BlueCoat: http://sitereview.bluecoat.com/sitereview.jsp Cisco: http://www.senderbase.org/home McAfee: http://www.mcafee.com/us/threat-center.aspx Trend Micro: https://global.sitesafety.trendmicro.com Websense: http://csi.websense.com Zscaler: http://zulu.zscaler.com SE Tools Evilginx (MITM Phishing Framework) https://github.com/kgretzky/evilginx2 SET https://github.com/trustedsec/social-engineer-toolkit BeEF https://github.com/beefproject/beef GoPhish https://github.com/gophish/gophish https://docs.getgophish.com/user-guide/ KingPhisher https://github.com/rsmusllp/king-phisher https://king-phisher.readthedocs.io/en/latest/ Macro VBA https://docs.microsoft.com/en-us/dotnet/visual-basic/programming-guide/com-interop/walkthrough-calling-windows-apis Accessing Clipboard https://docs.microsoft.com/is-is/office/vba/access/concepts/windows-api/send-information-to-the-clipboard Didier’s resources: https://videos.didierstevens.com/2016/10/11/training-attacking-with-excel/ https://github.com/DidierStevens/DidierStevensSuite https://blog.didierstevens.com Obfuscation https://github.com/sevagas/macro_pack https://github.com/bonnetn/vba-obfuscator EvilClippy (Obfuscation) https://github.com/outflanknl/EvilClippy https://outflank.nl/blog/2019/05/05/evil-clippy-ms-office-maldoc-assistant/ Unicorn (Macro generation and more) https://github.com/trustedsec/unicorn Macros from remote templates https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques/blob/master/offensive-security/initial-access/phishing-with-ms-office/inject-macros-from-a-remote-dotm-template-docx-with-macros.md Metadata https://exiftool.org/ Red Teamer Testing Tools Wireshark: https://www.wireshark.org Charles Proxy: https://www.charlesproxy.com Burp: https://portswigger.net/burp Server_z Malware samples https://www.virustotal.com/ https://www.hybrid-analysis.com/file-collections https://zeltser.com/malware-sample-sources/ (list) Defender/Analyst tools https://videos.didierstevens.com/2020/10/11/oledump-py-plugin_msg_summary/ https://blog.didierstevens.com/programs/oledump-py/ http://www.decalage.info/python/oletools https://github.com/decalage2/oletools/wiki/olevba https://gchq.github.io/CyberChef/ (encoder/decoder) https://code.visualstudio.com/ (Free IDE released by Microsoft) https://www.automateexcel.com/vba-code-indenter/ (VBA Code Indenter) https://github.com/MalwareCantFly/Vba2Graph (VBA2Graph) https://github.com/decalage2/ViperMonkey (VBA Emulation engine written in python) ASR (Attack Surface Reduction) Rules https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction
tnz_37 XUJ hello bro , pls i wanna ask you ,when i send the hooked link it doesn’t work for the other devices but for my computer it work, pls how can i host it to the world?