Thinkst Canarytokens Detector and Diffuser/Nullifier Logo

Thinkst Canarytokens Detector and Diffuser/Nullifier

0
Free
Visit Website

A simple script to detect and remove Canary Tokens. Installation (tested on MacOS 14): git clone https://github.com/referefref/canarytokendetector.git cd canarytokendetector brew install pdftk-java python3 python3-pip -y pip3 install pefile wget https://raw.githubusercontent.com/DidierStevens/DidierStevensSuite/master/disitool.py. Examples: Example running in directory, test-only mode with report output. Example running in nullify, verbose, directory mode (vdf). Background and warranty: I wrote this script to augment a chapter on a book I'm writing about deception technologies, specifically around detection mechanisms for tokens. The detections are simple signature-based detections which could easily be adjusted or randomized by Thinkst in the future. This exists as a PoC, and no warranty of any is provided for the use (or misuse) of this application. Your actions are your own. You execute this at your own risk.

FEATURES

ALTERNATIVES

A blind SQL injection tool written in Golang

A Python-based tool for detecting XSS vulnerabilities

Copy executables with execute, but no read permission on Unix systems.

Dynamic binary analysis library with various analysis and emulation capabilities.

Yabin creates Yara signatures from malware to find similar samples.

Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.

Fuzzilli is a JavaScript engine fuzzer that helps identify vulnerabilities in JavaScript engines.

A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

PINNED