Thinkst Canarytokens Detector and Diffuser/Nullifier Logo

Thinkst Canarytokens Detector and Diffuser/Nullifier

0
Free
Visit Website

A simple script to detect and remove Canary Tokens. Installation (tested on MacOS 14): git clone https://github.com/referefref/canarytokendetector.git cd canarytokendetector brew install pdftk-java python3 python3-pip -y pip3 install pefile wget https://raw.githubusercontent.com/DidierStevens/DidierStevensSuite/master/disitool.py. Examples: Example running in directory, test-only mode with report output. Example running in nullify, verbose, directory mode (vdf). Background and warranty: I wrote this script to augment a chapter on a book I'm writing about deception technologies, specifically around detection mechanisms for tokens. The detections are simple signature-based detections which could easily be adjusted or randomized by Thinkst in the future. This exists as a PoC, and no warranty of any is provided for the use (or misuse) of this application. Your actions are your own. You execute this at your own risk.

FEATURES

ALTERNATIVES

A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.

A tool to fuzz query strings and identify vulnerabilities

A tool to detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.

A program to manage yara ruleset in a database with support for different databases and configuration options.

Interactive incremental disassembler with data/control flow analysis capabilities.

Cybersecurity tool merging DarunGrim's analysis algorithms, currently in internal testing for official release.

Define and validate YARA rule metadata with CCCS YARA Specification.

A simple Python script to test for a hypothetical JWT vulnerability