nlp-files

NirLauncher nlp files for popular websites
git clone git://fossdaily.xyz/nlp-files
Log | Files | Refs | README | LICENSE

Kahu.nlp (8934B)


      1 [General]
      2 Name=Kahu Security
      3 GroupCount=1
      4 SoftwareCount=27
      5 
      6 [Group0]
      7 Name=All Utilities
      8 ShowAll=1
      9 
     10 [Software0]
     11 exe=Binary File Converter.exe
     12 help=
     13 url=http://www.kahusecurity.com/tools.html
     14 exe64=
     15 group=0
     16 Name=Binary File Converter
     17 ShortDesc=
     18 LongDesc=Converts small binary files into text and vice versa which enables you to move content into and out of locked-down, remote hosts via VPN, RDC, SecureDesktop, etc as long as access to the clipboard is allowed.
     19 
     20 [Software1]
     21 exe=CMDWatcher32.exe
     22 help=
     23 url=http://www.kahusecurity.com/tools.html
     24 exe64=CMDWatcher64.exe
     25 group=0
     26 Name=CMD Watcher
     27 ShortDesc=
     28 LongDesc=Watches for the CMD, PowerShell and other processes, suspends it, extracts the command line data, then optionally kills it. There's also an interactive mode to handle any LOLBin. This tool enables you to quickly obtain deobfuscated output from VBA macros.
     29 
     30 [Software2]
     31 exe=Converter.exe
     32 help=
     33 url=http://www.kahusecurity.com/tools.html
     34 exe64=
     35 group=0
     36 Name=Converter
     37 ShortDesc=
     38 LongDesc=Convert data to/from many different formats, format data, search/replace data, extract data, find XOR/ROT/SFT keys, import/export/split/join/convert files, and more. This tool was originally made for analyzing and deobfuscating malicious scripts so it wasn’t designed to handle large datasets.
     39 
     40 [Software3]
     41 exe=ConverterNET32.exe
     42 help=
     43 url=http://www.kahusecurity.com/tools.html
     44 exe64=ConverterNET64.exe
     45 group=0
     46 Name=ConverterNET
     47 ShortDesc=
     48 LongDesc=Convert data to/from many different formats, format data, search/replace data, extract data, find XOR/SFT keys, import/export/convert files, and more.
     49 
     50 [Software4]
     51 exe=CoverFire.exe
     52 help=
     53 url=http://www.kahusecurity.com/tools.html
     54 exe64=
     55 group=0
     56 Name=Cover Fire
     57 ShortDesc=
     58 LongDesc=Generates web requests to fill up log files with misleading information.
     59 
     60 [Software5]
     61 exe=DataConverter.exe
     62 help=
     63 url=http://www.kahusecurity.com/tools.html
     64 exe64=
     65 group=0
     66 Name=Data Converter
     67 ShortDesc=
     68 LongDesc=Converts text, hex, or decimal values using XOR, ROTate, and ShiFT methods. You can do an XOR keyword search or enumerate all keys to a file. You can import a binary file, perform add/subtracts before/after an XOR/ROT/SFT action, and write out the results to a text or binary file.
     69 
     70 [Software6]
     71 exe=Difference Calculator.exe
     72 help=
     73 url=http://www.kahusecurity.com/tools.html
     74 exe64=
     75 group=0
     76 Name=Difference Calculator
     77 ShortDesc=
     78 LongDesc=Calculates the difference between two sets of strings based on the user-defined method (e.g. subtraction, addition, etc). Right-clicking in each text box brings up a context menu and offers the ability to read/save files (binary file reads are limited to 1KB to save time).
     79 
     80 [Software7]
     81 exe=FileConverter.exe
     82 help=
     83 url=http://www.kahusecurity.com/tools.html
     84 exe64=
     85 group=0
     86 Name=File Converter
     87 ShortDesc=
     88 LongDesc=Converts large binary files to/from hex files with or without XOR encryption/decryption. Supports hex and decimal XOR keys.
     89 
     90 [Software8]
     91 exe=JSDeobfuscator.exe
     92 help=
     93 url=http://www.kahusecurity.com/tools.html
     94 exe64=
     95 group=0
     96 Name=Javascript Deobfuscator
     97 ShortDesc=
     98 LongDesc=Pack and unpack Javascript from DOS using Dean Edwards Packer and PhantomJS.
     99 
    100 [Software9]
    101 exe=PHP Script Decoder.exe
    102 help=
    103 url=http://www.kahusecurity.com/tools.html
    104 exe64=
    105 group=0
    106 Name=PHP Script Decoder
    107 ShortDesc=
    108 LongDesc=Provides functionality to perform custom search/replace methods to deobfuscate PHP scripts.
    109 
    110 [Software10]
    111 exe=PHPConverter.exe
    112 help=
    113 url=http://www.kahusecurity.com/tools.html
    114 exe64=
    115 group=0
    116 Name=PHP Converter
    117 ShortDesc=
    118 LongDesc=Deobfuscates/obfuscates PHP scripts.
    119 
    120 [Software11]
    121 exe=Pinpoint.exe
    122 help=
    123 url=http://www.kahusecurity.com/tools.html
    124 exe64=
    125 group=0
    126 Name=Pinpoint
    127 ShortDesc=
    128 LongDesc=Fetches a webpage and then enumerates and analyzes its components to help identify any infected files. Pinpoint gives you various options when making an HTTP request including spoofing the user-agent string and referer. Pinpoint will not render any of the content.
    129 
    130 [Software12]
    131 exe=PSUnveil.exe
    132 help=
    133 url=http://www.kahusecurity.com/tools.html
    134 exe64=
    135 group=0
    136 Name=PSUnveil
    137 ShortDesc=
    138 LongDesc=Deobfuscate PowerShell scripts in manual, semi-auto, and auto mode.
    139 
    140 [Software13]
    141 exe=Registry Dumper.exe
    142 help=
    143 url=http://www.kahusecurity.com/tools.html
    144 exe64=
    145 group=0
    146 Name=Registry Dumper
    147 ShortDesc=
    148 LongDesc=With Registry Dumper, you can scan for null characters in registry keys and dump them to a text file. You can also create and delete hidden keys by inserting the word “[null]” into the keyname.
    149 
    150 [Software14]
    151 exe=Reneo.exe
    152 help=
    153 url=http://www.kahusecurity.com/tools.html
    154 exe64=
    155 group=0
    156 Name=Reneo
    157 ShortDesc=
    158 LongDesc=Reneo is a Windows tool to help incident responders, forensics specialists, and security researchers analyze and reverse engineer malicious and obfuscated scripts and other content. This tool can convert from/to various formats, transform, deobfuscate, encode/decode, encrypt/decrypt, and hash strings.
    159 
    160 [Software15]
    161 exe=Revelo.exe
    162 help=
    163 url=http://www.kahusecurity.com/tools.html
    164 exe64=
    165 group=0
    166 Name=Revelo
    167 ShortDesc=
    168 LongDesc=Deobfuscate Javascript using a variety of different methods; includes a built-in JS beautifier, DOM walker, firewall, packet sniffer, and proxy. Note: If analyzing malicious content, please use in a virtual machine. If the script calls Java, Acrobat, or some other plug-in, Revelo won’t protect you.
    169 
    170 [Software16]
    171 exe=Sandbox Tester.exe
    172 help=
    173 url=http://www.kahusecurity.com/tools.html
    174 exe64=
    175 group=0
    176 Name=Sandbox Tester
    177 ShortDesc=
    178 LongDesc=Creates a dropper that deploys several methods to get past automated malware analysis tools. The dropper safely drops an Eicar file and pops up a message upon execution.
    179 
    180 [Software17]
    181 exe=Scout.exe
    182 help=
    183 url=http://www.kahusecurity.com/tools.html
    184 exe64=
    185 group=0
    186 Name=Scout
    187 ShortDesc=
    188 LongDesc=Uses the Pinpoint engine to download and analyze webpage components to identify infected files. This function works fine in 32-bit Windows. Scout has a built-in HTTP Request Simulator that will render user-specified HTML files, catch the resulting HTTP requests, then drop the responses. Scout includes the ability to screenshot the webpage using PhantomJS (download PhantomJS and copy the .exe to the same folder as Scout). Use Scout in a VM since it could potentially cause your computer to become infected.
    189 
    190 [Software18]
    191 exe=Script Decoder.exe
    192 help=Script Deobfuscator.pdf
    193 url=http://www.kahusecurity.com/tools.html
    194 exe64=
    195 group=0
    196 Name=Script Decoder
    197 ShortDesc=
    198 LongDesc=Decodes data that has been encoded using Microsoft Script Encoder (ScrEnc).
    199 
    200 [Software19]
    201 exe=ScriptDeobfuscator.exe
    202 help=
    203 url=http://www.kahusecurity.com/tools.html
    204 exe64=
    205 group=0
    206 Name=Script Deobfuscator
    207 ShortDesc=
    208 LongDesc=Helps you conduct static analysis by performing a series of search/replaces to deobfuscate PHP, Javascript, VBA, and VBS scripts.
    209 
    210 [Software20]
    211 exe=Secret Decoder Ring.exe
    212 help=
    213 url=http://www.kahusecurity.com/tools.html
    214 exe64=
    215 group=0
    216 Name=Secret Decoder Ring
    217 ShortDesc=
    218 LongDesc=Performs character substitution and position-based character lookups. Several exploit packs use this technique to hide URLs. Now you can analyze, decode, and encode URLs.
    219 
    220 [Software21]
    221 exe=Sounder.exe
    222 help=
    223 url=http://www.kahusecurity.com/tools.html
    224 exe64=
    225 group=0
    226 Name=Sounder
    227 ShortDesc=
    228 LongDesc=Analyzes web server logs to find possible phishing sites via URLs left behind in referers. It also checks the potential websites for phishing keywords and takes screenshots.
    229 
    230 [Software22]
    231 exe=TextDecoderToolkit.exe
    232 help=
    233 url=http://www.kahusecurity.com/tools.html
    234 exe64=
    235 group=0
    236 Name=Text Decoder Toolkit
    237 ShortDesc=
    238 LongDesc=Convert, transform, and decode text in a number of ways. Provides three different methods to help you determine what the XOR/shift value is.
    239 
    240 [Software23]
    241 exe=URLRevealer.exe
    242 help=
    243 url=http://www.kahusecurity.com/tools.html
    244 exe64=
    245 group=0
    246 Name=URL Revealer
    247 ShortDesc=
    248 LongDesc=This is a web proxy that collects and displays the URLs from downloaders then drops the request automatically.
    249 
    250 [Software24]
    251 exe=WelcomeMat.exe
    252 help=
    253 url=http://www.kahusecurity.com/tools.html
    254 exe64=
    255 group=0
    256 Name=Welcome Mat
    257 ShortDesc=
    258 LongDesc=Opens listening ports on the host to spoof running services.
    259 
    260 [Software25]
    261 exe=Word2Dec.exe
    262 help=
    263 url=http://www.kahusecurity.com/tools.html
    264 exe64=
    265 group=0
    266 Name=Word to Decimal
    267 ShortDesc=
    268 LongDesc=Converts Qword, Dword, and Word values to decimal. It can also perform basic XOR decoding.
    269 
    270 [Software26]
    271 exe=ZeuS ENC Decrypter.exe
    272 help=
    273 url=http://www.kahusecurity.com/tools.html
    274 exe64=
    275 group=0
    276 Name=ZeuS ENC Decrypter
    277 ShortDesc=
    278 LongDesc=Automatically finds the four-byte XOR key then XOR-decrypts and LZNT1-decompresses GameOver ZeuS’ .enc files into PE files.