image
╔═╗┌─┐┌─┐┌┐┌╦═╗┌─┐┬ ┌─┐┬ ┬╔╦╗┌─┐┌─┐┬┌─┐ ║ ║├─┘├┤ │││╠╦╝├┤ │ ├─┤└┬┘║║║├─┤│ ┬││ ╚═╝┴ └─┘┘└┘╩╚═└─┘┴─┘┴ ┴ ┴ ╩ ╩┴ ┴└─┘┴└─┘ Tool to test for vulnerable open relays on SMTP servers Features Check single target/ domain list Port 587 and 465 Implemented Multithreaded Download…

Source

image
Supported hashing algorithms: SHA512, SHA256, SHA384, SHA1, MD5 Features: auto detection of hashing algorithm based on length (not recommended), bruteforce, password list Arguments: type: _ hash algorithm (must be one of the supported hashing algorithms mentioned above or AUTO if you want to use automatic algorithm detection) hash: _ can be either the hashed password, or a text file containing a list of hashes to crack ( _ hashlist _ must be activated if _ hash _ is a text file containing multiple hashes) mode: _ list or bruteforce pwlist: _ list of passwords to compare against a single hash or a list of hashes range: _ bruteforce string length range (default: 8-11) hashlist: _ no parameters required for this argument, if hashlist is used, then _ hash _ should be a text file with more than 1 hash chars: _ string of characters to pick from to generate random strings for bruteforce (default value is: abcdefghijklmnopqrstuvwxyzABCDEFGHJIKLMNOPQRSTUVWXYZ0123456789) Examples: Cracking a single hash with a password list: _ hashcracker.py SHA256 11a1162b984fef626ecc27c659a8b0eead5248ca867a6a87bea72f8a8706109d -mode list -pwlist passwordlist.txt _ Cracking a single hash with bruteforce: _ hashcracker.py SHA256 11a1162b984fef626ecc27c659a8b0eead5248ca867a6a87bea72f8a8706109d -mode bruteforce -range 6 11 -chars abcdefghijklmnopqrstuvwxyz0123456789$#@ _ Cracking a list of hashes with a password list: _ hashcracker.py MD5…

Source

image
_ Kawaii Deauther _ is a pentest toolkit whose goal is to perform jam on WiFi clients/routers and spam many fake AP for testing purposes. Dependencies macchanger mdk3 nmcli Installation Dependencies will be automatically installed. $ git clone https://github.com/aryanrtm/KawaiiDeauther $ cd KawaiiDeauther && sudo ./install.sh $ sudo KawaiiDeauther.sh Demo Tested on Operating System | Version —|— Linux Mint | 19.2 Tina Features Takedown with SSID Takedown all channels Spam many fake AP Contact Twitter: @4wsec_ Download…

Source

image
Distributed simple and robust release management and monitoring system. ** _ This project on going work. _ Road map Core system First worker agent Management dashboard Jenkins vs CI tool extensions Management dashboard First master agent All relevant third-party system integrations (version control, CI, database, queuing etc.) Requirements Go > 1.11 Redis or RabbitMQ PostgreSQL Docker Environment For PostgreSQL docker run –name agente_PostgreSQL -e POSTGRES_PASSWORD=123456 -e POSTGRES_USER=agente -p 5432:5432 -d postgres docker exec agente_PostgreSQL psql –username=agente -c ‘create database agente_dev;' For RabbitMQ docker run –hostname my-rabbit –name agente_RabbitMQ -e RABBITMQ_DEFAULT_USER=local -e RABBITMQ_DEFAULT_PASS=local -p 5672:5672 -d rabbitmq:3-management Development git clone -b develop https://github.com/streetbyters/agente go mod vendor # Development Mode go run ./cmd -mode dev -migrate -reset go run ./cmd -mode dev # Test Mode go run ./cmd -mode test -migrate -reset go run ./cmd -mode test Build We will release firstly Agente for Linux environment. See detail Download…

Source

image
XSS-Freak is an XSS scanner fully written in python3 from scratch. It is one of its kind since it crawls the website for all possible links and directories to expand its attack scope. Then it searches them for input tags and then launches a bunch of XSS payloads. if an input is not sanitized and vulnerable to XSS attacks, the tool will discover it in seconds. Requirements: High Internet Connection Speed. A New PC that is capable of handling a high amount of threads concurrently. Luck Of course. How Does it Work: First You Supply A Target Website To Scan And A List Which Contains Different XSS Payloads (better low amount and more effective and Least Detected Payloads) Then It Crawls The Main Website (Index Page) For Possible Links and Directories then it Crawls the Found Directories (if exist any) for additional links they weren't found in the initial crawl and add them to its attack scope. Then the tool will crawl all the links that were found in both in the initial scan and links from the directory For HTML INPUTS. Then the tool adds all the found HTML INPUTS to its attack scope. then the tool launches an ATTACK on all HTML INPUTS with the XSS payloads the user-provided from the list. if the HTML INPUT IS NOT SANITIZED PROPERLY and Filtered The Script Will Instantly Detect It and Will Print Out The Vulnerable Parameter. Note: The Script Is Too Powerful For Old Computers. Advantages: Supports Multithreading For Efficiency and Faster…

Source

image
The IPv6Tools framework is a robust set of modules and plugins that allow a user to audit an IPv6 enabled network. The built-in modules support enumeration of IPv6 features such as ICMPv6 and Multicast Listener Discovery (MLD). In addition, the framework also supports enumeration of Upper Layer Protocols (ULP) such as multicast DNS (mDNS) and Link-Local Multicast Name Resolution (LLMNR). Users can easily expand the capability of the framework by creating plugins and modules in the Python language. Requirements python 2.7 pip npm [development only] Installation Standard _ [Optional] Use a virtualenv for installation: _ virtualenv venv && source venv/bin/activate git clone http://github.com/apg-intel/ipv6tools.git sudo pip install -r requirements.txt Development git clone http://github.com/apg-intel/ipv6tools.git git checkout dev npm run setup Usage Standard sudo python app.py Navigate to http://localhost:8080 in a web browser Development Run $ npm run serve In a separate terminal, run npm run dev Navigate to http://localhost:8081 in a web browser CLI TODO Modules Modules are classes that allow interaction with individual nodes or all nodes. These show up as a right click option on each node, or as a button below the graph. Included Modules Included in the project are a couple of modules to help validate your network, as well as use as examples for your own modules. poisonLLMNR – Link-Local…

Source

image
Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm can generate, a Data Flow Diagram (DFD), a Sequence Diagram and most important of all, threats to your system. Requirements Linux/MacOS Python 3.x Graphviz package Java (OpenJDK 10 or 11) plantuml.jar Usage tm.py [-h] [–debug] [–dfd] [–report REPORT] [–exclude EXCLUDE] [–seq] [–list] [–describe DESCRIBE] optional arguments: -h, –help show this help message and exit –debug print debug messages –dfd output DFD (default) –report REPORT output report using the named template file (sample template file is under docs/template.md) –exclude EXCLUDE specify threat IDs to be ignored –seq output sequential diagram –list list all available threats –describe DESCRIBE describe the properties available for a given element Currently available elements are: TM, Element, Server, ExternalEntity, Datastore, Actor, Process, SetOfProcesses, Dataflow, Boundary and Lambda. The available properties of an element can be listed by using –describe followed by the name of an element: (pytm) ➜ pytm git:(master) ✗ ./tm.py –describe Element Element OS check definesConnectionTimeout description dfd handlesResources implementsAuthenticationScheme implementsNonce inBoundary inScope isAdmin isHardened name …

Source

image
Netdata is distributed, real-time, performance and health monitoring for systems and applications . It is a highly-optimized monitoring agent you install on all your systems and containers. Netdata provides unparalleled insights , in real-time , of everything happening on the systems it runs (including web servers, databases, applications), using highly interactive web dashboards . It can run autonomously, without any third-party components, or it can be integrated to existing monitoring toolchains (Prometheus, Graphite, OpenTSDB, Kafka, Grafana, and more). Netdata is fast and efficient , designed to permanently run on all systems ( physical & virtual servers, containers , IoT devices), without disrupting their core function. Netdata is free, open-source software and it currently runs on Linux , FreeBSD , and MacOS , along with other systems derived from them, such as Kubernetes and Docker . Netdata is not hosted by the CNCF but is the 3rd most starred open-source project in the Cloud Native Computing Foundation (CNCF) landscape . Want to see Netdata live? Check out any of our live demos . User base Netdata is used by hundreds of thousands of users all over the world. Check our GitHub watchers list . You will find people working for Amazon , Atos , Baidu , Cisco Systems , Citrix , Deutsche Telekom , DigitalOcean , Elastic , EPAM Systems , Ericsson , Google , Groupon , Hortonworks , HP , Huawei …

Source

image
A vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity. Setup for a physical device Download injuredandroid.apk from Github Enable USB debugging on your Android test phone. Connect your phone and your pc with a usb cable. Install via adb. adb install injuredandroid.apk . Note: You need to use the absolute path to the .apk file or be in the same directory. Setup for an Android Emulator using Android Studio Download the apk file. Start the emulator from Android Studio (I recommend downloading an emulator with Google APIs so root adb can be enabled). Drag and drop the .apk file on the emulator and injuredandroid.apk will install. Tips and CTF Overview Decompiling the Android app is highly recommended. XSSTEST is just for fun and to raise awareness on how WebViews can be made vulnerable to XSS. The login flags just need the flag submitted. The flags without a submit that demonstrate concepts will automatically register in the "Flags Overview" Activity. The last two flags don't register because there currently isn't a remote verification method (I plan to change this in a future update). This was done to prevent using previous flag methods to skip the exploitation techniques. There is one flag with a Pentesterlab 1 month gift key. The key is stored in a self destructing note after It's read, do not close the browser tab before…

Source

image
FockCache – Minimalized Test Cache Poisoning Detail For Cache Poisoning : https://portswigger.net/research/practical-web-cache-poisoning FockCache FockCache tries to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on web pages. After successful result, it gives you a poisoned URL. To be added soon: 1 – Page Param Checker 2 – Recursive Checking Installation 1 – Install with installer.sh chmod +x installer.sh ./installer.sh 2 – Install manual go get github.com/briandowns/spinner go get github.com/christophwitzko/go-curl go run main.go –hostname victim.host or go build FockCache main.go Run ./FockCache –hostname victim.host Download…

Source