• Stars
    star
    786
  • Rank 57,890 (Top 2 %)
  • Language
    Python
  • License
    MIT License
  • Created about 7 years ago
  • Updated 5 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Modern tactical exploitation toolkit.

tactical-exploitation

"The Other Way to Pen-Test"

-- HD Moore & Valsmith

I've always been a big proponent of a tactical approach to penetration testing that does not focus on exploiting known software vulnerabilities, but relies on old school techniques such as information gathering and brute force. While being able to appreciate the occasional usefulness of a well-timed 0day, as a veteran penetration tester I favor an exploit-less approach. Tactical exploitation provides a smoother and more reliable way of compromising targets by leveraging process vulnerabilities, while minimizing attack detection and other undesired side effects.

This repository aims to provide a tactical exploitation toolkit to assist penetration testers during their assignments. The tools currently released are described below. See also http://www.0xdeadbeef.info/ for some older tools and techniques.

Related blog posts:
https://web.archive.org/web/20200509050017/https://techblog.mediaservice.net/2017/10/in-praise-of-tactical-exploitation/
https://web.archive.org/web/20200702153318/https://techblog.mediaservice.net/2017/11/how-a-unix-hacker-discovered-the-windows-powershell/

These tools are proofs of concept. They are functional but may be buggy or incomplete. Use at your own risk.

easywin.py

Easywin is a Python script that provides a toolkit for exploit-less attacks aimed at Windows and Active Directory environments, by leveraging information gathering and brute force capabilities against the SMB protocol.

letmein.ps1

Letmein is a pure PowerShell implementation of the staging protocols used by the Metasploit Framework. Start an exploit/multi/handler (Generic Payload Handler) instance on your attack box configured to handle one of the supported Meterpreter payloads, run letmein.ps1 (ideally as Administrator) on a compromised Windows box, and wait for your session. This technique is quite effective in order to bypass the antivirus and obtain a Meterpreter shell on Windows. An alternative Python implementation is also provided for educational purposes, however its use is not recommended in the field.

letme.go

Letme.go is a minimalistic Go implementation of the main staging protocols used by the Metasploit Framework. Start an exploit/multi/handler instance on the attack box configured to handle one of the supported Meterpreter payloads, run letme.exe on the target Windows system, and enjoy your session!

poriluk.py

Poriluk is a helper script that provides a comfortable interface to exploit common information leakage vulnerabilities. At the moment, the following attacks are supported: dictionary-based user enumeration via SMTP VRFY/EXPN/RCPT and HTTP Apache mod_userdir.

botshot.py

Botshot is a Python script that captures screenshots of websites from the command line. It is useful to automate mapping of the web attack surface of large networks.

verbal.py

Verbal is a HTTP request method security scanner. It tries a series of interesting HTTP methods against a list of website paths, in order to determine which methods are available and accessible. The following HTTP methods are currently supported: GET, OPTIONS, TRACE, DEBUG, PUT.

netdork.py

Netdork is a Python script that uses the Google Custom Search Engine API to collect interesting information on public networks and stealthily map the available attack surface. The following attacks are supported: network search sweep based on target CIDRs and subdomain discovery via search engine.

seitan.py

Seitan is a Python script that uses the Shodan.io API search to collect open source intelligence on targets. The following attacks are currently supported: ipaddr (view all available information for an IP address) and domain (search services related to a domain or host name).

More Repositories

1

frida-scripts

A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
JavaScript
1,211
star
2

exploits

A handy collection of my public exploits, all in one place.
C
581
star
3

semgrep-rules

A collection of my Semgrep rules to facilitate vulnerability research.
C
540
star
4

ghidra-scripts

A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.
Java
220
star
5

weggli-patterns

A collection of my weggli patterns to facilitate vulnerability research.
84
star
6

xorpd-solutions

[SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.
Assembly
66
star
7

raptor_infiltrate19

#INFILTRATE19 raptor's party pack.
C
30
star
8

raptor_infiltrate20

#INFILTRATE20 raptor's party pack.
C
28
star
9

advisories

A collection of my public security advisories.
22
star
10

configurations

Configuration templates for common network security platforms. YMMV.
Shell
21
star
11

Ao64A

NASM macOS translation of the source code listings distributed with the Art of 64-bit Assembly Language book.
Assembly
15
star
12

backdoo-rs

A simple Meterpreter stager written in Rust.
Rust
15
star
13

shellcode

A collection of my shellcode samples.
C
13
star
14

raptor_romhack21

#RomHack21 raptor's party pack.
C
6
star
15

0xdea.github.io

0xdeadbeef.info website.
C
5
star
16

zero2prod

My code for "Zero To Production In Rust", a book by Luca Palmieri on API development using Rust.
Rust
3
star
17

0xdea

Who's raptor?
1
star
18

raptor-rust-template

My template for starting a Rust project, meant to be used with cargo-generate.
Rust
1
star