• Stars
    star
    504
  • Rank 86,901 (Top 2 %)
  • Language
    Python
  • Created about 9 years ago
  • Updated almost 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

It is a hack tool kit for pentest and web security research.

hackUtils

It is a hack tool kit for pentest and web security research, which is based on BeautifulSoup bs4 module http://www.crummy.com/software/BeautifulSoup/bs4/.

Usage:

hackUtils.py [options]

Options:

-h, --help                                  Show basic help message and exit
-b keyword, --baidu=keyword                 Fetch URLs from Baidu based on specific keyword
-g keyword, --google=keyword                Fetch URLs from Google based on specific keyword
-i keyword, --censysip=keyword              Fetch IPs from Censys based on specific keyword
-u keyword, --censysurl=keyword             Fetch URLs from Censys based on specific keyword
-w keyword, --wooyun=keyword                Fetch URLs from Wooyun Corps based on specific keyword
-j url|file, --joomla=url|file              Exploit SQLi for Joomla 3.2 - 3.4
-r url|file, --rce=url|file                 Exploit Remote Code Execution for Joomla 1.5 - 3.4.5
-f url|file, --ffcms=url|file               Exploit Remote Code Execution for FeiFeiCMS 2.8
-k ip|file[::cmd], --jenkins=ip|file[::cmd] Exploit Remote Code Execution for XStream (Jenkins CVE-2016-0792)
-o url|file[::cmd], --shiro=url|file[::cmd] Exploit Remote Code Execution for Apache Shiro 1.2.4
-s url|file, --s2032=url|file               Exploit Remote Code Execution for Struts2 (S2-032)
-d site, --domain=site                      Scan subdomains based on specific site
-e string, --encrypt=string                 Encrypt string based on specific encryption algorithms (e.g. base64, md5, sha1, sha256, etc.)

Examples:

hackUtils.py -b inurl:www.example.com
hackUtils.py -g inurl:www.example.com
hackUtils.py -i 1099.java-rmi
hackUtils.py -u 1099.java-rmi
hackUtils.py -w .php?id=
hackUtils.py -j http://www.joomla.com/
hackUtils.py -j urls.txt
hackUtils.py -r http://www.joomla.com/
hackUtils.py -r urls.txt
hackUtils.py -f http://www.feifeicms.com/
hackUtils.py -f urls.txt
hackUtils.py -k 10.10.10.10
hackUtils.py -k 10.10.10.10::dir
hackUtils.py -k ips.txt
hackUtils.py -k ips.txt::"touch /tmp/jenkins"
hackUtils.py -o http://www.shiro.com/::"touch /tmp/shiro"
hackUtils.py -o urls.txt::"touch /tmp/shiro"
hackUtils.py -s http://www.struts2.com/index.action
hackUtils.py -s urls.txt
hackUtils.py -d example.com
hackUtils.py -e text

Change Logs:

2016.08.08

1. Add exploit module for Apache Shiro 1.2.4 Remote Code Execution

2016.04.26

1. Add exploit module for Struts 2 (S2-032) Remote Code Execution

2016.03.10

1. Modify exploit payload for XStream (Jenkins CVE-2016-0792) Remote Code Execution

2016.03.02

1. Add exploit module for XStream (Jenkins CVE-2016-0792) Remote Code Execution

2016.02.29

1. Add Censys URLs fetching module

2016.02.24

1. Add Censys IPs fetching module
2. Add exploit module for FeiFeiCMS 2.8 Remote Code Execution

2015.12.23

1. Update Baidu URLs fetching module
2. Update Wooyun URLs fetching module
3. Update Subdomains Scan module

2015.12.17

1. Modify exploit payload for Joomla 1.5 - 3.4.5 - Object Injection Remote Code Execution

2015.12.16

1. Add exploit module for Joomla 1.5 - 3.4.5 - Object Injection Remote Code Execution

[!] legal disclaimer: Usage of hackUtils for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

声明:仅作学习使用,任何人不可用于非法目的,否则一切后果由其本人承担!

More Repositories

1

WinSystemHelper

A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.
Batchfile
165
star
2

HackRequests

It is a dedicated requests lib that supports cookie, headers, get/post, etc. And it also supports rendering the response (e.g. Javascript, CSS, etc.) of GET requests by using PhantomJs enginee.
Python
86
star
3

WordPress_4.9.8_RCE_POC

A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.
67
star
4

SambaHunter

It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).
Python
54
star
5

CVE-2018-11788

Apache Karaf XXE Vulnerability (CVE-2018-11788)
37
star
6

S2-053-CVE-2017-12611

A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)
Python
37
star
7

CVE-2017-4878-Samples

CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
19
star
8

myPadBuster

It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.
Perl
17
star
9

S2-057-CVE-2018-11776

A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)
Python
16
star
10

RTEmulation

It is a repository for Red Team emulation based on MITRE ATT&CK.
C#
16
star
11

openvpn-easy-config

openvpn easy config for Ubuntu ONLY
Shell
9
star
12

CVE-2018-11761

Apache Tika Denial of Service Vulnerability (CVE-2018-11761)
9
star
13

Joomla3.7-SQLi-CVE-2017-8917

Joomla 3.7 SQL injection (CVE-2017-8917)
Python
8
star
14

TechArticles

A set of tech articles.
7
star
15

CVE-2019-6690

It is a simple PoC of Improper Input Validation in python-gnupg 0.4.3 (CVE-2019-6690).
Perl
6
star
16

Magento-CVE-2016-4010

Magento Unauthorized Remote Code Execution (CVE-2016-4010)
6
star
17

fileBatchUpload

基于菜刀PHP一句话实现单个文件批量上传
Python
5
star
18

checkVT

This is Python script to calculate SH256 for all files under the defined file path and check the scanning results on VirusTotal.com
Python
3
star
19

AwesomeSOC

This repository is a set of articles about what SOC is and how SOC is working in a big Internet firm.
3
star
20

NagaScan

NagaScan is a distributed passive vulnerability scanner for Web application.
1
star