• Stars
    star
    356
  • Rank 119,446 (Top 3 %)
  • Language
    Shell
  • Created over 2 years ago
  • Updated about 2 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

segfault.net - A Server Centre Deployment

This page is for server administrators and those folks who like to run their own Segfault.net Server Centre (SSC). Running your own SSC allows you to offer root-servers to other users.

If this is not what you want and you just like to get a root-shell on your own server then please go to https://www.thc.org/segfault or try our demo deployment:

ssh [email protected] # the password is 'segfault'

Deploy a Server Centre:

git clone --depth 1 https://github.com/hackerschoice/segfault.git && \
cd segfault && \
export SF_SEED="$(head -c 1024 /dev/urandom | tr -dc '[:alpha:]' | head -c 32)" && \
echo "SF_SEED=${SF_SEED}" && \
make

To start execute:

SF_BASEDIR="$(pwd)" SF_SSH_PORT=2222 sfbin/sf up

Take a look at provision/env.example for a sample .env file.

The limits and constraints for all root servers are configured in config/etc/sf/sf.conf. It is possible to relax limits per individual root server by creating a file in config/db/db-<LID>/limits.conf. The is the ID of the server (type echo $SF_LID when logged in to the server). Alternatively it is possible to get the LID from the Root Server's name: cat config/db/hn/hn2lid-<SF_HOSTNAME>.

Provisioning

Provisioning turns a freshly created Linux (a bare minimum Installation) into a SSC. It's how we 'ready' a newly launched AWS Instance for SSC deployment. You likely dont ever need this but we wrote it down anyway.


Telegram: https://t.me/thcorg Twitter: https://twitter.com/hackerschoice

More Repositories

1

thc-tips-tricks-hacks-cheat-sheet

Various tips & tricks
Shell
3,129
star
2

gsocket

Connect like there is no firewall. Securely.
C
1,504
star
3

THC-Archive

All releases of the security research group (a.k.a. hackers) The Hacker's Choice
HTML
685
star
4

thc-tesla-powerwall2-hack

TESLA PowerWall 2 Security Shenanigans
457
star
5

ssh-key-backdoor

Shell
328
star
6

hackshell

Make BASH stealthy and hacker friendly with lots of bash functions
Shell
187
star
7

bpfhacks

eBPF hacks
171
star
8

zapper

Zaps arguments and environment from the process list
C
166
star
9

CVE-2021-26855

PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github
Python
61
star
10

ttyinject

Get root via TTY / TIOCSTI stuffing
C
61
star
11

thc-btc-rng-bruteforce

C
49
star
12

memexec

Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
Assembly
47
star
13

ssh-it

Self replicating and automatically spreading SSH worm that recovers login credentials
C
41
star
14

erfs

Shell
37
star
15

thc-arpmitm

ARP Man-in-the-Middle tool
C
27
star
16

thc-rut

THC "R U There" network discovery tool
Objective-C
26
star
17

gsocket-relay

Global Socket Server
C
24
star
18

gs-transfer

Secure File Transfer via Global Socket Bounce Network
C
24
star
19

dsniff

C
24
star
20

docker-thc-hacker

Docker environment for hackers
Shell
14
star
21

iran-ssh-proxy

Docker Server Side for the Iran Proxy
Shell
13
star
22

binary

Binary and Static Releases
13
star
23

hackerschoice.github.io

The Hacker's Choice
13
star
24

kb

The Hacker's Choice Knowledge Base & Articles
11
star
25

cryptostorm

CrytptoStorm.is WireGuard docker container
Shell
7
star
26

docker-erfs-server

Shell
7
star
27

thc-art

Artistic work by THC
6
star
28

gsocket.io

Web pages for gsocket.io
5
star
29

mail

A Free Mail Forwarding Service
Perl
3
star
30

dnsgw

Go
3
star
31

thc-freezer-monitor

Raspberry Pi + MQTT + ThingSpeak + IFTTT
Python
1
star