• Stars
    star
    325
  • Rank 128,892 (Top 3 %)
  • Language
    Shell
  • Created over 2 years ago
  • Updated 6 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

segfault.net - A Server Centre Deployment

This page is for server administrators and those folks who like to run their own Segfault.net Server Centre (SSC). Running your own SSC allows you to offer root-servers to other users.

If this is not what you want and you just like to get a root-shell on your own server then please go to https://www.thc.org/segfault or try our demo deployment:

ssh [email protected] # the password is 'segfault'

Deploy a Server Centre:

git clone --depth 1 https://github.com/hackerschoice/segfault.git && \
cd segfault && \
export SF_SEED="$(head -c 1024 /dev/urandom | tr -dc '[:alpha:]' | head -c 32)" && \
echo "SF_SEED=${SF_SEED}" && \
make

To start execute:

SF_BASEDIR="$(pwd)" SF_SSH_PORT=2222 sfbin/sf up

Take a look at provision/env.example for a sample .env file.

The limits and constraints for all root servers are configured in config/etc/sf/sf.conf. It is possible to relax limits per individual root server by creating a file in config/db/db-<LID>/limits.conf. The is the ID of the server (type echo $SF_LID when logged in to the server). Alternatively it is possible to get the LID from the Root Server's name: cat config/db/hn/hn2lid-<SF_HOSTNAME>.

Provisioning

Provisioning turns a freshly created Linux (a bare minimum Installation) into a SSC. It's how we 'ready' a newly launched AWS Instance for SSC deployment. You likely dont ever need this but we wrote it down anyway.


Telegram: https://t.me/thcorg Twitter: https://twitter.com/hackerschoice

More Repositories

1

thc-tips-tricks-hacks-cheat-sheet

Various tips & tricks
Shell
2,930
star
2

gsocket

Connect like there is no firewall. Securely.
C
1,396
star
3

THC-Archive

All releases of the security research group (a.k.a. hackers) The Hacker's Choice
HTML
672
star
4

thc-tesla-powerwall2-hack

TESLA PowerWall 2 Security Shenanigans
458
star
5

ssh-key-backdoor

Shell
319
star
6

bpfhacks

eBPF hacks
156
star
7

zapper

Zaps arguments and environment from the process list
C
134
star
8

CVE-2021-26855

PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github
Python
62
star
9

ttyinject

Get root via TTY / TIOCSTI stuffing
C
56
star
10

thc-btc-rng-bruteforce

C
49
star
11

ssh-it

Self replicating and automatically spreading SSH worm that recovers login credentials
C
37
star
12

erfs

Shell
36
star
13

thc-arpmitm

ARP Man-in-the-Middle tool
C
27
star
14

thc-rut

THC "R U There" network discovery tool
Objective-C
26
star
15

gs-transfer

Secure File Transfer via Global Socket Bounce Network
C
25
star
16

gsocket-relay

Global Socket Server
C
23
star
17

dsniff

C
22
star
18

docker-thc-hacker

Docker environment for hackers
Shell
14
star
19

iran-ssh-proxy

Docker Server Side for the Iran Proxy
Shell
13
star
20

binary

Binary and Static Releases
13
star
21

hackerschoice.github.io

The Hacker's Choice
12
star
22

kb

The Hacker's Choice Knowledge Base & Articles
11
star
23

docker-erfs-server

Shell
7
star
24

cryptostorm

CrytptoStorm.is WireGuard docker container
Shell
6
star
25

thc-art

Artistic work by THC
6
star
26

gsocket.io

Web pages for gsocket.io
4
star
27

mail

A Free Mail Forwarding Service
Perl
2
star
28

hackshell

Make BASH stealthy and hacker friendly with lots of bash functions
2
star
29

dnsgw

Go
2
star
30

thc-freezer-monitor

Raspberry Pi + MQTT + ThingSpeak +Β IFTTT
Python
1
star
31

memexec

Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
PHP
1
star