There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Python Scripts fbStalker - OSINT tool for Facebook - Based on Facebook Graph and other stuff geoStalker - OSINT tool for Geolocation related sources - Flickr, Instagram, Twitter, Wigle. The userIDs found is used to find social media accounts across other networks like Facebook, Youtube, Instagram, Google+, Linkedin and Google Search All updates/changes to the code will be posted via twitter account @osintstalker. Please follow this account for updates and improvements to the code. ------------------------------------------------------------------------------------------ Presentation Slides of our talk at HackInTheBox Kuala Lumpur 2013. http://conference.hitb.org/hitbsecconf2013kul/materials/D2T3%20-%20Keith%20Lee%20and%20Jonathan%20Werrett%20-%20Facebook%20OSINT.pdf ------------------------------------------------------------------------------------------ Videos Geostalker running in Kali Linux https://www.youtube.com/watch?v=qUqT9Ct2kg0&feature=youtu.be ------------------------------------------------------------------------------------------ Instructions for FBstalker Install Google Chrome and ChromeDriver on Kali Linux If you are using 32 bit Kali Linux (run uname -r to find out) wget http://95.31.35.30/chrome/pool/main/g/google-chrome-stable/google-chrome-stable_27.0.1453.93-r200836_i386.deb wget https://chromedriver.googlecode.com/files/chromedriver_linux32_23.0.1240.0.zip unzip chromedriver_linux32_23.0.1240.0.zip cp chromedriver /usr/bin/chromedriver chmod 777 /usr/bin/chromedriver If you are using 64 bit Kali Linux (run uname -r to find out) wget http://95.31.35.30/chrome/pool/main/g/google-chrome-stable/google-chrome-stable_27.0.1453.93-r200836_amd64.deb wget https://chromedriver.googlecode.com/files/chromedriver_linux64_23.0.1240.0.zip unzip chromedriver_linux64_23.0.1240.0.zip cp chromedriver /usr/bin/chromedriver chmod 777 /usr/bin/chromedriver sudo apt-get install python-setuptools wget https://pypi.python.org/packages/source/p/pip/pip-1.4.1.tar.gz tar xvfz pip-1.4.1.tar.gz cd pip-1.4.1 sudo python2.7 setup.py install pip install pytz pip install tzlocal pip install termcolor pip install selenium pip install requests --upgrade pip install beautifulsoup4 git clone https://github.com/hadim/pygraphml.git cd pygraphml python2.7 setup.py install Edit fbstalker.py and update facebook_username (same as email address) and facebook_password. Run python fbstalker.py -user [facebook target username] ------------------------------------------------------------------------------------------ Instructions for GEOstalker For geoStalker, you will need to supply a bunch of API keys and access_tokens for now. The script will be updated later with an easier method on gettingsud the access_tokens. Dependencies for Geostalker [Tested on Kali Linux] Install Google Chrome and ChromeDriver on Kali Linux wget https://chromedriver.googlecode.com/files/chromedriver_linux64_23.0.1240.0.zip cp chromedriver /usr/bin/chromedriver chmod 777 /usr/bin/chromedriver If you are using 32 bit Kali Linux (run uname -r to find out) wget http://95.31.35.30/chrome/pool/main/g/google-chrome-stable/google-chrome-stable_27.0.1453.93-r200836_i386.deb If you are using 64 bit Kali Linux (run uname -r to find out) wget http://95.31.35.30/chrome/pool/main/g/google-chrome-stable/google-chrome-stable_27.0.1453.93-r200836_amd64.deb Python2.7 sudo apt-get install python-setuptools wget https://pypi.python.org/packages/source/p/pip/pip-1.4.1.tar.gz tar xvfz pip-1.4.1.tar.gz cd pip-1.4.1 sudo python2.7 setup.py install git clone https://github.com/hadim/pygraphml.git cd pygraphml python2.7 setup.py install pip-2.7 install google pip-2.7 install python-instagram pip-2.7 install pygoogle pip-2.7 install geopy pip-2.7 install lxml pip-2.7 install oauth2 pip-2.7 install python-linkedin pip-2.7 install pygeocoder pip-2.7 install selenium pip-2.7 install termcolor pip-2.7 install pysqlite pip-2.7 install TwitterSearch pip-2.7 install foursquare wget https://gdata-python-client.googlecode.com/files/gdata-2.0.18.tar.gz tar xvfz gdata-2.0.18.tar.gz cd gdata-2.0.18 python2.7 setup.py install ------------------------------------------------------------------------------------------ ********************************* HOW TO USE geoStalker ********************************** 1. Fill in the API keys and access_tokens in geostalker.py 2. If an API key or access_token is missing, it will skip that particular social network API lookup/search 3. Run 'sudo python2.7 geostalker.py' 4. Input a physical address or GPS coordinates $ sudo python2.6 geostalker.py MMMMMM$ZMMMMMDIMMMMMMMMNIMMMMMMIDMMMMMMM MMMMMMNINMMMMDINMMMMMMMZIMMMMMZIMMMMMMMM MMMMMMMIIMMMMMI$MMMMMMMIIMMMM8I$MMMMMMMM MMMMMMMMIINMMMIIMMMMMMNIIMMMOIIMMMMMMMMM MMMMMMMMOIIIMM$I$MMMMNII8MNIIINMMMMMMMMM MMMMMMMMMZIIIZMIIIMMMIIIM7IIIDMMMMMMMMMM MMMMMMMMMMDIIIIIIIZMIIIIIII$MMMMMMMMMMMM MMMMMMMMMMMM8IIIIIIZIIIIIIMMMMMMMMMMMMMM MMMMMMMMMMMNIIIIIIIIIIIIIIIMMMMMMMMMMMMM MMMMMMMMM$IIIIIIIIIIIIIIIIIII8MMMMMMMMMM MMMMMMMMIIIIIZIIIIZMIIIIIDIIIIIMMMMMMMMM MMMMMMOIIIDMDIIIIZMMMIIIIIMMOIIINMMMMMMM MMMMMNIIIMMMIIII8MMMMM$IIIZMMDIIIMMMMMMM MMMMIIIZMMM8IIIZMMMMMMMIIIIMMMM7IIZMMMMM MMM$IIMMMMOIIIIMMMMMMMMMIIIIMMMM8IIDMMMM MMDIZMMMMMIIIIMMMMMMMMMMNIII7MMMMNIIMMMM MMIOMMMMMNIII8MMMMMMMMMMM7IIIMMMMMM77MMM MO$MMMMMM7IIIMMMMMMMMMMMMMIII8MMMMMMIMMM MIMMMMMMMIIIDMMMMMMMMMMMMM$II7MMMMMMM7MM MMMMMMMMMIIIMMMMMMMMMMMMMMMIIIMMMMMMMDMM MMMMMMMMMII$MMMMMMMMMMMMMMMIIIMMMMMMMMMM MMMMMMMMNIINMMMMMMMMMMMMMMMOIIMMMMMMMMMM MMMMMMMMNIOMMMMMMMMMMMMMMMMM7IMMMMMMMMMM MMMMMMMMNINMMMMMMMMMMMMMMMMMZIMMMMMMMMMM MMMMMMMMMIMMMMMMMMMMMMMMMMMM8IMMMMMMMMMM ********************************************************** ****** GeoStalker Version 1.0 HackInTheBox Release ****** ********************************************************** Please enter an address or GPS coordinates (e.g. 4.237588,101.131332):______________
pathbrute
PathbruteCVE-2018-13379
CVE-2018-13379metasploitHelper
metasploitHelperpentest_scripts
portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the networkCVE-2018-13382
CVE-2018-13382CVE-2018-0296
Test CVE-2018-0296 and extract usernamesipv4Bypass
Using IPv6 to Bypass SecurityiPhone-Espionage
nmap2nessus
owaDump
Search Email Accounts (OWA) for Passwords, PAN numbers as well as other KeywordsSocial-Engineering-Toys
Social Engineering ToysCVE-2021-21972
CVE-2021-21972burpSQL
Automating SQL injection using Burp Proxy Logs and SQLMapphishing-frenzy-template-cloner
pentest_automation
proxy_tester
Python script to test proxiesburpXSS
Automating LFI/RFI using Burp Proxy Logs and fimapgoSpider
Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.firebirdDump
Uses the default firebird database credentials to perform a database dumpCVE-2020-14882
CVE-2020-14882CVE-2013-6117
CVE-2013-6117fingerprint_browser
winboxHunter
winboxHuntersmbDumper
smbDumperphishing-scripts
Some miscellaneous phishing scriptsproxies-rotator
Dockerfile for Proxies Testing/Rotationbotstrike
Botstrikenuclei-templates-others
phishingfarm
Phishing Farmexcelcrack
Automatically exported from code.google.com/p/excelcrackpentest-scripts
Automatically exported from code.google.com/p/pentest-scriptscarbonatorMulti
Fork from Integris Security Carbonator - Carbonator to scan multiple URLs using Burpsuite at one gogetoab
Automatically exported from code.google.com/p/getoabrecon
reconOpenscapAlternative
Openscap Alternative for RHEL (without Installation)shoretel-brute
Automatically exported from code.google.com/p/shoretel-brutelimekernelmodules
Kernel Modules for LIME forensicsxlsinjector
Automatically exported from code.google.com/p/xlsinjectorprefetch-tool
Automatically exported from code.google.com/p/prefetch-toolLove Open Source and this site? Check out how you can help us