README
This commit is contained in:
parent
bfb383ec61
commit
67045c6ba0
14
README.md
14
README.md
@ -14,9 +14,9 @@ sudo ln -s HackingScripts $(python -c "import sys;print(sys.path[-1])")/hackings
|
|||||||
### Enumeration: Initial Scans
|
### Enumeration: Initial Scans
|
||||||
- first_scan.sh: Performs initial nmap scan
|
- first_scan.sh: Performs initial nmap scan
|
||||||
- gobuster.sh: Performs gobuster dir scan with raft-large-words-lowercase.txt
|
- gobuster.sh: Performs gobuster dir scan with raft-large-words-lowercase.txt
|
||||||
- ssh-check-username.py: Check if user enumeration works for ssh
|
|
||||||
- [git-dumper.py](https://github.com/arthaud/git-dumper)
|
|
||||||
- subdomainFuzz.sh: Fuzzes subdomains for a given domain
|
- subdomainFuzz.sh: Fuzzes subdomains for a given domain
|
||||||
|
- [ssh-check-username.py](https://www.exploit-db.com/exploits/45939): Check if user enumeration works for ssh
|
||||||
|
- [git-dumper.py](https://github.com/arthaud/git-dumper)
|
||||||
|
|
||||||
### Enumeration: Privilege Escalation & Pivoting
|
### Enumeration: Privilege Escalation & Pivoting
|
||||||
- [LinEnum.sh](https://github.com/rebootuser/LinEnum)
|
- [LinEnum.sh](https://github.com/rebootuser/LinEnum)
|
||||||
@ -32,7 +32,7 @@ Can be deployed on victim machines to scan the intranet.
|
|||||||
- [deepce.sh](https://github.com/stealthcopter/deepce): Docker Privilege Escalation (e.g. exposed socket)
|
- [deepce.sh](https://github.com/stealthcopter/deepce): Docker Privilege Escalation (e.g. exposed socket)
|
||||||
|
|
||||||
### Reverse Shell: Payloads
|
### Reverse Shell: Payloads
|
||||||
- genRevShell.py: Generates a reverse shell command (e.g. netcat, python, ...)
|
- rev_shell.py: Generates a reverse shell command (e.g. netcat, python, ...)
|
||||||
- [php-reverse-shell.php](https://github.com/pentestmonkey/php-reverse-shell)
|
- [php-reverse-shell.php](https://github.com/pentestmonkey/php-reverse-shell)
|
||||||
- [p0wny-shell.php](https://github.com/flozz/p0wny-shell)
|
- [p0wny-shell.php](https://github.com/flozz/p0wny-shell)
|
||||||
- [aspx-reverse-shell.aspx](https://github.com/borjmz/aspx-reverse-shell)
|
- [aspx-reverse-shell.aspx](https://github.com/borjmz/aspx-reverse-shell)
|
||||||
@ -46,8 +46,14 @@ Can be deployed on victim machines to scan the intranet.
|
|||||||
- util.py: Collection of some small functions
|
- util.py: Collection of some small functions
|
||||||
- fileserver.py: Create a temporary http server serving in-memory files
|
- fileserver.py: Create a temporary http server serving in-memory files
|
||||||
- dnsserver.py: Create a temporary dns server responding dynamically to basic DNS requests (in-memory)
|
- dnsserver.py: Create a temporary dns server responding dynamically to basic DNS requests (in-memory)
|
||||||
|
- sshserver.py: Create a temporary ssh server to intercept credentials (TODO: relay) (in-memory)
|
||||||
|
- smtpserver.py: Create a temporary smtp server (in-memory)
|
||||||
|
- template.py: Creates a template for web exploits, similar to pwnlib's template
|
||||||
|
- pcap_file_extract.py: Lists and extracts files from http connections found in pcap files
|
||||||
|
- find_git_commit.py: Compares a local repository (e.g. downloaded from a remote server) with another git repository to guess the commit hash. Useful to find used versions
|
||||||
|
- TODO: smb
|
||||||
|
|
||||||
### Windows
|
### [Windows](win/)
|
||||||
- nc.exe/nc64.exe: netcat standalone binary
|
- nc.exe/nc64.exe: netcat standalone binary
|
||||||
- [mimikatz.exe](https://github.com/gentilkiwi/mimikatz)
|
- [mimikatz.exe](https://github.com/gentilkiwi/mimikatz)
|
||||||
- [plink.exe](https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html): command line PuTTY client for port forwarding
|
- [plink.exe](https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html): command line PuTTY client for port forwarding
|
||||||
|
@ -10,6 +10,8 @@ import socket
|
|||||||
import sys
|
import sys
|
||||||
import pdb
|
import pdb
|
||||||
|
|
||||||
|
# CVE-2018-15473 (OpenSSH 7.7)
|
||||||
|
|
||||||
class InvalidUsername(Exception):
|
class InvalidUsername(Exception):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
Binary file not shown.
Loading…
Reference in New Issue
Block a user