Tools and Scripts used for Pentesting and CTFs like HackTheBox, tryhackme, and more
win | ||
__init__.py | ||
.gitignore | ||
cdk64 | ||
chisel | ||
chisel64 | ||
crack_hash.py | ||
crawl_urls.py | ||
deepce.sh | ||
dnsserver.py | ||
fileserver.py | ||
find_git_commit.py | ||
first_scan.sh | ||
git-dumper.py | ||
gobuster.sh | ||
jsp-webshell.jsp | ||
LinEnum.sh | ||
linpeas.sh | ||
linux-exploit-suggester.sh | ||
lse.sh | ||
ncat | ||
p0wny-shell.php | ||
padBuster.pl | ||
pcap_file_extract.py | ||
PetitPotam.py | ||
php-reverse-shell.php | ||
phpinfo-analyzer.py | ||
pingscan.py | ||
portscan.py | ||
pspy | ||
pspy64 | ||
README.md | ||
requirements.txt | ||
rev_shell.py | ||
smtpserver.py | ||
socat | ||
sql.php | ||
sqli.py | ||
ssh-check-username.py | ||
sshserver.py | ||
subdomainFuzz.sh | ||
template.py | ||
unix-privesc-check.sh | ||
update.sh | ||
upload_file.py | ||
uptux.py | ||
util.py | ||
web_service_finder.py | ||
xp_cmdshell.py | ||
xss_handler.py |
HackingScripts
This repository contains self-made and common scripts for information gathering, enumeration and more.
What is this?
I use this repository mostly for automated exploit chains. HackTheBox machines often involve steps like spawning a http server, serving a file, extracting content, steal data through custom DNS/FTP/SSH servers, spawning a reverse shell etc. Using this library I implement a script-to-root mechanism to chain all these steps together. Since the repository also includes lots of common payloads and binaries, I didn't want to put it on PyPI. If you got any recommendations for me, feel free to contact me!
Installation
git clone git@romanh.de:Roman/HackingScripts
sudo ln -s HackingScripts $(python -c "import sys;print(sys.path[-1])")/hackingscripts
Enumeration: Initial Scans
- first_scan.sh: Performs initial nmap scan
- gobuster.sh: Performs gobuster dir scan with raft-large-words-lowercase.txt
- subdomainFuzz.sh: Fuzzes subdomains for a given domain
- ssh-check-username.py: Check if user enumeration works for ssh
- git-dumper.py
Enumeration: Privilege Escalation & Pivoting
- LinEnum.sh
- linpeas.sh
- lse.sh
- unix-privesc-check.sh
- uptux.py
- pspy64
- portscan.py: small python script, which scans open TCP ports natively with multithread support. Can be deployed on victim machines to scan the intranet.
- pingscan.py: small python script, which can detect internal hosts via ping probes natively. Can be deployed on victim machines to scan the intranet.
- deepce.sh: Docker Privilege Escalation (e.g. exposed socket)
Reverse Shell: Payloads
- rev_shell.py: Generates a reverse shell command (e.g. netcat, python, ...)
- php-reverse-shell.php
- p0wny-shell.php
- aspx-reverse-shell.aspx
- jsp-webshell.jsp: webshell for Java servlets
Miscellaneous
- upload_file.py: Starts a local tcp server, for netcat usage
- xss_handler.py: Starts a local http server and generates xss payload to steal cookies
- padBuster.pl
- sql.php: Execute sql queries passed via GET/POST
- util.py: Collection of some small functions
- fileserver.py: Create a temporary http server serving in-memory files
- dnsserver.py: Create a temporary dns server responding dynamically to basic DNS requests (in-memory)
- sshserver.py: Create a temporary ssh server to intercept credentials (TODO: relay) (in-memory)
- smtpserver.py: Create a temporary smtp server (in-memory)
- template.py: Creates a template for web exploits, similar to pwnlib's template
- pcap_file_extract.py: Lists and extracts files from http connections found in pcap files
- find_git_commit.py: Compares a local repository (e.g. downloaded from a remote server) with another git repository to guess the commit hash. Useful to find used versions
- TODO: smb
Windows
- nc.exe/nc64.exe: netcat standalone binary
- mimikatz.exe
- plink.exe: command line PuTTY client for port forwarding
- powercat.ps1
- winPEAS.bat
- PowerView.ps1
- SharpHound.exe: BloodHound Ingestor
- windows-exploit-suggester.py
- aspx-reverse-shell.aspx
- xp_cmdshell.py (thanks to @alwayslucky)