hacktricks/src/todo/more-tools.md

121 lines
11 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{{#include ../banners/hacktricks-training.md}}
# BlueTeam
- [https://github.com/yarox24/attack_monitor](https://github.com/yarox24/attack_monitor)
- [https://capsule8.com/blog/dont-get-kicked-out-a-tale-of-rootkits-and-other-backdoors/](https://capsule8.com/blog/dont-get-kicked-out-a-tale-of-rootkits-and-other-backdoors/)
- [https://github.com/ION28/BLUESPAWN](https://github.com/ION28/BLUESPAWN)
- [https://github.com/PaperMtn/lil-pwny](https://github.com/PaperMtn/lil-pwny) : 检查泄露的账户
- [https://github.com/rabobank-cdc/DeTTECT](https://github.com/rabobank-cdc/DeTTECT)
# OSINT
- [https://github.com/3vangel1st/kamerka](https://github.com/3vangel1st/kamerka)
- [https://github.com/BullsEye0/google_dork_list](https://github.com/BullsEye0/google_dork_list)
- [https://github.com/highmeh/lure](https://github.com/highmeh/lure)
- [https://www.shodan.io/](https://www.shodan.io)
- [https://censys.io/](https://censys.io)
- [https://viz.greynoise.io/table](https://viz.greynoise.io/table)
- [https://www.zoomeye.org](https://www.zoomeye.org)
- [https://fofa.so](https://fofa.so)
- [https://www.onyphe.io](https://www.onyphe.io)
- [https://app.binaryedge.io](https://app.binaryedge.io)
- [https://hunter.io](https://hunter.io)
- [https://wigle.net](https://wigle.net)
- [https://ghostproject.fr](https://ghostproject.fr)
- [https://www.oshadan.com/](https://www.oshadan.com)
- [https://builtwith.com/](https://builtwith.com)
- [https://www.spiderfoot.net/](https://www.spiderfoot.net)
- [https://github.com/zricethezav/gitleaks](https://github.com/zricethezav/gitleaks)
- [https://www.nmmapper.com/sys/tools/subdomainfinder/](https://www.nmmapper.com/sys/tools/subdomainfinder/) : 8个子域名查找工具sublist3ramass等
# **WEB**
- [https://github.com/AlisamTechnology/ATSCAN](https://github.com/AlisamTechnology/ATSCAN)
- [https://github.com/momenbasel/KeyFinder](https://github.com/momenbasel/KeyFinder)
- [https://github.com/hahwul/XSpear](https://github.com/hahwul/XSpear)
- [https://github.com/BitTheByte/Monitorizer/](https://github.com/BitTheByte/Monitorizer/)
- [https://github.com/spinkham/skipfish](https://github.com/spinkham/skipfish)
- [https://github.com/blark/aiodnsbrute](https://github.com/blark/aiodnsbrute) : 异步暴力破解域名
- [https://crt.sh/?q=%.yahoo.com](https://crt.sh/?q=%.yahoo.com) : 子域名暴力破解
- [https://github.com/tomnomnom/httprobe](https://github.com/tomnomnom/httprobe): 检查域中的Web服务器是否可访问
- [https://github.com/aboul3la/Sublist3r](https://github.com/aboul3la/Sublist3r) : 子域名发现
- [https://github.com/gwen001/github-search/blob/master/github-subdomains.py](https://github.com/gwen001/github-search/blob/master/github-subdomains.py) : 在github中发现子域名
- [https://github.com/robertdavidgraham/masscan](https://github.com/robertdavidgraham/masscan) : 快速端口扫描
- [https://github.com/Threezh1/JSFinder](https://github.com/Threezh1/JSFinder) : 从Web中的JS文件获取子域名和URL
- [https://github.com/C1h2e1/MyFuzzingDict](https://github.com/C1h2e1/MyFuzzingDict) : Web文件字典
- [https://github.com/TypeError/Bookmarks/blob/master/README.md](https://github.com/TypeError/Bookmarks/blob/master/README.md) : Burp扩展以避免多个重复标签
- [https://github.com/hakluke/hakrawler](https://github.com/hakluke/hakrawler) : 获取资产
- [https://github.com/izo30/google-dorker](https://github.com/izo30/google-dorker) : Google dorks
- [https://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md](https://github.com/sehno/Bug-bounty/blob/master/bugbounty_checklist.md) : Web BugBounty检查清单
- [https://github.com/Naategh/dom-red](https://github.com/Naategh/dom-red) : 检查域列表以防止开放重定向
- [https://github.com/prodigysml/Dr.-Watson](https://github.com/prodigysml/Dr.-Watson) : Burp插件离线分析以发现域、子域和IP
- [https://github.com/hahwul/WebHackersWeapons](https://github.com/hahwul/WebHackersWeapons): 不同工具的列表
- [https://github.com/gauravnarwani97/Trishul](https://github.com/gauravnarwani97/Trishul) : BurpSuite插件以查找漏洞SQLiXSSSSTI
- [https://github.com/fransr/postMessage-tracker](https://github.com/fransr/postMessage-tracker) : 用于跟踪post-messages函数的Chrome扩展
- [https://github.com/Quitten/Autorize](https://github.com/Quitten/Autorize) : 自动身份验证测试删除cookies并尝试发送请求
- [https://github.com/pikpikcu/xrcross](https://github.com/pikpikcu/xrcross): XRCross是一个重建、扫描器和渗透/ BugBounty测试工具。该工具旨在测试XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI漏洞
# Windows
- [https://github.com/Mr-Un1k0d3r/PoisonHandler](https://github.com/Mr-Un1k0d3r/PoisonHandler) : 横向移动
- [https://freddiebarrsmith.com/trix/trix.html](https://freddiebarrsmith.com/trix/trix.html) : LOL bins
- [https://gist.github.com/netbiosX/ee35fcd3722e401a38136cff7b751d79](https://gist.github.com/netbiosX/ee35fcd3722e401a38136cff7b751d79) ([https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/](https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/)): 持久性
- [https://github.com/odzhan/injection](https://github.com/odzhan/injection) : Windows进程注入技术
- [https://github.com/BankSecurity/Red_Team](https://github.com/BankSecurity/Red_Team) : 红队脚本
- [https://github.com/l0ss/Grouper2](https://github.com/l0ss/Grouper2) : 查找Active Directory组策略中的安全相关错误配置。
- [https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring](https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring) : Securestring混淆
- [https://pentestlab.blog/2020/02/24/parent-pid-spoofing/](https://pentestlab.blog/2020/02/24/parent-pid-spoofing/) : 父PID欺骗
- [https://github.com/the-xentropy/xencrypt](https://github.com/the-xentropy/xencrypt) : 加密Powershell有效载荷
- [https://shells.systems/introducing-ninja-c2-the-c2-built-for-stealth-red-team-operations/](https://shells.systems/introducing-ninja-c2-the-c2-built-for-stealth-red-team-operations/) : 隐蔽C2
- [https://windows-internals.com/faxing-your-way-to-system/](https://windows-internals.com/faxing-your-way-to-system/) : 关于Windows内部的日志系列
- [https://bestestredteam.com/2018/10/02/tracking-pixel-in-microsoft-office-document/](https://bestestredteam.com/2018/10/02/tracking-pixel-in-microsoft-office-document/) : 跟踪谁打开了文档
- [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet) : Active Directory备忘单
# Firmware
工具q veo q pueden molar para analizar firmares (automaticas):
- [https://github.com/craigz28/firmwalker](https://github.com/craigz28/firmwalker)
- [https://github.com/fkie-cad/FACT_core](https://github.com/fkie-cad/FACT_core)
- [https://gitlab.com/bytesweep/bytesweep-go](https://gitlab.com/bytesweep/bytesweep-go)
Post-crema:
- [https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html](https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html)
- [https://blog.mindedsecurity.com/2018/10/pentesting-iot-devices-part-2-dynamic.html](https://blog.mindedsecurity.com/2018/10/pentesting-iot-devices-part-2-dynamic.html)
Como extraer firmware si no lo encontramos online: [https://www.youtube.com/watch?v=Kxvpbu9STU4](https://www.youtube.com/watch?v=Kxvpbu9STU4)
Aqui un firware con vulnerabilidades para analizar: [https://github.com/scriptingxss/IoTGoat](https://github.com/scriptingxss/IoTGoat)
y por aqui la metodologia owasp para analizar firmware: [https://github.com/scriptingxss/owasp-fstm](https://github.com/scriptingxss/owasp-fstm)
Firmware emulation: FIRMADYNE (https://github.com/firmadyne/firmadyne/) is a platform for automating the emulation and dynamic analysis of Linux-based firmware.
# OTHER
- [https://twitter.com/HackAndDo/status/1202695084543791117](https://twitter.com/HackAndDo/status/1202695084543791117)
- [https://github.com/weev3/LKWA](https://github.com/weev3/LKWA)
- [https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/](https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/)
- [https://github.com/skelsec/jackdaw](https://github.com/skelsec/jackdaw)
- [https://github.com/CoatiSoftware/Sourcetrail](https://github.com/CoatiSoftware/Sourcetrail) : 静态代码分析
- [https://www.hackerdecabecera.com/2019/12/blectf-capture-flag-en-formato-hardware.html](https://www.hackerdecabecera.com/2019/12/blectf-capture-flag-en-formato-hardware.html) : Bluetooth LE CTF
- [https://github.com/skeeto/endlessh](https://github.com/skeeto/endlessh) : SSH tarpit that slowly sends an endless banner.
- AWS and Cloud tools: [https://github.com/toniblyx/my-arsenal-of-aws-security-tools](https://github.com/toniblyx/my-arsenal-of-aws-security-tools)
- IFS (Interplanetary File System) for phising: [https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/using-the-interplanetary-file-system-for-offensive-operations/](https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/using-the-interplanetary-file-system-for-offensive-operations/)
- IP rotation services: [https://medium.com/@lokeshdlk77/how-to-rotate-ip-address-in-brute-force-attack-e66407259212](https://medium.com/@lokeshdlk77/how-to-rotate-ip-address-in-brute-force-attack-e66407259212)
- Linux rootkit: [https://github.com/aesophor/satanic-rootkit](https://github.com/aesophor/satanic-rootkit)
- [https://theia-ide.org/](https://theia-ide.org) : 在线IDE
- [https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/) : 开始BugBounty的资源
- [https://medium.com/macoclock/jailbreak-and-stuff-kickstart-tools-and-techniques-for-ios-application-pentesting-6fa53a3987ab](https://medium.com/macoclock/jailbreak-and-stuff-kickstart-tools-and-techniques-for-ios-application-pentesting-6fa53a3987ab) : IOS渗透测试工具
- [https://github.com/random-robbie/keywords/blob/master/keywords.txt](https://github.com/random-robbie/keywords/blob/master/keywords.txt) : 关键词
- [https://github.com/ElevenPaths/HomePWN](https://github.com/ElevenPaths/HomePWN) : 黑客IoTWifiBLESSDPMDNS
- [https://github.com/rackerlabs/scantron](https://github.com/rackerlabs/scantron) : 自动化扫描
- [https://github.com/doyensec/awesome-electronjs-hacking](https://github.com/doyensec/awesome-electronjs-hacking) : 此列表旨在涵盖与Electron.js安全相关的主题。
- [https://github.com/serain/bbrecon](https://github.com/serain/bbrecon) : BB程序的信息
{{#include ../banners/hacktricks-training.md}}