All Projects → Fplyth0ner-Combie → Bug Project Framework

Fplyth0ner-Combie / Bug Project Framework

漏洞利用框架模块分享仓库

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Bug Project Framework

Penetration Testing Tools
A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+79.01%)
Mutual labels:  exploit, tools
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+11.37%)
Mutual labels:  exploit, tools
Hack Tools
hack tools
Stars: ✭ 488 (+42.27%)
Mutual labels:  exploit, tools
Oxidtools
200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-58.31%)
Mutual labels:  exploit, tools
Stuff
Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-57.43%)
Mutual labels:  exploit, tools
Upterm
Secure Terminal Sharing
Stars: ✭ 261 (-23.91%)
Mutual labels:  sharing, tools
Ladon
大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+748.69%)
Mutual labels:  exploit, tools
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-23.32%)
Mutual labels:  exploit, tools
Armpwn
Repository to train/learn memory corruption on the ARM platform.
Stars: ✭ 320 (-6.71%)
Mutual labels:  exploit
Cve 2018 7600
💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002
Stars: ✭ 330 (-3.79%)
Mutual labels:  exploit
Unity Mulligan Renamer
Mulligan Renamer tool for the Unity Editor allows for quick and safe renaming of many assets and gameobjects at once
Stars: ✭ 315 (-8.16%)
Mutual labels:  tools
Fiddler Plus
自定义的Fiddler规则,多环境切换、解决跨域开发、快速调试线上代码必备|高效调试分析利器
Stars: ✭ 325 (-5.25%)
Mutual labels:  tools
Jsshell
An interactive multi-user web JS shell
Stars: ✭ 330 (-3.79%)
Mutual labels:  exploit
Mediacms
MediaCMS is a modern, fully featured open source video and media CMS, written in Python/Django and React, featuring a REST API.
Stars: ✭ 313 (-8.75%)
Mutual labels:  sharing
Stup
Daily notes in the terminal 🐧
Stars: ✭ 340 (-0.87%)
Mutual labels:  tools
Wordpress Xmlrpc Brute Force Exploit
Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield
Stars: ✭ 315 (-8.16%)
Mutual labels:  exploit
Pwn2own2020
Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
Stars: ✭ 314 (-8.45%)
Mutual labels:  exploit
Restool
RESTool is an open source UI tool for managing RESTful APIs. It could save you time developing your own internal tools. A live example:
Stars: ✭ 338 (-1.46%)
Mutual labels:  tools
Rectlabel Support
RectLabel - An image annotation tool to label images for bounding box object detection and segmentation.
Stars: ✭ 338 (-1.46%)
Mutual labels:  tools
Doraemonkit
一款面向泛前端产品研发全生命周期的效率平台。
Stars: ✭ 18,305 (+5236.73%)
Mutual labels:  tools

Bug-Project-Framework

时间过去这么久了,感觉框架也该升级了,回过头看,这个太垃圾了。 今后框架主体不会再更新优化,仅做模块更新,供广大安全爱好者做漏洞复现记录利用使用。 由于受到相关法律法规和其他政策的影响,新制框架不会对公众开放下载使用,谢谢理解。

[+]简介:

*允许使用者使用BPF框架语言
*允许自行扩充EXP
*可通过框架快速检测安全漏洞是否存在
*对相应的网络环境进行安全审计工作

[+]检测对象:

*互联网虚弱目标

[+]使用说明:

*框架启动前请尽量关闭杀软或暂停文件保护服务,杀毒软件会误杀框架组件,导致框架失效;
*第一次使用前,请将全部文件解压到一个固定路径的文件夹,然后打开shellcode options修改shellcode路径;
*然后将exploit放在相应的文件夹内,exploit类放在exploit文件夹内,poc类放在poc文件夹内,buffer类放在buffer文件夹内,启动框架,即可使用相应功能;

*exploit类主要针对WEB漏洞,poc类主要针对WEB漏洞检测,buffer类调用外置可执行模块。

[+]使用方法:

在BPF根命令行下:

      help                查询帮助

      reload              重新加载框架,此时会刷新全部模块

      search              搜索模块关键词并显示
                          ( e.g.  search ms17-010 )
      searchall           显示所有模块

      use                 使用模块
                          ( e.g.  use \buffer\ms17-010 Scan.bpf )
      set shellcodes      配置默认Shellcode路径

      exit                退出BPF


在BPF模块命令行下:

      help                查询帮助

      show options        查看当前模块参数以及配置情况

      set options         设置当前模块参数以及配置

      set shellcodes      配置默认Shellcode路径

      run                 运行模块

      exit                退出当前模块

当你输入除上述指定规定参数以外的命令时,BPF框架会将命令识别为系统命令,提交Windows操作系统进行处理

      HAPPY HACK !GOOD LUCK !
      2018.5.7 BY Fplyth0ner

[+]使用截图

One Two

[+]exploit编写:

*框架自带编写记事本,可参考BPF语法快速编写exploit,详情请参考BPF IDE提示的语法。

[+]感谢:

Metasploit - Rapid7
NetCat - Hobbit

[+]铭恩:

Computer - John von Neumann
Internet - Tim Berners-Lee
Linux - Linus Benedict Torvalds
Windows - Bill Gates
C - D.M.Ritchie
JavaScript - Brendan Eich
Tomcat - James Duncan Davidson
Apache - Apache Software Foundation
Java - James Gosling
VMware - Diane Greene
Baidu - 李彦宏
Google - Larry Page

[+]特别感谢:

Tencent - 马化腾
E - 吴涛

2017年4月12日工程 -- Fplyth0ner

欢迎大家积极参与模块编写计划!


Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].