All Projects → ztgrace → Changeme

ztgrace / Changeme

Licence: gpl-3.0
A default credential scanner.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Changeme

Awesome Shodan Queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻
Stars: ✭ 2,758 (+197.2%)
Mutual labels:  security-tools, penetration-testing, infosec, security-scanner
Pentest Chainsaw
Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product
Stars: ✭ 36 (-96.12%)
Mutual labels:  security-tools, infosec, security-scanner
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-93.32%)
Mutual labels:  security-tools, penetration-testing, infosec
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+96.55%)
Mutual labels:  security-tools, penetration-testing, security-scanner
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-82.54%)
Mutual labels:  security-tools, penetration-testing, security-scanner
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+270.58%)
Mutual labels:  security-tools, penetration-testing, infosec
M4ngl3m3
Common password pattern generator using strings list
Stars: ✭ 103 (-88.9%)
Mutual labels:  security-tools, penetration-testing, infosec
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-80.39%)
Mutual labels:  security-tools, penetration-testing, infosec
Smogcloud
Find cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (-81.9%)
Mutual labels:  security-tools, penetration-testing, infosec
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+199.03%)
Mutual labels:  security-tools, penetration-testing, infosec
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (-16.49%)
Mutual labels:  security-tools, penetration-testing, security-scanner
Hashview
A web front-end for password cracking and analytics
Stars: ✭ 601 (-35.24%)
Mutual labels:  security-tools, penetration-testing
Awesome Security Hardening
A collection of awesome security hardening guides, tools and other resources
Stars: ✭ 630 (-32.11%)
Mutual labels:  security-tools, infosec
Habu
Hacking Toolkit
Stars: ✭ 635 (-31.57%)
Mutual labels:  security-tools, penetration-testing
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+641.59%)
Mutual labels:  infosec, security-tools
Scanners Box
A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
Stars: ✭ 5,590 (+502.37%)
Mutual labels:  penetration-testing, security-tools
Jackhammer
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (-31.79%)
Mutual labels:  penetration-testing, security-scanner
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (-3.34%)
Mutual labels:  security-tools, security-scanner
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+680.82%)
Mutual labels:  penetration-testing, infosec
Gorsair
Gorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (-26.94%)
Mutual labels:  penetration-testing, infosec

changeme Build Status

A default credential scanner.

Basic Scan

About

changeme picks up where commercial scanners leave off. It focuses on detecting default and backdoor credentials and not necessarily common credentials. It's default mode is to scan HTTP default credentials, but has support for other credentials.

changeme is designed to be simple to add new credentials without having to write any code or modules. changeme keeps credential data separate from code. All credentials are stored in yaml files so they can be both easily read by humans and processed by changeme. Credential files can be created by using the ./changeme.py --mkcred tool and answering a few questions.

changeme supports the http/https, mssql, mysql, postgres, ssh, ssh w/key, snmp, mongodb and ftp protocols. Use ./changeme.py --dump to output all of the currently available credentials.

You can load your targets using a variety of methods, single ip address/host, subnet, list of hosts, nmap xml file and Shodan query. All methods except for Shodan are loaded as a positional argument and the type is inferred.

Installation

changeme has only been tested on Linux and has known issues on Windows and OS X/macOS. Use docker to run changeme on the unsupported platforms. It supports either a redis-backed queue (most stable) or an in-memory backed queue.

Stable versions of changeme can be found on the releases page.

For mssql support, unixodbc-dev needs to be installed prior to installing the pyodbc.

For postgres support, libpq-dev needs to be installed.

PhantomJS is required in your PATH for HTML report screenshots.

Use pip to install the required python modules: pip install -r requirements.txt

Docker

A convenient way of running changeme is to do so inside a Docker container. You can run a pre-built container from Docker Hub, or build your own using the instructions below.

Run changeme in Docker

Docker runs best in conjunction with Redis as a queue back end. Here's how to get a linked container setup working with Redis.

Get the latest containers: docker pull redis && docker pull ztgrace/changeme

Launch redis in the background: docker run -d --name redis1 redis

Start changeme linking the redis container by name and mounting a local directory into the container's /mnt directory: docker run -it -v /tmp/results:/mnt --link redis1:redis ztgrace/changeme:latest /bin/sh

Run changeme with a --redishost of redis and --output file in our mounted volume: ./changeme.py --redishost redis --output /tmp/mnt/results.csv --protocols ssh --threads 20 -d 192.168.1.0/24

Build from Dockerfile

  1. Build the docker container: docker build -t changeme .
  2. Run changeme from inside the container: `docker run -it changeme /bin/bash'

Usage Examples

Below are some common usage examples.

  • Scan a single host: ./changeme.py 192.168.59.100
  • Scan a subnet for default creds: ./changeme.py 192.168.59.0/24
  • Scan using an nmap file ./changeme.py subnet.xml
  • Scan a subnet for Tomcat default creds and set the timeout to 5 seconds: ./changeme.py -n "Apache Tomcat" --timeout 5 192.168.59.0/24
  • Use Shodan to populate a targets list and check them for default credentials: ./changeme.py --shodan_query "Server: SQ-WEBCAM" --shodan_key keygoeshere -c camera
  • Scan for SSH and known SSH keys: ./changeme.py --protocols ssh,ssh_key 192.168.59.0/24
  • Scan a host for SNMP creds using the protocol syntax: ./changeme.py snmp://192.168.1.20

See Wiki Examples for more detailed examples.

Known Issues

The telnet scanner is broken.

Additionally, anything filed under https://github.com/ztgrace/changeme/issues as a bug.

Bugs and Enhancements

Bugs and enhancements are tracked at https://github.com/ztgrace/changeme/issues.

Request a credential: Please add an issue to Github and apply the credential label.

Vote for a credential: If you would like to help us prioritize which credentials to add, you can add a comment to a credential issue.

Please see the wiki for more details.

Contributors

Thanks for code contributions and suggestions.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].