All Projects → audibleblink → Doxycannon

audibleblink / Doxycannon

Licence: gpl-3.0
A poorman's proxycannon and botnet, using docker, ovpn files, and a dante socks5 proxy

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Doxycannon

Hackers Tool Kit
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (-2.31%)
Mutual labels:  proxy, pentest
Kratosknife
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Stars: ✭ 97 (-55.09%)
Mutual labels:  pentest, botnet
Girsh
Automatically spawn a reverse shell fully interactive for Linux or Windows victim
Stars: ✭ 66 (-69.44%)
Mutual labels:  pentest, redteam
Snoop
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+310.19%)
Mutual labels:  pentest, redteam
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+542.13%)
Mutual labels:  pentest, redteam
Pythem
pentest framework
Stars: ✭ 1,060 (+390.74%)
Mutual labels:  proxy, pentest
Venom
Venom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+468.52%)
Mutual labels:  proxy, redteam
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+235.65%)
Mutual labels:  pentest, redteam
Bettercap
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+4869.91%)
Mutual labels:  proxy, redteam
Arsenal
Extensible Red Team Framework
Stars: ✭ 99 (-54.17%)
Mutual labels:  redteam, botnet
Cloak
A censorship circumvention tool to evade detection against state adversaries
Stars: ✭ 942 (+336.11%)
Mutual labels:  proxy, openvpn
Passcat
Passwords Recovery Tool
Stars: ✭ 164 (-24.07%)
Mutual labels:  pentest, redteam
1earn
个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (+259.26%)
Mutual labels:  pentest, redteam
Macro pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
Stars: ✭ 1,072 (+396.3%)
Mutual labels:  pentest, redteam
Chashell
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+243.52%)
Mutual labels:  pentest, redteam
Nac bypass
Script collection to bypass Network Access Control (NAC, 802.1x)
Stars: ✭ 79 (-63.43%)
Mutual labels:  pentest, redteam
Hershell
Hershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (+104.63%)
Mutual labels:  pentest, redteam
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+15135.65%)
Mutual labels:  pentest, redteam
Wsmanager
Webshell Manager
Stars: ✭ 99 (-54.17%)
Mutual labels:  pentest, redteam
Vpngate With Proxy
vpn gate client for linux, be able to connect to open vpn server through proxy
Stars: ✭ 150 (-30.56%)
Mutual labels:  proxy, openvpn

doxycannon

CodeFactor

Doxycannon takes a pool of OpenVPN files and creates a Docker container for each one. After a successful VPN connection, each container spawns a SOCKS5 proxy server and binds it to a port on the Docker host. Combined with tools like Burp suite or proxychains, this creates your very own private botnet on the cheap.

Password Spraying Blog Post Using DoxyCannon

Prerequisites

  • A VPN subscription to a provider that distributes *.ovpn files
  • Install the required pip modules:
    pip install -r requirements.txt
    
  • Ensure docker is installed and enabled. Refer to the Wiki for installation instructions on Kali/Debian
  • proxychains4 is required for interactive mode

Setup

  • Create an auth.txt file with your ovpn credentials in VPN. The format is:
    username
    password
    
  • Fill the VPN folder with *.ovpn files and ensure that the auth-user-pass directive in your ./VPN/*.ovpn files says auth-user-pass auth.txt
    • Check out this wiki section for installation instructions for individual VPN providers
  • Run ./doxycannon.py --build to build your image with your OVPN files
    • --build will need to be run on code changes or when you modify the VPN folder's contents

Usage

note: the way proxychains seeds its PRNG to choose a random proxy is not fast enough to ensure each subsequent request goes out through a different IP. You may get between 1-10 requests being made from the same IP. If this is unacceptable, I merged a patch to the original proxychains repo. Download and build from master to get the fix. https://github.com/haad/proxychains

One-off, random commands

While your containers are up, you can use proxychains to issue commands through random proxies

proxychains4 -q curl -s ipconfig.io/json
proxychains4 -q hydra -L users.txt -p Winter2018 manager.example.com -t 8 ssh
proxychains4 -q gobuster -w word.list -h http://manager.example.com

GUI Tools

Use the --single flag to bring up your proxies and create a proxy rotator.

hgfs/shared/doxycannon  master 
❯❯ ./doxycannon.py --single
[+] Writing HAProxy configuration
[*] Image doxyproxy built.
[*] Staring single-port mode...
[*] Proxy rotator listening on port 1337. Ctrl-c to quit
^C
[*] doxyproxy was issued a stop command
[*] Your proxies are still running.

To see what's happening, checkout out the haproxy folder. Essentially, one is building a layer 4 load-balancer between all the VPNs. This will allow you rotate through your proxies from a single port which means you can point your browsers or BURPSuite instances at it and have every request use a different VPN.

Specific SOCKS proxies

If you want to use a specific proxy, give your utility the proper SOCKS port.

Example: To make a request through Japan, use docker ps and find the local port to which the Japanese proxy is bound.

Configure your tool to use that port:

curl --socks5 localhost:50xx ipconfig.io/json

Interactive

Once you've built your image and started your containers, run the utility with the --interactive flag to get a bash session where all network traffic is redirected through proxychains4

./doxycannon.py --interactive

Demo

asciicast

Credit

pry0cc for the idea

This was originally a fork of pry0cc's ProxyDock. It's been modified to an extent where less than 1% of the original code remains.

TODO

  • [ ] Allow for management of remote doxycannon installs through the Docker API
  • [ ] Connect to VPN endpoints through TOR when --up --tor is passed
  • [X] Interactive mode
  • [X] Python management script
  • [X] Faster Up/Down Container management
  • [X] Dispatch server - (will allow GUI applications to use doxycannon)
  • [X] Creates a single local proxy server that dispatches through VPNs
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].