All Projects → C0reL0ader → East

C0reL0ader / East

Exploits and Security Tools Framework 2.0.1

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to East

Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+544.52%)
Mutual labels:  penetration-testing, offensive-security
wifi-penetration-testing-cheat-sheet
Work in progress...
Stars: ✭ 149 (-47.35%)
Mutual labels:  penetration-testing, offensive-security
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-35.69%)
Mutual labels:  penetration-testing, offensive-security
Black Widow
GUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (-56.18%)
Mutual labels:  penetration-testing, offensive-security
OSCP-A-Step-Forward
Opening the door, one reverse shell at a time
Stars: ✭ 126 (-55.48%)
Mutual labels:  penetration-testing, offensive-security
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-53.71%)
Mutual labels:  penetration-testing, offensive-security
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-50.53%)
Mutual labels:  penetration-testing, exploits
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-69.96%)
Mutual labels:  penetration-testing, offensive-security
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-69.61%)
Mutual labels:  penetration-testing, exploits
DNSExplorer
Bash script that automates the enumeration of domains and DNS servers in the active information gathering.
Stars: ✭ 33 (-88.34%)
Mutual labels:  penetration-testing, offensive-security
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-62.19%)
Mutual labels:  penetration-testing, offensive-security
oscp-omnibus
A collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-83.75%)
Mutual labels:  penetration-testing, offensive-security
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+3592.93%)
Mutual labels:  penetration-testing, exploits
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+581.27%)
Mutual labels:  penetration-testing, offensive-security
Pentest Notes
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-68.55%)
Mutual labels:  penetration-testing, offensive-security
Knary
A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (-33.92%)
Mutual labels:  penetration-testing, offensive-security
Penetration Testing Cheat Sheet
Work in progress...
Stars: ✭ 69 (-75.62%)
Mutual labels:  penetration-testing, offensive-security
Houndsploit
An advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-71.38%)
Mutual labels:  penetration-testing, exploits
mec-ng
pentest toolbox
Stars: ✭ 28 (-90.11%)
Mutual labels:  penetration-testing, exploits
PXXTF
Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-91.87%)
Mutual labels:  penetration-testing, exploits

EaST Framework

«EAST» – «Exploits And Security Tools» penetration testing framework.

1. Overview

Pentest framework environment is the basis of IT security specialist’s toolkit. This software is essential as for learning and improving of knowledge in IT systems attacks and for inspections and proactive protection. The need of native comprehensive open source pen test framework with high level of trust existed for a long time. That is why EAST framework was created for native and native friendly IT security markets. EAST is a framework that has all necessary resources for wide range exploits to run, starting from Web to buffer overruns. EAST differs from similar toolkits by its ease of use. Even a beginner can handle it and start to advance in IT security.

Main features:

  • Framework security. Software used for IT security must have a high level of user trust. Easy to check open source Python code realized in EAST. It is used for all parts of the framework and modules. Relative little amount of code eases its verification by any user. No OS changes applied during software installation.
  • Framework maximum simplicity. Archive downloads, main python script start.py launches, which allows exploits start-stop and message traffic. All handled local or remotely via browser.
  • Exploits simplicity of creation and editing. Possibility to edit and add modules and exploits on the fly without restart. Module code body is easy and minimal in terms of amount.
  • Cross-platform + minimal requirements and dependencies. Tests for Windows and Linux. Should function everywhere where Python is installed. Framework contains all dependencies and does not download additional libraries.
  • Full capacity of vanilla pen test framework. In spite of simplicity and “unoverload” the framework has all necessary resources for wide range exploits to run, starting from Web to buffer overruns.
  • Wide enhancement possibilities. Third party developers can create their own open source solutions or participate in EAST development by use of Server-client architecture, message traffic API and support libraries.

2. Requirements

3. Usage

git clone https://github.com/C0reL0ader/EaST && cd EaST
python start.py [-p PORT] [--all-interfaces]

4. Additional resources

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].