All Projects → ruped24 → Killchain

ruped24 / Killchain

A unified console to perform the "kill chain" stages of attacks.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Killchain

Git Scanner
A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
Stars: ✭ 157 (-8.72%)
Mutual labels:  pentesting, pentest-tool
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-3.49%)
Mutual labels:  pentesting, pentest-tool
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-32.56%)
Mutual labels:  pentesting, pentest-tool
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-40.12%)
Mutual labels:  pentesting, pentest-tool
Attiny85
RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-1.74%)
Mutual labels:  pentesting, pentest-tool
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+709.3%)
Mutual labels:  pentesting, attack
Ssrf Testing
SSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+898.84%)
Mutual labels:  pentesting, pentest-tool
Ldap search
Python3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-54.65%)
Mutual labels:  pentesting, pentest-tool
Burpsuite Xkeys
A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-16.28%)
Mutual labels:  pentesting, pentest-tool
Trigmap
A wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-23.26%)
Mutual labels:  pentesting, pentest-tool
Winpwn
Automation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+657.56%)
Mutual labels:  pentesting, pentest-tool
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+0%)
Mutual labels:  pentesting, pentest-tool
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-48.26%)
Mutual labels:  pentesting, pentest-tool
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-2.91%)
Mutual labels:  pentesting, pentest-tool
Venom
Venom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+613.95%)
Mutual labels:  pentesting, pentest-tool
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-29.65%)
Mutual labels:  pentesting, pentest-tool
Vulmap
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+527.33%)
Mutual labels:  pentesting, pentest-tool
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+560.47%)
Mutual labels:  pentesting, pentest-tool
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-24.42%)
Mutual labels:  pentesting, pentest-tool
Airmaster
Use ExpiredDomains.net and BlueCoat to find useful domains for red team.
Stars: ✭ 150 (-12.79%)
Mutual labels:  pentesting, pentest-tool

killchain

Maintenance


“Kill Chain” is a unified console with an anonymizer that will perform these stages of attacks:

  • Reconnaissance

  • Weaponization

  • Delivery

  • Exploit

  • Installation

  • Command & Control

  • And Actions


Dependent tool sets are:

  1. Tor -- For the console build-in anonymizer.

  2. Set -- Social-Engineer Toolkit (SET), attacks against humans.

  3. OpenVas -- Vulnerability scanning and vulnerability management.

  4. Veil-Evasion -- Generate metasploit payloads bypass anti-virus.

  5. Websploit -- WebSploit Advanced MITM Framework.

  6. Metasploit -- Executing exploit code against target.

  7. WiFite -- Automated wireless auditor, designed for Linux.


Screenshot

killchain Setup

killchain Add-on

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].