All Projects → NullArray → Mida Multitool

NullArray / Mida Multitool

Licence: gpl-3.0
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.

Programming Languages

shell
77523 projects
bash
514 projects

Projects that are alternatives of or similar to Mida Multitool

A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+165.28%)
Mutual labels:  pentesting, exploit, enumeration, privilege-escalation
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-57.64%)
Mutual labels:  enumeration, pentest, exploitation, privilege-escalation
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+504.17%)
Mutual labels:  pentesting, exploitation, enumeration, privilege-escalation
Suid3num
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (+137.5%)
Mutual labels:  pentesting, pentest, exploitation, privilege-escalation
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+866.67%)
Mutual labels:  pentesting, exploitation, enumeration, privilege-escalation
moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+277.78%)
Mutual labels:  exploit, exploitation, privilege-escalation
K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+2797.92%)
Mutual labels:  exploit, pentest, privilege-escalation
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1253.47%)
Mutual labels:  pentesting, pentest, exploit
Roothelper
A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.
Stars: ✭ 416 (+188.89%)
Mutual labels:  enumeration, privilege-escalation, root
Bash
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-86.81%)
Mutual labels:  exploit, bash-script, exploitation
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+179.86%)
Mutual labels:  pentesting, pentest, exploitation
Wadcoms.github.io
WADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (+199.31%)
Mutual labels:  exploitation, enumeration, privilege-escalation
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+22753.47%)
Mutual labels:  pentest, enumeration, privilege-escalation
Dostoevsky Pentest Notes
Notes for taking the OSCP in 2097. Read in book form on GitBook
Stars: ✭ 495 (+243.75%)
Mutual labels:  pentesting, exploitation, enumeration
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+522.92%)
Mutual labels:  exploit, pentest, exploitation
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-75.69%)
Mutual labels:  exploit, pentesting, pentest
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (+186.81%)
Mutual labels:  pentesting, pentest, privilege-escalation
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-2.78%)
Mutual labels:  exploit, pentest, exploitation
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+15.97%)
Mutual labels:  enumeration, bash-script, exploitation
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+229.17%)
Mutual labels:  pentesting, exploit, pentest

MIDA - Multitool

Bash script purposed for system enumeration, vulnerability identification and privilege escalation.

MIDA Multitool draws functionality from several of my previous scripts namely SysEnum and RootHelper and is in some regards RootHelpers successor, or sister script at the very least.

Besides functionality from these two previous scripts it incorporates some of it's own and as such aims to be a comprehensive assistant for operations and utilities related to system enumeration, vulnerability identification, exploitation and privilege escalation.

Usage

After a system has been succesfully compromised MIDA should be downloaded to the host in question either with git or wget, after it has been unpacked/cloned the shellscript needs to be made executable with chmod +x mida.sh

Upon doing so it can be run on the target host. The options available to the user are below.

The 'Usage' option prints this informational message. The option 'System Enumeration' attempts to retrieve system information such as OS and kernel details, network status, processes, system logs and more. 'Common Utilities' checks for the existence of useful utilities such as telnet, netcat, tcpdump etc. 'External Utilities' opens a menu which lets you download external utilities that may prove to be helpful with further enumeration, vulnerability identification and privilege escalation.

Finally the option 'Cleartext Credentials' searches for text and web application files that contain certain keywords in order to find potential cleartext passwords.

Scripts available for download with MIDA

LinEnum by RebootUser

Firmwalker by Craigz28

BashArk by TheSecondSun

LUNAR by Lateralblast

Linux Priv Checker by SecuritySift

Linux Exploit Suggester by Jondonas

Unix Priv-Esc Check by Pentestmonkey

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].