All Projects → InfosecMatter → Minimalistic Offensive Security Tools

InfosecMatter / Minimalistic Offensive Security Tools

Licence: gpl-3.0
A repository of tools for pentesting of restricted and isolated environments.

Programming Languages

powershell
5483 projects

Projects that are alternatives of or similar to Minimalistic Offensive Security Tools

Faraday
Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+2268.89%)
Mutual labels:  penetration-testing, security-audit, security-automation
default-http-login-hunter
Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+111.11%)
Mutual labels:  security-audit, penetration-testing, security-automation
Dsinternals
Directory Services Internals (DSInternals) PowerShell Module and Framework
Stars: ✭ 776 (+474.81%)
Mutual labels:  penetration-testing, security-audit, active-directory
Tactical Exploitation
Modern tactical exploitation toolkit.
Stars: ✭ 585 (+333.33%)
Mutual labels:  penetration-testing, brute-force, active-directory
Pythem
pentest framework
Stars: ✭ 1,060 (+685.19%)
Mutual labels:  security-audit, brute-force
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+544.44%)
Mutual labels:  penetration-testing, active-directory
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1328.15%)
Mutual labels:  penetration-testing, security-audit
Purify
All-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-46.67%)
Mutual labels:  security-audit, security-automation
Habu
Hacking Toolkit
Stars: ✭ 635 (+370.37%)
Mutual labels:  penetration-testing, security-audit
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+6451.11%)
Mutual labels:  security-audit, security-automation
Mssqli Duet
SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing
Stars: ✭ 82 (-39.26%)
Mutual labels:  penetration-testing, active-directory
Yams
A collection of Ansible roles for automating infosec builds.
Stars: ✭ 98 (-27.41%)
Mutual labels:  penetration-testing, security-automation
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+468.15%)
Mutual labels:  penetration-testing, security-audit
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-54.07%)
Mutual labels:  penetration-testing, security-audit
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+5267.41%)
Mutual labels:  penetration-testing, brute-force
Saydog Framework
Saydog Framework
Stars: ✭ 71 (-47.41%)
Mutual labels:  brute-force, port-scanner
Vsaudit
VOIP Security Audit Framework
Stars: ✭ 97 (-28.15%)
Mutual labels:  penetration-testing, security-audit
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+931.11%)
Mutual labels:  penetration-testing, active-directory
Horn3t
Powerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-11.11%)
Mutual labels:  penetration-testing, security-audit
Monkey
Infection Monkey - An automated pentest tool
Stars: ✭ 5,572 (+4027.41%)
Mutual labels:  penetration-testing, security-automation

Minimalistic TCP and UDP port scanners
(port-scan-tcp.ps1 | port-scan-udp.ps1)

A simple yet powerful TCP and UDP port scanners:

  • Detection of open, closed and filtered ports (both TCP and UDP)
  • Ability to scan a single host, network range or a list of hosts in a file
  • Adjustable timeout values for effective and reliable port scanning

Despite the minimalistic design, both port scanners keep track of everything by using a simple state file (scanresults.txt) which is created in the current working directory. This allows the scanners to be easily resumed if they were interrupted or to skip already scanned hosts / ports.

See the main article for detailed description: https://www.infosecmatter.com/port-scanner-in-powershell-tcp-udp-ps1/

Usage and examples

Import-Module .\port-scan-tcp.ps1
Import-Module .\port-scan-udp.ps1

# Usage:
port-scan-tcp <host(s)> <port(s)>
port-scan-udp <host(s)> <port(s)>

Port check of a single host for port tcp/80 (HTTP)

port-scan-tcp 192.168.205.15 80

Scanning a single host for common TCP ports

port-scan-tcp 10.10.0.1 (21,22,23,25,80,443,445,3389)

Scanning a list of hosts in a file for port tcp/22 (SSH)

port-scan-tcp (gc .\computers.txt) 22

Scanning a network range /24 for port tcp/445 (SMB)

0..255 | foreach { port-scan-tcp 192.168.204.$_ 445 }

Scanning a single host for common UDP services

test-port-udp 192.168.205.15 (53,161,623)

Scanning a network range /24 for port udp/161 (SNMP)

0..255 | foreach { test-port-udp 10.10.0.$_ 161 }

Note: The port-scan-tcp-compat.ps1 version is for older systems without having .NET 4.5 installed.

Screenshot

Scanning a network range for selected TCP ports

0..255 | foreach { port-scan-tcp 192.168.204.$_ (22,80,445) }

portscan-network-range-multiple-ports2

For more information, visit https://www.infosecmatter.com/port-scanner-in-powershell-tcp-udp-ps1/


Minimalistic Windows local account login bruteforcer (localbrute.ps1)

A simple local account login bruteforce tool for privilege escalation on Windows.

It takes a username and a wordlist (password list) as parameters and it tries to authenticate as the specified user account locally on the system.

The tool keeps track of the progress in a state file in the current working directory. This allows the tool to be resumed if it was interrupted or skip already compromised accounts.

See the main article for detailed description: https://www.infosecmatter.com/windows-local-admin-brute-force-attack-tool-localbrute-ps1/

Usage and examples

Import-Module .\localbrute.ps1

# Usage:
localbrute <username> <path-to-wordlist> [debug]

# Example:
localbrute Administrator .\rockyou.txt

Note: The extra mini version does not keep any state file, otherwise the functionality is the same.

Screenshot

Brute force login attack on local Administrator account:

local-account-login-bruteforce-with-loginbrute-github

For more information, visit https://www.infosecmatter.com/windows-local-admin-brute-force-attack-tool-localbrute-ps1/


Minimalistic SMB login bruteforcer (smblogin.ps1)

A simple SMB login attack and password spraying tool.

It takes a list of targets and credentials (username and password) as parameters and it tries to authenticate against each target using the provided credentials.

Despite its minimalistic design, the tool keeps track of everything by writing every result into a text file. This allows the tool to be easily resumed if it was interrupted or skip already compromised targets.

See the main article for detailed description: https://www.infosecmatter.com/smb-brute-force-attack-tool-in-powershell-smblogin-ps1/

Usage and examples

Import-Module .\smblogin.ps1

# Usage:
smblogin <hosts.txt> <username> <password>

# Examples:
smblogin hosts.txt .\Administrator [email protected]
smblogin hosts.txt CORP\bkpadmin [email protected]

Note: The extra mini version lacks check for port tcp/445, otherwise the functionality is the same.

Screenshot

SMB password spraying over the network:

smblogin-1-smb-login-attack-running

For more information, visit https://www.infosecmatter.com/smb-brute-force-attack-tool-in-powershell-smblogin-ps1/


Minimalistic AD login bruteforcer (adlogin.ps1)

A simple Active Directory login attack tool.

It takes list of usernames and a password and tries to login with it against specified AD domain using LDAP (directoryservices).

It also retains results in a file in the current working directory, so it can be interrupted and resumed (it will not try to login again if the given user has already been compromised or tried with the given password).

See the main article for detailed description: https://www.infosecmatter.com/active-directory-brute-force-attack-tool-in-powershell-adlogin-ps1/

Usage and examples

Import-Module .\adlogin.ps1

# Usage:
adlogin <userlist.txt> <domain> <password>

# Example:
adlogin users.txt domain.com [email protected]

# Check results (find valid credentials):
gc adlogin.*.txt | sls True

Screenshot

Password login attack against domain users:

adlogin-attack-01-started

For more information, visit https://www.infosecmatter.com/active-directory-brute-force-attack-tool-in-powershell-adlogin-ps1/

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].