All Projects → rek7 → Mxtract

rek7 / Mxtract

Licence: mit
mXtract - Memory Extractor & Analyzer

Programming Languages

cpp
1120 projects
cpp11
221 projects

Projects that are alternatives of or similar to Mxtract

Fireelf
fireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (-12.83%)
Mutual labels:  security-tools, pentesting, malware, redteam, exploitation
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+45.29%)
Mutual labels:  security-tools, pentesting, malware, redteam
Impost3r
👻Impost3r -- A linux password thief
Stars: ✭ 355 (-28.86%)
Mutual labels:  security-tools, pentesting, redteam
Winpwn
Automation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+161.12%)
Mutual labels:  pentesting, redteam, exploitation
Stowaway
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+0.2%)
Mutual labels:  security-tools, pentesting, redteam
Passcat
Passwords Recovery Tool
Stars: ✭ 164 (-67.13%)
Mutual labels:  pentesting, redteam, credentials
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-23.45%)
Mutual labels:  security-tools, pentesting, redteam
Leakscraper
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Stars: ✭ 227 (-54.51%)
Mutual labels:  pentesting, redteam, credentials
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+1699.8%)
Mutual labels:  pentesting, malware, redteam
Pentesting Cookbook
A set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-83.57%)
Mutual labels:  security-tools, pentesting, redteam
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (+45.89%)
Mutual labels:  security-tools, pentesting, exploitation
Nimscan
🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-73.15%)
Mutual labels:  security-tools, pentesting, redteam
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+268.14%)
Mutual labels:  security-tools, pentesting, redteam
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-60.12%)
Mutual labels:  security-tools, pentesting, exploitation
Rustscan
🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+945.69%)
Mutual labels:  security-tools, pentesting
Aiodnsbrute
Python 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-25.85%)
Mutual labels:  security-tools, pentesting
Sqlmap
Automatic SQL injection and database takeover tool
Stars: ✭ 21,907 (+4290.18%)
Mutual labels:  pentesting, exploitation
Gadgetprobe
Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
Stars: ✭ 381 (-23.65%)
Mutual labels:  security-tools, pentesting
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-19.24%)
Mutual labels:  pentesting, exploitation
Otseca
Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (-16.63%)
Mutual labels:  security-tools, pentesting

mXtract

Build Status License

mXtract is an opensource linux based tool that analyzes and dumps memory. It is developed as an offensive pentration testing tool, its primary purpose is to scan memory for private keys, ips, and passwords using regexes. Remember, your results are only as good as your regexes.

Screenshots

Screenshot

Scan with verbose and with a simple IP regex, scanning every data segment, displaying process info and scanning environment files. Screenshot

Scan with verbose and with a simple IP regex, scanning only heap and stack, displaying process info and scanning environment files. Screenshot

Scan without verbose, and with a simple IP regex, displaying process info and scanning environment files.

Why dump directly from memory?

In most linux environments users can access the memory of processes, this allows attackers to harvest credentials, private keys, or anything that isnt suppose to be seen but is being processed by a program in clear text.

Features

  • Ability to enter regex lists
  • Clear and Readable Display
  • Check if Memory Range is Writable with Current Permissions
  • Output in XML and HTML along with the default output (process name:result)
  • Ability to Mass Scan Every Proccess or a Specific PID
  • Able to choose memory sections to scan
  • Ability to Show Detailed Process Information
  • Ability to Scan Process Environment Files
  • Memory dumps automatically removes unicode characters which allows for processing with other tools or manually

Getting started

  1. Downloading: git clone https://github.com/rek7/mXtract
  2. Compiling: cd mXtract && sh compile.sh

This will create the directory bin/ and compile the binary as mxtract.

Commands

$ ./mxtract -h
           __  ___                  _     { V1.2 }
  _ __ ___ \ \/ / |_ _ __ __ _  ___| |_ 
 | '_ ` _ \ \  /| __| '__/ _` |/ __| __|
 | | | | | |/  \| |_| | | (_| | (__| |_ 
 |_| |_| |_/_/\_\\__|_|  \__,_|\___|\__|  https://github.com/rek7/mXtract
Usage: ./mxtract [args]
General:
        -v      Enable Verbose Output
        -s      Suppress Banner
        -h      Help
        -c      Suppress Colored Output
Target and Regex:
        -i      Show Detailed Process/User Info
        -a      Scan all Memory Ranges not just Heap/Stack
        -e      Scan Process Environment Files
        -w      Check if Memory Range is Writable
        -r=     Regex Database to Use
        -p=     Specify Single PID to Scan
Output:
        -x      Format Regex Results to XML
        -r      Format Regex Results to an HTML Document
        -wm     Write Raw Memory to File Default Directory is: 'pid/'
        -wi     Write Process Info to Beginning of File (Used in Conjunction with -wm)
        -wr     Write Regex Output to File (Will Appear in the Output Directory)
        -f=     Regex Results Filename Default is: 'regex_results.txt'
        -d=     Custom Ouput Directory
Either -r= or -wm needed

Example usage

$ ./mxtract -wm -wr -e -i -d=/tmp/output/ -r=example_regexes.db

Featured On:

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].