All Projects → TH3xACE → Offport_killer

TH3xACE / Offport_killer

This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan or services running locally. The tool is useful when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running behind the identified ports.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Offport killer

ggtfobins
Get GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-32.5%)
Mutual labels:  enumeration, ctf
Bscan
an asynchronous target enumeration tool
Stars: ✭ 207 (+417.5%)
Mutual labels:  ctf, enumeration
Pspy
Monitor linux processes without root permissions
Stars: ✭ 2,470 (+6075%)
Mutual labels:  ctf, enumeration
Enum.py
A tool to enumerate network services
Stars: ✭ 23 (-42.5%)
Mutual labels:  enumeration, ctf
Scanless
online port scan scraper
Stars: ✭ 875 (+2087.5%)
Mutual labels:  port-scanner
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+22690%)
Mutual labels:  ctf
Code Audit Challenges
Code-Audit-Challenges
Stars: ✭ 779 (+1847.5%)
Mutual labels:  ctf
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+1837.5%)
Mutual labels:  enumeration
Ksubdomain
无状态子域名爆破工具
Stars: ✭ 976 (+2340%)
Mutual labels:  enumeration
Docker War
Docker based Wargame Platform - To practice your CTF skills
Stars: ✭ 30 (-25%)
Mutual labels:  ctf
Defcon 2018
DEFCON 2018 Qualification writeups
Stars: ✭ 12 (-70%)
Mutual labels:  ctf
Riceteacatpanda
repo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-55%)
Mutual labels:  ctf
Snoop
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+2115%)
Mutual labels:  ctf
Shellen
🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+1897.5%)
Mutual labels:  ctf
Ctf Learn Writeup
Writeup of security — CTFLearn Challenges.
Stars: ✭ 31 (-22.5%)
Mutual labels:  ctf
Fbctf
Platform to host Capture the Flag competitions
Stars: ✭ 6,407 (+15917.5%)
Mutual labels:  ctf
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+2047.5%)
Mutual labels:  enumeration
Pxenum
A shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-25%)
Mutual labels:  enumeration
Turnscan.js
Scanning LAN hosts from Chrome using ICE servers
Stars: ✭ 27 (-32.5%)
Mutual labels:  port-scanner
Ctf writeups
Stars: ✭ 24 (-40%)
Mutual labels:  ctf

.. raw:: html

.. raw:: html


KILLER PROJECT

.. image:: https://img.shields.io/github/last-commit/TH3xACE/OFFPORT_KILLER?style=plastic :target: https://github.com/TH3xACE/SUDO_KILLER :alt: Last Commit

.. raw:: html

#Manual Port Scanning #Enumerate Potential Service

If you like the tool and for my personal motivation so as to develop other tools please a +1 star *

.. contents:: :local: :depth: 1

============= INTRO

This tool aims at automating the identification of potential service running behind ports identified manually or on services running locally only.

The tool is useful:

  1. when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running behind the identified ports and

2.also if you have been able to identify services running locally via (netstat, running processes SNMP or else).

Several databases are used such as the one from NMAP, IANA and linux machines.

The tool can be used by pentesters, system admins, CTF players, students, System Auditors and trolls :).

============= Usage

Example

.. code-block:: console

./OFFPORT_KILLER.sh -i inputfile.txt -r report.txt -e /tmp/

Arguments

  • -i : input file (format IP:PORT)
  • -r : report name (save the output)
  • -h : help

Steps

  • Step 1: Peform a manual port scanning (using nc, tcpdump or whatever) or identify services running locally
  • Step 2: Create a file with format IP:PORT (where IP is the target IP address and PORT is a port identified).
  • Step 3: Run the tool with the file created using the argument -i

Note: Create an entry for each port, several IP can be input in the file.

inputfile.txt

.. code-block:: console

192.168.1.12:1830
192.168.1.12:7738
192.168.1.14:22
192.168.1.14:7738
192.168.1.15:3465

============= Output

.. image:: ./screen-output.png :alt: Project

Read output

To read output while keeping the aspect (color), especially when cat is not adequate and the output is too long.

.. code-block:: console

  • less -R report.txt

============= Disclaimer

This script is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (TH3xACE) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of the script is not my responsibility.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].