All Projects → ssstonebraker → Pentest-Service-Enumeration

ssstonebraker / Pentest-Service-Enumeration

Licence: GPL-3.0 license
Suggests programs to run against services found during the enumeration phase of a Pentest

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Pentest-Service-Enumeration

Sudo killer
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1241.25%)
Mutual labels:  pentest, privilege-escalation, oscp
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (+416.25%)
Mutual labels:  pentest, privilege-escalation, oscp
Suid3num
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (+327.5%)
Mutual labels:  pentest, privilege-escalation, oscp
Justtryharder
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+462.5%)
Mutual labels:  pentest, oscp
Awesome Windows Red Team
A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Stars: ✭ 308 (+285%)
Mutual labels:  pentest, privilege-escalation
K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+5116.25%)
Mutual labels:  pentest, privilege-escalation
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (+72.5%)
Mutual labels:  pentest, oscp
Msdat
MSDAT: Microsoft SQL Database Attacking Tool
Stars: ✭ 621 (+676.25%)
Mutual labels:  pentest, privilege-escalation
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (+476.25%)
Mutual labels:  pentest, oscp
Awesome Oscp
A curated list of awesome OSCP resources
Stars: ✭ 804 (+905%)
Mutual labels:  pentest, oscp
Oscprepo
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
Stars: ✭ 1,916 (+2295%)
Mutual labels:  pentest, oscp
Mida Multitool
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (+80%)
Mutual labels:  pentest, privilege-escalation
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-23.75%)
Mutual labels:  pentest, privilege-escalation
shellback
Reverse shell generator
Stars: ✭ 22 (-72.5%)
Mutual labels:  oscp, oscp-tools
doubletap
A very loud but fast recon scan and pentest template creator for use in CTF's/OSCP/Hackthebox...
Stars: ✭ 23 (-71.25%)
Mutual labels:  pentest, oscp
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+41036.25%)
Mutual labels:  pentest, privilege-escalation
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+385%)
Mutual labels:  pentest, privilege-escalation
oscp
My notebook for OSCP Lab
Stars: ✭ 22 (-72.5%)
Mutual labels:  pentest, oscp
Odat
ODAT: Oracle Database Attacking Tool
Stars: ✭ 906 (+1032.5%)
Mutual labels:  pentest, privilege-escalation
Oscp Cheat Sheet
This is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (+170%)
Mutual labels:  pentest, oscp

Pentest-Service-Enumeration

Purpose

Suggests binaries to run against services found during the enumeration phase of a Pentest

Background

While studying for the Offensive Security Certified Profesional (OSCP) certification I found it hard to keep track of which commands to run during the enumeration phase for specific services.

The purpose of this tool is easily keep track of those commands.

Install Instructions

git clone https://github.com/ssstonebraker/Pentest-Service-Enumeration
cd Pentest-Service-Enumeration
./install.sh

How to use

Pentest Service Enumeration: 0.0.2
----------------------------------------------------------------------------------------------------
LISTING EXISTING COMMANDS:
Usage: pse <service-name> (Ex: ftp, rdp, http)
 -v: verbose - print command description
Examples
[*] pse ftp
[*] pse -v ftp (for verbose)
----------------------------------------------------------------------------------------------------
STORING A NEW COMMAND WITH ARGUMENTS
Usage: pse -a <service-name> '<command> <arg1> <argX>'
note: You must use single quotes around your command
Examples
[*] pse -a rpc 'rpcinfo $IP'
[*] pse -a smb 'smbexec.py $HOST/$USERNAME:$PASSWORD@$IP'
----------------------------------------------------------------------------------------------------

Screenshots

Basic Usage

To view basic usage just type:

pse

image

List all available Services

pse -l 
[*] listing all services that have pse stored commands
ftp
http
linpriv
mimikatz
rpc
smb
smtp
snmp
ssh
webdav

Listing commands for a service

pse <service-name>

Example:
pse smb

Default view

The default view does not include descriptions for commands

image

Verbose view

The verbose view includes descriptions for commands

pse -v <service-name>

Example:
pse -v smb

image

Adding commands for a service

In this example I am adding the dirb command for the https service

Before

I'm listing out what already exists for the http service

image

Add the command

Add command dirb for service http

pse -a http 'dirb http://$IP -r -o $OUTPUTFILE'

After

A view of the commands for the http service after I've added the dirb http command:

image

Variable Expansion

Currently only $IP and $PORT will be expanded (if set)

Example:
IP=10.11.1.10 pse http

image

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].