All Projects → RedTeamOperations → Pivotsuite

RedTeamOperations / Pivotsuite

Licence: other
Network Pivoting Toolkit

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Pivotsuite

Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-49.54%)
Mutual labels:  pentest-tool, redteam, post-exploitation
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (-18.54%)
Mutual labels:  hacking, pentest-tool, redteam
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+105.78%)
Mutual labels:  hacking, pentest-tool, redteam
ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+27.05%)
Mutual labels:  post-exploitation, pentest-tool, redteam
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+261.09%)
Mutual labels:  hacking, redteam, post-exploitation
Airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+1064.13%)
Mutual labels:  hacking, enterprise
Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-88.75%)
Mutual labels:  post-exploitation, pentest-tool
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-18.24%)
Mutual labels:  hacking, pentest-tool
redpill
Assist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (-56.84%)
Mutual labels:  post-exploitation, redteam
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-23.4%)
Mutual labels:  hacking, redteam
pentesting-dockerfiles
Pentesting/Bugbounty Dockerfiles.
Stars: ✭ 148 (-55.02%)
Mutual labels:  pentest-tool, redteam
Osint tips
OSINT
Stars: ✭ 322 (-2.13%)
Mutual labels:  hacking, redteam
volana
🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-88.45%)
Mutual labels:  pentest-tool, redteam
1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+1029.18%)
Mutual labels:  pentest-tool, redteam
transportc2
PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-93.31%)
Mutual labels:  pentest-tool, redteam
Behold3r
👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (-91.19%)
Mutual labels:  pentest-tool, redteam
Overlord
Overlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-21.58%)
Mutual labels:  pentest-tool, redteam
Hackbrowserdata
Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
Stars: ✭ 3,864 (+1074.47%)
Mutual labels:  hacking, pentest-tool
Windows Post Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-10.03%)
Mutual labels:  hacking, post-exploitation
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-41.34%)
Mutual labels:  hacking, post-exploitation

DISCLAIMER: This software is for educational purposes only. This software should not be used for illegal activity. The author is not responsible for its use.

PivotSuite

PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit

Description

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client.

PivotSuite as a Server :

If the compromised host is directly accessable (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on compromised machine and access the different subnet hosts from our pentest machine, Which was only accessable from compromised machine.

PivotSuite as a Client :

If the compromised host is behind a Firewall / NAT and isn't directly accessable from our pentest machine, Then we can run pivotsuite as a server on pentest machine and pivotsuite as a client on compromised machine for creating a reverse tunnel (Reverse Connection). Using this we can reach different subnet hosts from our pentest machine, which was only accessable from compromised machine.

Key Features:

  1. Supported Forward & Reverse TCP Tunneling
  2. Supported Forward & Reverse socks5 Proxy Server
  3. UDP over TCP and TCP over TCP Protocol Supported
  4. Corporate Proxy Authentication (NTLM) Supported
  5. Inbuilt Network Enumeration Functionality, Eg. Host Discovery, Port Scanning, OS Command Execution
  6. PivotSuite allows to get access to different Compromised host and their network, simultaneously (Act as C&C Server)
  7. Single Pivoting, Double Pivoting and Multi-level pivoting can perform with help of PivotSuite.
  8. PivotSuite also works as SSH Dynamic Port Forwarding but in the Reverse Direction.

Advantage Over Other tools:

  1. Doesn't required admin/root access on Compromised host
  2. PivotSuite also works when Compromised host is behind a Firewall / NAT, When Only Reverse Connection is allowed.
  3. No dependency other than python standard libraries.
  4. No Installation Required
  5. UDP Port is accessable over TCP

Installation

  1. You can download the latest version of pivotsuite by cloning the Git repository or PyPI Package.

    git clone https://github.com/RedTeamOperations/PivotSuite.git
         
               OR
               
     pip install PivotSuite
    

    PivotSuite works out of the box with Python version 2.7.x and 3.6.x on any platform.

  2. PivotSuite Standalone Executable Download from Github Release Section

    https://github.com/RedTeamOperations/PivotSuite/releases
    

    No installation require, No python interpreter require


Requirements:

a. Only Python Standard Libraries are Required
b. Compatible for both Python 2.7.x & Python 3.6.x
c. Tested on Windows and Linux. 

Usages :

$ pivotsuite.py [options] SERVER-IP SERVER-PORT

Options:

 --version             show program's version number and exit

-h, --help            show this help message and exit

-S, --server          Run PivotSuite as a Server

-C, --client          Run PivotSuite as a Client

 - -server-ip=SERVER_IP

                    Server Listen/Connect IP address, Default  0.0.0.0
                    
 --server-port=SERVER_PORT

                    Server Listen/Connect Port, Default 7777

PivotSuite Server Options:

-F, --forward-connection

                    Forward Network Traffic
                    
--server-option=SP/PF

                    Use Server as Socks_Proxy(SP)/Port_Forward(PF),
                    Default SP
                    
--network-protocol=T/U

                    Select Protocol For Port Forwarding TCP(T)/ UDP(U),
                    Default T
                    
--forward-ip=Remote-Host-IP

                    Remote Host IP for Port Forwarding
                    
--forward-port=Remote-Host-Port

                    Remote Host Port for Port Forwarding
                    
-W, --reverse-connection

                    Reverse Network Traffic

PivotSuite Client Options:

-O SP/PF/NE, --option=SP/PF/NE
                    Use Client as Socks_Proxy(SP)/ Port_Forwarding(PF)/
                    Network_Enumeration(NE), Default SP
                    
-L, --local-forward

                    Use Local Port Forwarding
                    
-R, --remote-forward

                    Use Remote Port Forwarding
                    
-P T/U, --protocol=T/U

                    Select Protocol For Port Forwarding TCP(T)/ UDP(U),
                    Default T
                    
--local-ip=LOCAL_IP

                    Local IP For Port Forwarding
                    
--local-port=LOCAL_PORT

                    Local Port For Port Forwarding
                    
--remote-ip=REMOTE_IP

                    Remote IP For Port Forwarding
                    
--remote-port=REMOTE_PORT

                    Remote Port For Port Forwarding

NTLM Proxy Authentication Options:

--ntlm-proxy-ip=NTLM_PROXY_IP

                    IP address of NTLM proxy
                    
--ntlm-proxy-port=NTLM_PROXY_PORT

                    Port of NTLM proxy
                    
--username=USERNAME

                    Username to authenticate with NTLM proxy
                    
--domain=DOMAIN     Domain to authenticate with NTLM proxy

--password=PASSWORD

                    Password to authenticate with NTLM proxy
                    
--hashes=HASHES     Hashes to authenticate with instead of password.
                    Format - LMHASH:NTHASH

Documentation

Case 1 : (Forward TCP Tunneling)

IF the Compromised host is directly accessible from our pentest machine.

Then run PivotSuite as a server on the compromised machine as per our requirements:

    a. Dynamic Port Forwarding (Socks5 Proxy Server) On Compromised machine:

         $  python pivotsuite.py -S -F --server-option SP --server-ip IP --server-port PORT


    b. Single Port Forwarding (TCP/UDP Relay) On Compromised machine :

        $ python pivotsuite.py -S -F --server-option PF --network-protocol T/U --remote-ip IP --remote-port PORT 
          --server-ip IP (local-ip) --server-port PORT (local-port)
Case 2 : (Reverse TCP Tunneling)

IF the Compromised host is behind a Firewall / NAT and directly not accessible from our pentest machine.

Then run PivotSuite as a Server on pentest machine and PivotSuite as a Client on compromised machine.


  i. Run PivotSuite as a Sever On Pentest Machine :

      $ python pivotsute.py -S -W 


  ii. Run PivotSuite as a Client on Compromise Machine as per our requirements:

      a. Dynamic Port Forwarding (Socks5 Proxy Server) On Pentest Machine:

          $ python pivotsuite.py -C -O SP --server-ip IP --server-port PORT

      b. Local / Remote Port Forwarding On Pentest Machine:

           $ python pivotsuite.py -C -O PF  - L / -R (local or remote port forwarding) -P T/U  --local-ip IP 
              --local-port PORT --remote-ip IP --remote-port PORT  --server-ip IP --server-port PORT

      c. Network Enumeration of Compromised Machine:

            $ python pivotsuite.py -C -O NE --server-ip IP --server-port PORT

IF Corportate Proxy Authentication (NTLM) required for reverse connection on Compromised Host :

  $ python pivotsuite.py -C -O SP --ntlm-proxy-ip IP --ntlm-proxy-port PORT --username USERNAME --password PASSWORD 
    --server-ip IP --server-port PORT

Contact Information :

I would greatly appreciate it if you kindly give me some feedback or suggestion on PivotSuite Toolkit.

Email: [email protected]

LinkedIn: https://www.linkedin.com/in/cehmanish/

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].