All Projects → itsKindred → Procspy

itsKindred / Procspy

Python tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Procspy

Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-57.35%)
Mutual labels:  hacking, reconnaissance, enumeration
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-7.35%)
Mutual labels:  hacking, reconnaissance, enumeration
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-40.07%)
Mutual labels:  hacking, reconnaissance, enumeration
Intelspy
Perform automated network reconnaissance scans
Stars: ✭ 134 (-50.74%)
Mutual labels:  hacking, reconnaissance, enumeration
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+750%)
Mutual labels:  hacking, reconnaissance, enumeration
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+570.59%)
Mutual labels:  hacking, enumeration
Oscp Automation
A collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-56.62%)
Mutual labels:  hacking, enumeration
Jalesc
Just Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-44.12%)
Mutual labels:  hacking, enumeration
Getjs
A tool to fastly get all javascript sources/files
Stars: ✭ 190 (-30.15%)
Mutual labels:  hacking, reconnaissance
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-33.09%)
Mutual labels:  hacking, enumeration
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-30.15%)
Mutual labels:  hacking, reconnaissance
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+608.82%)
Mutual labels:  hacking, enumeration
Bugbountyscanner
A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.
Stars: ✭ 229 (-15.81%)
Mutual labels:  hacking, reconnaissance
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+477.94%)
Mutual labels:  enumeration, reconnaissance
auto-recon-ng
Automated script to run all modules for a specified list of domains, netblocks or company name
Stars: ✭ 17 (-93.75%)
Mutual labels:  enumeration, reconnaissance
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (-32.72%)
Mutual labels:  hacking, reconnaissance
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-62.87%)
Mutual labels:  hacking, reconnaissance
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+411.76%)
Mutual labels:  hacking, enumeration
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-26.84%)
Mutual labels:  hacking, enumeration
CEH
Exam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (-73.9%)
Mutual labels:  enumeration, reconnaissance

procSpy

DISCLAIMER: This tool is still in VERY early stages of development. Please contact me on twitter @kindredsec if you have any questions/concerns/requests. I will continue adding onto this project for the foreseeable future.

procSpy is a Python application that monitors user space commands being ran via /proc parsing, and records said commands in a "queriable" fashion for future investigation. The tool can to be utilized as both a defensive and offensive tool.

asciicast

To see the utility in its most basic form, run the python3 procspyd.py --mode stdout command.

WHAT IS PROCSPY DOING?

procSpy operates very similarly to the ps utility in that it parses the /proc directory for process information. However, procSpy puts special focus on locating and monitoring user-ran commands specifically, and records said commands for future investigation (or simply output the commands being ran in real-time if desired). The ability to keep a detailed record of the commands being ran by system users makes this utility useful for both red teams and blue teams/system administrators.

DEPLOYMENT OPTIONS

procSpy has three core "modes" that it can be ran in, file mode, stdout mode and database mode.

  • File Mode: outputs detected commands into a specified output file that is designed to be parsable by the procSpy client at a later time.
  • Stdout Mode: output in realtime the commands being detected to the terminal. Results are not "recorded" in any way.
  • Database Mode: populates a locally established mySQL database with detected commands which can then be easily queried by the procSpy client.

These deployment modes are not mutually exclusive; for example, you can run procSpy in stdout and file modes at the same time, allowing you to see the commands being ran in realtime as well as having the monitoring session recorded for future investigation. You can even run all three in unision if desired.

Generally speaking, file mode is largely designed to be used in an offensive capacity; upon compromising a system, you can run procSpy on it over a long period of time to monitor the activity of the target system in order to gain deeper access. File mode makes it easy to pull your monitoring results to your attacking box, or simply interact and query the file directly on the target. In fact, in addition to the core procspyd.py file that hosts the core tool, there also exists the procspyd-light.py version which only consists of file mode and is sufficiently cut down in terms of overhead/dependencies to better fit operational needs. Either version will work perfectly for any offensive efforts.

Database mode, on the other hand, is more so designed to be used in a Defensive capacity. Since a local database must be established with the provided setup script, it is highly unadvisable to operate the utility in this way in an offensive capacity (though, I am planning to grant the ability to push procSpy files into a procSpy database independently in the future). With database mode, A system administrator can run procSpy essentially as a daemon, and have a local database constantly populated with the user commands being ran on the system to monitor for suspicious activity.

WHATS INCLUDED?

The official repo consists of four main components:

  • procspyd.py - The core python application that parses and records the commands on the system.
  • procspyd-light.py - Same purpose as procspyd.py, though more so designed with less overhead/noise for offensive operations.
  • procspyclient.py - A small python script that parses out procSpy files or the procSpy database. This parsing can be done manually if needed, though it is reccomended to use the client.
  • dbsetup.sh - This script establishes the procSpy database. This will only be needed if you intend on using procSpy in database mode.

REQUIREMENTS

You will need:

  • python3
  • mysql-connector python module
  • mysql-server

CONTACT ME

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].