All Projects → stevemcilwain → Quiver

stevemcilwain / Quiver

Licence: mit
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Quiver

Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-55.71%)
Mutual labels:  hacking, pentesting, penetration-testing, bugbounty
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+6315%)
Mutual labels:  kali-linux, hacking, pentesting, bugbounty
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+513.57%)
Mutual labels:  kali-linux, pentesting, kali, bugbounty
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+30%)
Mutual labels:  hacking, pentesting, penetration-testing, bugbounty
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+2402.14%)
Mutual labels:  kali-linux, hacking, pentesting, penetration-testing
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+205%)
Mutual labels:  hacking, pentesting, penetration-testing, bugbounty
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (+114.29%)
Mutual labels:  kali-linux, hacking, penetration-testing, kali
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+5075.71%)
Mutual labels:  hacking, pentesting, penetration-testing, bugbounty
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1212.14%)
Mutual labels:  hacking, pentesting, bugbounty
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+521.43%)
Mutual labels:  hacking, pentesting, penetration-testing
Babysploit
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+530.71%)
Mutual labels:  pentesting, penetration-testing, kali
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+447.86%)
Mutual labels:  hacking, penetration-testing, bugbounty
Gitjacker
🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+792.14%)
Mutual labels:  hacking, pentesting, penetration-testing
Learn Web Hacking
Study Notes For Web Hacking / Web安全学习笔记
Stars: ✭ 2,326 (+1561.43%)
Mutual labels:  hacking, pentesting, penetration-testing
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+461.43%)
Mutual labels:  hacking, pentesting, bugbounty
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1277.14%)
Mutual labels:  hacking, penetration-testing, bugbounty
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+445.71%)
Mutual labels:  hacking, pentesting, penetration-testing
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-25%)
Mutual labels:  hacking, pentesting, penetration-testing
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+894.29%)
Mutual labels:  hacking, pentesting, penetration-testing
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+990%)
Mutual labels:  kali-linux, hacking, pentesting

Quiver : A Meta-Tool for Kali Linux

Quiver is an organized namespace of shell functions that pre-fill commands in your terminal so that you can ditch your reliance on notes, copying, pasting, editing, copying and pasting again. Quiver helps you remember how to use every tool in your arsenal and doesn't hide them behind scripting that can be cumbersome to maintain or update. Instead you can use Quiver to build a composable, on-the-fly workflow for every situation.

Quiver doesn't cover all tools, it's my own curated collection which I am still adding to and updating. There are so many tools for many different types of engagements and targets, so I jsut try to focus on tools that are maintained and current. Feel free to ask for the inclusion of tools you prefer in the issues list.

Release 1.0

After months of hard work during lockdown, I am happy to introduce the 1.0 release of Quiver! This version contains many improvements over previous versions such as per-namespace help and installers, auto-fill variables such as RHOST, RPORT, LHOST, LPORT, PROJECT, WORDLIST, URL and global configuration settings for customizing settings like a menu of your favorite wordlists. If you've been using Quiver before now, then many of the changes in 1.0 are breaking changes. Please familiarize yourself with the new commands using qq-help. If you previously were storing Quiver values in .zshrc, most of these can now be stored as global vars using qq-vars-global.

Features

  • Prefills the commands within a terminal
  • Well-organized commands with tab auto-completion
  • Installs as a ZSH / Oh-My-ZSH shell plugin
  • Customizable settings, Global variables
  • Recon phase commands for OSINT
  • Enumeration of common services
  • Web enumeration, brute-forcing and hacking
  • Exploit compilation helpers
  • Reverse shell handlers
  • Content serving commands
  • Built-in logbook for on-the-fly notes, saving commands
  • Render markdown notes to the command line
  • Kali Linux system management
  • Update notification and install
  • Installers for dependencies

Installation

Quiver requires the following:

Clone the repo to your OMZ custom plugins folder.

git clone https://github.com/stevemcilwain/quiver.git ~/.oh-my-zsh/custom/plugins/quiver

Edit ~/.zshrc to load the plugin.


plugins=(git quiver)

Source .zshrc to load the plugin and you're done. On first load, Quiver will install a few core packages.


source ~/.zshrc

Getting Started

Quiver organizes commands into namespaces starting with qq-, such as qq-enum-web or qq-recon-domains. To see an overview of all namespaces simply use qq-help. Each namespace also has it's own help command, such as qq-enum-web-help that provides a listing of available commands. All commands support tab completion and search.

Installing Dependencies

Every namespace was a qq--install command that will install all of the tools relavent to that namespace. You can install just the tools you need, or use qq-install-all to run the installers of all namespaces.

Workflow

Quiver is meant to provide a composable, on-the-fly workflow. It replaces the common painful raw workflow of reading your notes, finding a command, copy, paste, replace the values with target values, copy, paste, run. Some rely heavily on completely automated scripts or frameworks that run all the commands for a workflow and output well-formatted data. While these scripts are great for many use cases, they can often be brittle, hide the underlying tools and techniques and be cumbersom to modify. Instead, Quiver gives you a happy medium, you can run commands quickly and easy with well-organized output, composing your workflow as you go depending on the targets and context.

Example Workflow

Here is an example workflow for bug bounty hunting:

Prep

# if you have markdown notes, configure the path 
qq-vars-global-set-notes

# set some session variables for the bounty target 
qq-vars-set-project 
qq-vars-set-domain 

# generate scope files from the bounty url
qq-project-rescope

# save vars for other terminal sessions, qq-vars-load
qq-vars-save

Passive Recon

# search for target files
qq-recon-org-files

# search downloaded files for urls
qq-recon-org-files-urls

# mine github repos for secrets
qq-recon-github-gitrob

# check dns records
qq-enum-dns-dnsrecon

# look for ASNs and networks
qq-recon-networks-amass-asns
qq-recon-networks-bgpview-ipv4

# get subdomains
qq-recon-subs-subfinder

# resolve and parse subdomains
qq-recon-subs-resolve-massdns
qq-recon-subs-resolve-parse

Active Web Enumeration

# Download out robots.txt
qq-enum-web-dirs-robots

# ID a WAF if present
qq-enum-web-waf

# Parse SSL certs
qq-enum-web-ssl-certs

# Spider the site
qq-enum-web-gospider

# Brute force URIs
qq-enum-web-dirs-ffuf

# Read your notes
qq-notes

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].