All Projects → GouveaHeitor → Spellbook

GouveaHeitor / Spellbook

Licence: other
Micro-framework for rapid development of reusable security tools

Programming Languages

perl
6916 projects

Projects that are alternatives of or similar to Spellbook

Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+860.38%)
Mutual labels:  hacking, security-tools, pentesting, ctf, ctf-tools, bug-bounty
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+17100%)
Mutual labels:  hacking, pentesting, ctf, ctf-tools
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (+145.28%)
Mutual labels:  security-tools, pentesting, ctf, ctf-tools
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (+118.87%)
Mutual labels:  hacking, security-tools, pentesting, ctf-tools
Flask Unsign
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (+69.81%)
Mutual labels:  security-tools, pentesting, ctf, ctf-tools
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+518.87%)
Mutual labels:  hacking, pentesting, ctf-tools, bug-bounty
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+794.34%)
Mutual labels:  hacking, pentesting, exploits
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+11730.19%)
Mutual labels:  hacking, pentesting, ctf
Stowaway
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+843.4%)
Mutual labels:  security-tools, pentesting, ctf
Name That Hash
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+918.87%)
Mutual labels:  hacking, ctf, ctf-tools
Habu
Hacking Toolkit
Stars: ✭ 635 (+1098.11%)
Mutual labels:  hacking, security-tools, pentesting
Jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+1116.98%)
Mutual labels:  toolbox, hacking, security-tools
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+705.66%)
Mutual labels:  hacking, security-tools, pentesting
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (+679.25%)
Mutual labels:  hacking, pentesting, ctf
Packetwhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (+664.15%)
Mutual labels:  hacking, security-tools, pentesting
Stegcracker
Steganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (+647.17%)
Mutual labels:  pentesting, ctf, ctf-tools
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+1267.92%)
Mutual labels:  hacking, security-tools, pentesting
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (+1273.58%)
Mutual labels:  security-tools, pentesting, exploits
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+1347.17%)
Mutual labels:  hacking, security-tools, ctf-tools
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+1362.26%)
Mutual labels:  hacking, security-tools, pentesting

Spellbook

A micro-framework for rapid development of reusable security tools

⚠️ Warning: Spellbook is currently in development, you've been warned :) and please consider contributing!


Summary

Here you will find a "spellbook" with my personal scripts, exploits and other small things I wrote during my bug hunts, pentesting or red teaming missions. Like any other spellbook, some things here are not going to be very easy to understand, but like any other spellbook it couldn't be different, right?

The main focus of this "micro-framework" is to keep my personal scripts organized and make them available in a structure where I can reuse the code that has already been written to write something else. Furthermore, the Spellbook is just a research project that so far is no big deal and does not replace a truly robust framework.


Download and install

  $ git clone https://github.com/GouveaHeitor/spellbook && cd spellbook
  $ cpan install Getopt::Long Mojo::File Mojo::JSON

How to use

Spellbook v0.0.4
Core Commands
==============
	Command       Description
	-------       -----------
	--show        List modules, you can filter by category
	--module      Set a module to use
	--read        Read the code of a module

Examples

# You can use the --show option to list the available modules
# valid parameters: all, recon, exploit, auxiliary or parser
$ perl spellbook.pl --show recon

Module: Recon::Find_Emails
Category: recon
Description: Find e-mails from a domain using hunter.io API
=================================================


Module: Recon::Passive_Enum
Category: recon
Description: Enumerate ports and service from a IP using Shodan API
=================================================
...

# To use a module, you can use the -m option followed by the name of the module
# followed by -t which is the main entry point of the module
$ perl spellbook.pl -m Recon::Find_Emails -t github.com

[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]

How to create new modules

First, you need to specify your module in the list of packages that Spellbook reads, present in: .config/modules.json

Just copy the last block of the json and insert the information of the new module;

Second, all modules are stored and accessible through the lib/Modules folder, each module is organized in a third folder that defines its category, such as:

Find the folder for the specific category of your module, or create one, then you can create your module normally like any other Perl module.

The only premise is that your module receives a main entry point and returns the results in an array.


Contribution


License

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].