All Projects → th3void → Zynix Fusion

th3void / Zynix Fusion

Licence: gpl-3.0
zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.

Programming Languages

ruby
36898 projects - #4 most used programming language

Projects that are alternatives of or similar to Zynix Fusion

Vault
swiss army knife for hackers
Stars: ✭ 346 (+311.9%)
Mutual labels:  hacking, pentesting, offensive-security
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+116.67%)
Mutual labels:  hacking, pentesting, offensive-security
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+2652.38%)
Mutual labels:  hacking, pentesting, offensive-security
Oscp Human Guide
My own OSCP guide
Stars: ✭ 358 (+326.19%)
Mutual labels:  hacking, pentesting, offensive-security
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+908.33%)
Mutual labels:  hacking, pentesting
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+10752.38%)
Mutual labels:  hacking, pentesting
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+935.71%)
Mutual labels:  hacking, pentesting
Githacktools
The best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-7.14%)
Mutual labels:  hacking, pentesting
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+809.52%)
Mutual labels:  hacking, pentesting
Keylogger
A simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+1098.81%)
Mutual labels:  hacking, pentesting
Oscp
My OSCP journey
Stars: ✭ 50 (-40.48%)
Mutual labels:  pentesting, offensive-security
Awesome Oscp
A curated list of awesome OSCP resources
Stars: ✭ 804 (+857.14%)
Mutual labels:  pentesting, offensive-security
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+835.71%)
Mutual labels:  hacking, pentesting
Kubernetes Goat
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+933.33%)
Mutual labels:  hacking, pentesting
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+822.62%)
Mutual labels:  hacking, pentesting
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+10591.67%)
Mutual labels:  hacking, pentesting
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-32.14%)
Mutual labels:  hacking, pentesting
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-36.9%)
Mutual labels:  hacking, pentesting
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-26.19%)
Mutual labels:  hacking, pentesting
Netmap.js
Fast browser-based network discovery module
Stars: ✭ 70 (-16.67%)
Mutual labels:  hacking, pentesting

ZYNIX FUSION

:: Zynix Fusion ::

Zynix fusion is a framework for performing pentest and hacking in web applications,
having several renowned tools in its backend, it aims to make it simpler to quickly
 use several of these tools, also exposing native tools of the project.

:: A brief history ::

Zynix Fusion is a project derived from other projects of my own "th3void", and has
 already had several names, shapes and functions, today it is as I wanted it to be,
  simple and straightforward.
In 2015 this was just a shell script for installing some tools on Arch Linux, and it
 was left aside for many years, but now it is close to what I wanted.

:: Warnings ::

This software depends on other software and libraries to work properly, make sure 
your system has all of them.

:: Considerations ::

§ 1 About use
This script was made to automate the steps of gathering information about web targets, the
misuse and responsibility of the user, to report bugs or make suggestions to open a report on
github.

§ 2 About simple_scan
Automap was replaced by simple_scan, it is lighter and faster, in addition to being less
detectable, now it has different modes of execution that make it possible from a quick and
simple execution to more complex modes.

§ 3 About Console
The output of the script can be extremely long, so see if your console, (gnome-terminal, cmd,
konsole) is configured to display 1000 lines (I particularly recommend 10,000 lines), for
professional purposes it allows the documentation, it records the commands, exits and formats
the text.

:: How to use ::

There are two types of commands: the internal ones, which are restricted to the back-end
system and the usable front-end ones that are used to execute the functions.
red are the functions that do not work at this time or that have been removed.

Installation:

git clone https://github.com/th3void/zynix-fusion

on Fedora:         
    
    sudo dnf install ruby ruby-devel -y && sudo dnf dnf group install 'Security Lab' -y 

on Kali linux, parrot, black Arch, etc, just install ruby and ruby-dev.

cd zynix-fusion

bundle config set --local path 'vendor/bundle'
bundle install

if there is a permission error, run as sudo

later:

ruby main.rb

Enter the command and pass the requested information, if necessary.

:: Commands ::

Alias

ls                      | ls -lha
cls                     | clear
sdown                   | shutdown -h now
rm                      | rm -rf
cp                      | cp

From shell

cow                     | Reset shell view

From plugins

plugin --fpage          | Generate fake website for bypass monetization systems  

From gem

gem --g rg              | Generate fake Brazilian rg
gem --g cpf             | Generate fake Brazilian
gem --g name            | Generate fake Brazilian/Portuquese/Spanish name
gem --g fakedb          | Generate fake database 

From vs

vs --v banner'          | Show Banner
vs --v dns'             | Show Web dns search engines
vs --v lfile'           | Show useful linux file 
vs --v lfolder'         | Show useful linux folders
vs --v wfile'           | Show useful Windows files
vs --v luss'            | Show linux useful information 
vs --v tsearch'         | Show Tor search engines
vs --v talt'            | Show Tor alternatives

From kl

kl --init               | Set global target variable   
kl --cover              | Cover your logs  
kl --compress           | Compress files       
kl --extract            | Extract files       
kl ---ginfo             | Grep banners and domain information
kl --dns --brute        | Dns brute force           
kl --dns --scan         | Dns scanner      
kl --dir --scan         | Dir scanner       
kl --smap               | Simple map
kl --maclookup          | Mac address lookup
kl --myip               | Show your ip
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].