|
|
|
## 全部项目 / All_Projects
|
|
|
|
|
|
|
|
* [甲方工具/party_a](#甲方工具party_a)
|
|
|
|
* [OpenStar](#openstar)
|
|
|
|
* [Elkeid](#elkeid)
|
|
|
|
* [linglong](#linglong)
|
|
|
|
* [gshark](#gshark)
|
|
|
|
* [Juggler](#juggler)
|
|
|
|
|
|
|
|
* [信息收集/reconnaissance](#信息收集reconnaissance)
|
|
|
|
* [AppInfoScanner](#appinfoscanner)
|
|
|
|
* [HaE](#hae)
|
|
|
|
* [DarkEye](#darkeye)
|
|
|
|
* [Glass](#glass)
|
|
|
|
* [Kunyu](#kunyu)
|
|
|
|
* [ZoomEye-go](#zoomeye-go)
|
|
|
|
|
|
|
|
* [漏洞探测/vulnerability_assessment](#漏洞探测vulnerability_assessment)
|
|
|
|
* [Kunpeng](#kunpeng)
|
|
|
|
* [Pocassist](#pocassist)
|
|
|
|
* [myscan](#myscan)
|
|
|
|
|
|
|
|
* [攻击与利用/penetration_test](#攻击与利用penetration_test)
|
|
|
|
* [CDK](#cdk)
|
|
|
|
* [Viper](#viper)
|
|
|
|
* [MDUT](#mdut)
|
|
|
|
* [MySQL-Fake-Server](#mysql-fake-server)
|
|
|
|
* [ysomap](#ysomap)
|
|
|
|
* [BurpCrypto](#burpcrypto)
|
|
|
|
* [Redis-Rogue-Server](#redis-rogue-server)
|
|
|
|
* [MysqlT](#mysqlt)
|
|
|
|
|
|
|
|
* [信息分析/information_analysis](#信息分析information_analysis)
|
|
|
|
* [HackBrowserData](#hackbrowserdata)
|
|
|
|
* [frida-skeleton](#frida-skeleton)
|
|
|
|
* [java-object-searcher](#java-object-searcher)
|
|
|
|
* [MySQLMonitor](#mysqlmonitor)
|
|
|
|
* [CodeReviewTools](#codereviewtools)
|
|
|
|
|
|
|
|
* [内网工具/intranet_tools](#内网工具intranet_tools)
|
|
|
|
* [fscan](#fscan)
|
|
|
|
* [antSword](#antsword)
|
|
|
|
* [ServerScan](#serverscan)
|
|
|
|
* [Stowaway](#stowaway)
|
|
|
|
* [Platypus](#platypus)
|
|
|
|
* [As-Exploits](#as-exploits)
|
|
|
|
|
|
|
|
* [其他/others](#其他others)
|
|
|
|
* [passive-scan-client](#passive-scan-client)
|
|
|
|
* [f8x](#f8x)
|
|
|
|
|
|
|
|
----------------------------------------
|
|
|
|
|
|
|
|
## 甲方工具/party_a
|
|
|
|
### [OpenStar](detail/OpenStar.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-starjun-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-JS/Python-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/starjun/openstar.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/starjun/openstar>
|
|
|
|
|
|
|
|
OpenStar 是一个基于 OpenResty 的高性能 Web 应用防火墙,支持复杂规则编写。提供了常规的 HTTP 字段规则配置,还提供了 IP 黑白名单、访问频次等配置,对于 CC 防护更提供的特定的规则算法,并且支持搭建集群进行防护。
|
|
|
|
|
|
|
|
### [Elkeid](detail/Elkeid.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-bytedance-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-C/Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/bytedance/Elkeid.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/bytedance/Elkeid>
|
|
|
|
|
|
|
|
Elkeid是一个云原生的基于主机的安全(入侵检测与风险识别)解决方案。Elkeid 包含两大部分:Elkeid Agent与Elkeid Driver作为数据采集层,它在Linux系统的内核和用户空间上均可使用,从而提供了具有更好性能的且更丰富的数据。 Elkeid Server可以提供百万级Agent的接入能力,采集Agent数据,支持控制与策略下发。包含实时、离线计算模块,对采集上来的数据进行分析和检测。又有自带的服务发现和管理系统,方便对整个后台管理和操作。
|
|
|
|
|
|
|
|
### [linglong](detail/linglong.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-awake1t-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/awake1t/linglong.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/awake1t/linglong>
|
|
|
|
|
|
|
|
linglong是一款甲方资产巡航扫描系统。系统定位是发现资产,进行端口爆破。帮助企业更快发现弱口令问题。主要功能包括: 资产探测、端口爆破、定时任务、管理后台识别、报表展示。
|
|
|
|
|
|
|
|
### [gshark](detail/gshark.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-madneal-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/madneal/gshark.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V0.8.4-red)
|
|
|
|
|
|
|
|
<https://github.com/madneal/gshark>
|
|
|
|
|
|
|
|
一款开源敏感信息监测系统,可以监测包括 github、gitlab(目前不太稳定,由于gitlab对于免费用户不提供代码全文检索API)、searchcode 多平台的敏感信息监测。
|
|
|
|
|
|
|
|
### [Juggler](detail/Juggler.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-C4o-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/C4o/Juggler.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/C4o/Juggler>
|
|
|
|
|
|
|
|
一个也许能骗到黑客的系统,可以作为WAF等防护体系的一环。
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## 信息收集/reconnaissance
|
|
|
|
### [AppInfoScanner](detail/AppInfoScanner.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-kelvinBen-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Python-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/kelvinBen/AppInfoScanner.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.8-red)
|
|
|
|
|
|
|
|
<https://github.com/kelvinBen/AppInfoScanner>
|
|
|
|
|
|
|
|
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
|
|
|
|
|
|
|
|
### [HaE](detail/HaE.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-gh0stkey-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Java-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/gh0stkey/HaE.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V2.1.2-red)
|
|
|
|
|
|
|
|
<https://github.com/gh0stkey/HaE>
|
|
|
|
|
|
|
|
HaE是一款可以快速挖掘目标指纹和关键信息的Burp插件。
|
|
|
|
|
|
|
|
### [DarkEye](detail/DarkEye.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-zsdevX-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/zsdevX/DarkEye.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V4.3.0-red)
|
|
|
|
|
|
|
|
<https://github.com/zsdevX/DarkEye>
|
|
|
|
|
|
|
|
基于go完成的渗透测试信息收集利器
|
|
|
|
|
|
|
|
### [Glass](detail/Glass.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-s7ckTeam-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Python-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/s7ckTeam/Glass.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V2.0.6-red)
|
|
|
|
|
|
|
|
<https://github.com/s7ckTeam/Glass>
|
|
|
|
|
|
|
|
Glass是一款针对资产列表的快速指纹识别工具,通过调用Fofa/ZoomEye/Shodan/360等api接口快速查询资产信息并识别重点资产的指纹,也可针对IP/IP段或资产列表进行快速的指纹识别。
|
|
|
|
|
|
|
|
### [Kunyu](detail/Kunyu.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-风起-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Python-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/knownsec/Kunyu.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.6.1-red)
|
|
|
|
|
|
|
|
<https://github.com/knownsec/Kunyu>
|
|
|
|
|
|
|
|
Kunyu(坤舆),是一款基于ZoomEye API开发的信息收集工具,旨在让企业资产收集更高效,使更多安全相关从业者了解、使用网络空间测绘技术。
|
|
|
|
|
|
|
|
### [ZoomEye-go](detail/ZoomEye-go.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-gyyyy-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/gyyyy/ZoomEye-go.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.5.0-red)
|
|
|
|
|
|
|
|
<https://github.com/gyyyy/ZoomEye-go>
|
|
|
|
|
|
|
|
ZoomEye-go 是一款基于 ZoomEye API 开发的 Golang 库,提供了 ZoomEye 命令行模式,同时也可以作为SDK集成到其他工具中。该库可以让技术人员更便捷地搜索、筛选、导出 ZoomEye 的数据。
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## 漏洞探测/vulnerability_assessment
|
|
|
|
### [Kunpeng](detail/Kunpeng.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-opensec-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/opensec-cn/kunpeng.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/opensec-cn/kunpeng>
|
|
|
|
|
|
|
|
Kunpeng是一个Golang编写的开源POC检测框架,集成了包括数据库、中间件、web组件、cms等等的漏洞POC,可检测弱口令、SQL注入、XSS、RCE等漏洞类型,以动态链接库的形式提供调用,通过此项目可快速开发漏洞检测类的系统,比攻击者快一步发现风险漏洞。
|
|
|
|
|
|
|
|
### [Pocassist](detail/Pocassist.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-jweny-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/jweny/pocassist.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.5-red)
|
|
|
|
|
|
|
|
<https://github.com/jweny/pocassist>
|
|
|
|
|
|
|
|
Pocassist 是一个 Golang 编写的全新开源漏洞测试框架,帮助安全人员专注于漏洞验证的逻辑的实现。Pocassist 提供了简洁的 Web 图形化界面,用户可以在线编辑漏洞验证程序即可进行批量的测试;规则完全兼容 xray,可以直接使用现有开源的 PoC 库,同时也支持添加自定义规则。
|
|
|
|
|
|
|
|
### [myscan](detail/myscan.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-amcai-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Python-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/amcai/myscan.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/amcai/myscan>
|
|
|
|
|
|
|
|
myscan是参考awvs的poc目录架构,pocsuite3、sqlmap等代码框架,以及搜集互联网上大量的poc,由python3开发而成的被动扫描工具。
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## 攻击与利用/penetration_test
|
|
|
|
### [CDK](detail/CDK.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-cdkteam-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-CDK-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/cdk-team/CDK.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.4-red)
|
|
|
|
|
|
|
|
<https://github.com/cdk-team/CDK>
|
|
|
|
|
|
|
|
CDK是一款为容器环境定制的渗透测试工具,在已攻陷的容器内部提供零依赖的常用命令及PoC/EXP。集成Docker/K8s场景特有的逃逸、横向移动、持久化利用方式,插件化管理。
|
|
|
|
|
|
|
|
### [Viper](detail/Viper.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-FunnyWolf-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-JS/Python-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/FunnyWolf/Viper.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.5.5-red)
|
|
|
|
|
|
|
|
<https://github.com/FunnyWolf/Viper>
|
|
|
|
|
|
|
|
VIPER是一款图形化内网渗透工具,将内网渗透过程中常用的战术及技术进行模块化及武器化。
|
|
|
|
|
|
|
|
### [MDUT](detail/MDUT.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-Ch1ngg-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Java-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/SafeGroceryStore/MDUT.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V2.0.7-red)
|
|
|
|
|
|
|
|
<https://github.com/SafeGroceryStore/MDUT>
|
|
|
|
|
|
|
|
MDUT 全称 Multiple Database Utilization Tools,旨在将常见的数据库利用手段集合在一个程序中,打破各种数据库利用工具需要各种环境导致使用相当不便的隔阂;MDUT 使用 Java 开发,支持跨平台使用。
|
|
|
|
|
|
|
|
### [MySQL-Fake-Server](detail/MySQL-Fake-Server.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-fnmsd-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Python-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/fnmsd/MySQL_Fake_Server.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V0.0.1-red)
|
|
|
|
|
|
|
|
<https://github.com/fnmsd/MySQL_Fake_Server>
|
|
|
|
|
|
|
|
用于渗透测试过程中的假MySQL服务器,纯原生python3实现,不依赖其它包。
|
|
|
|
|
|
|
|
### [ysomap](detail/ysomap.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-wh1t3p1g-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Java-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/wh1t3p1g/ysomap.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V0.1.1-red)
|
|
|
|
|
|
|
|
<https://github.com/wh1t3p1g/ysomap>
|
|
|
|
|
|
|
|
Ysomap是一款适配于各类实际复杂环境的Java反序列化利用框架,可动态配置具备不同执行效果的Java反序列化利用链payload,以应对不同场景下的反序列化利用。
|
|
|
|
|
|
|
|
### [BurpCrypto](detail/BurpCrypto.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-whwlsfb-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Java-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/whwlsfb/BurpCrypto.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V0.0.1-red)
|
|
|
|
|
|
|
|
<https://github.com/whwlsfb/BurpCrypto>
|
|
|
|
|
|
|
|
支持多种加密算法或直接执行JS代码的用于爆破前端加密的BurpSuite插件。
|
|
|
|
|
|
|
|
### [Redis-Rogue-Server](detail/Redis-Rogue-Server.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-Dliv3-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Python-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/Dliv3/redis-rogue-server.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/Dliv3/redis-rogue-server>
|
|
|
|
|
|
|
|
Redis 4.x/Redis 5.x RCE利用脚本. 项目最初来源于 <https://github.com/n0b0dyCN/redis-rogue-server>
|
|
|
|
|
|
|
|
### [MysqlT](detail/MysqlT.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-BeichenDream-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-C%23-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/BeichenDream/MysqlT.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/BeichenDream/MysqlT>
|
|
|
|
|
|
|
|
伪造Myslq服务端,并利用Mysql逻辑漏洞来获取客户端的任意文件反击攻击。
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## 信息分析/information_analysis
|
|
|
|
### [HackBrowserData](detail/HackBrowserData.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-moonD4rk-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/moonD4rk/HackBrowserData.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V0.3.6-red)
|
|
|
|
|
|
|
|
<https://github.com/moonD4rk/HackBrowserData>
|
|
|
|
|
|
|
|
hack-browser-data 是一个解密浏览器数据(密码/历史记录/Cookies/书签)的导出工具,支持全平台主流浏览器的数据导出窃取。
|
|
|
|
|
|
|
|
### [frida-skeleton](detail/frida-skeleton.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-Margular-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Python-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/Margular/frida-skeleton.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V2.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/Margular/frida-skeleton>
|
|
|
|
|
|
|
|
frida-skeleton是基于frida的安卓hook框架,提供了很多frida自身不支持的功能,将hook安卓变成简单便捷,人人都会的事情。
|
|
|
|
|
|
|
|
### [java-object-searcher](detail/java-object-searcher.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-c0ny1-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Java-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/c0ny1/java-object-searcher.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V0.1.0-red)
|
|
|
|
|
|
|
|
<https://github.com/c0ny1/java-object-searcher>
|
|
|
|
|
|
|
|
java内存对象搜索辅助工具,配合IDEA在Java应用运行时,对内存中的对象进行搜索。比如可以可以用挖掘request对象用于回显等场景。
|
|
|
|
|
|
|
|
### [MySQLMonitor](detail/MySQLMonitor.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-TheKingOfDuck-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Java-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/TheKingOfDuck/MySQLMonitor.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/TheKingOfDuck/MySQLMonitor>
|
|
|
|
|
|
|
|
MySQL实时监控工具(代码审计/黑盒/白盒审计辅助工具)
|
|
|
|
|
|
|
|
### [CodeReviewTools](detail/CodeReviewTools.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-Ppsoft1991-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Java-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/Ppsoft1991/CodeReviewTools.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.1.0-red)
|
|
|
|
|
|
|
|
<https://github.com/Ppsoft1991/CodeReviewTools>
|
|
|
|
|
|
|
|
CodeReviewTools是一个可以快速批量反编译jar包的工具,为审计Java代码做好第一步。
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## 内网工具/intranet_tools
|
|
|
|
### [fscan](detail/fscan.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-shadow1ng-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/shadow1ng/fscan.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.6.3-red)
|
|
|
|
|
|
|
|
<https://github.com/shadow1ng/fscan>
|
|
|
|
|
|
|
|
一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。支持主机存活探测、端口扫描、常见服务的爆破、ms17010、redis批量写公钥、计划任务反弹shell、读取win网卡信息、web指纹识别、web漏洞扫描、netbios探测、域控识别等功能。
|
|
|
|
|
|
|
|
### [antSword](detail/antSword.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-AntSwordProject-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Nodejs-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/AntSwordProject/antSword.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V2.1.14-red)
|
|
|
|
|
|
|
|
<https://github.com/AntSwordProject/antSword>
|
|
|
|
|
|
|
|
中国蚁剑是一款开源的跨平台网站管理工具。
|
|
|
|
|
|
|
|
### [ServerScan](detail/ServerScan.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-Adminisme-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/Adminisme/ServerScan.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.2-red)
|
|
|
|
|
|
|
|
<https://github.com/Adminisme/ServerScan>
|
|
|
|
|
|
|
|
一款使用Golang开发且适用于攻防演习内网横向信息收集的高并发网络扫描、服务探测工具。
|
|
|
|
|
|
|
|
### [Stowaway](detail/Stowaway.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-ph4ntonn-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/ph4ntonn/Stowaway.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V2.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/ph4ntonn/Stowaway>
|
|
|
|
|
|
|
|
Stowaway 是一款多级代理工具,可将外部流量通过多个节点代理至内网,突破内网访问限制。Stowaway 可以方便渗透测试人员通过多级跳跃,从外部dmz等一系列区域逐步深入核心网络;Stowaway 除了流量转发功能,还提供了端口复用、ssh隧道,流量伪装等专为渗透测试人员所用的功能。
|
|
|
|
|
|
|
|
### [Platypus](detail/Platypus.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-WangYihang-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Golang-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/WangYihang/Platypus.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.5.0-red)
|
|
|
|
|
|
|
|
<https://github.com/WangYihang/Platypus>
|
|
|
|
|
|
|
|
Platypus 是一个基于终端与 Web UI 交互式的反弹 Shell 会话管理工具。在实际的渗透测试中,为了解决 Netcat/Socat 等工具在文件传输、多会话管理方面的不足。该工具在多会话管理的基础上增加了在渗透测试中更加有用的功能,可以更方便灵活地对反弹 Shell 会话进行管理。
|
|
|
|
|
|
|
|
### [As-Exploits](detail/As-Exploits.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-yzddmr6-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-JavaScript-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/yzddmr6/As-Exploits.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.0.0-red)
|
|
|
|
|
|
|
|
<https://github.com/yzddmr6/As-Exploits>
|
|
|
|
|
|
|
|
中国蚁剑后渗透框架
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## 其他/others
|
|
|
|
### [passive-scan-client](detail/passive-scan-client.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-c0ny1-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Java-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/c0ny1/passive-scan-client.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V0.3.0-red)
|
|
|
|
|
|
|
|
<https://github.com/c0ny1/passive-scan-client>
|
|
|
|
|
|
|
|
Passive Scan Client是一款可以将经过筛选的流量转发到指定代理的Burp被动扫描流量转发插件
|
|
|
|
|
|
|
|
### [f8x](detail/f8x.md)
|
|
|
|
![Author](https://img.shields.io/badge/Author-ffffffff0x-orange)
|
|
|
|
![Language](https://img.shields.io/badge/Language-Bash-blue)
|
|
|
|
![GitHub stars](https://img.shields.io/github/stars/ffffffff0x/f8x.svg?style=flat&logo=github)
|
|
|
|
![Version](https://img.shields.io/badge/Version-V1.5.7-red)
|
|
|
|
|
|
|
|
<https://github.com/ffffffff0x/f8x>
|
|
|
|
|
|
|
|
一款红/蓝队环境自动化部署工具,支持多种场景,渗透,开发,代理环境,服务可选项等。
|
|
|
|
|
|
|
|
|
|
|
|
|