|
|
|
@ -10,10 +10,10 @@ |
|
|
|
|
* [乙方工具向](#%E4%B9%99%E6%96%B9%E5%B7%A5%E5%85%B7%E5%90%91) |
|
|
|
|
* [Reconnaissance 信息收集](#reconnaissance-%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86) |
|
|
|
|
* [HaE](#hae) |
|
|
|
|
* [zsdevX/DarkEye](#zsdevX/DarkEye) |
|
|
|
|
* [zsdevX/DarkEye](#zsdevxdarkeye) |
|
|
|
|
* [Glass](#Glass) |
|
|
|
|
* [AppInfoScanner](#AppInfoScanner) |
|
|
|
|
|
|
|
|
|
* [ZoomEye-go](#ZoomEye-go) |
|
|
|
|
* [Vulnerability Assessment 漏洞探测](#vulnerability-assessment-%E6%BC%8F%E6%B4%9E%E6%8E%A2%E6%B5%8B) |
|
|
|
|
* [Kunpeng](#kunpeng) |
|
|
|
|
* [myscan](#myscan) |
|
|
|
@ -21,6 +21,8 @@ |
|
|
|
|
* [Penetration Test 攻击与利用](#penetration-test-%E6%94%BB%E5%87%BB%E4%B8%8E%E5%88%A9%E7%94%A8) |
|
|
|
|
|
|
|
|
|
* [Redis Rogue Server](#redis-rogue-server) |
|
|
|
|
* [CDK](#CDK) |
|
|
|
|
* [MysqlT & WhetherMysqlSham](MysqlT---WhetherMysqlSham) |
|
|
|
|
|
|
|
|
|
* [Information analysis 信息分析](#information-analysis-%E4%BF%A1%E6%81%AF%E5%88%86%E6%9E%90) |
|
|
|
|
* [java\-object\-searcher](#java-object-searcher) |
|
|
|
@ -31,9 +33,11 @@ |
|
|
|
|
* [Back\-penetration, intranet tools 后渗透、内网工具](#back-penetration-intranet-tools--%E5%90%8E%E6%B8%97%E9%80%8F%E5%86%85%E7%BD%91%E5%B7%A5%E5%85%B7) |
|
|
|
|
|
|
|
|
|
* [antSword](#antsword) |
|
|
|
|
* [ServerScan](#serverscan) |
|
|
|
|
|
|
|
|
|
* [Others 其他相关](#others-%E5%85%B6%E4%BB%96%E7%9B%B8%E5%85%B3) |
|
|
|
|
* [passive-scan-client](#passive-scan-client) |
|
|
|
|
* [f8x](#f8x) |
|
|
|
|
|
|
|
|
|
# 甲方工具向 |
|
|
|
|
|
|
|
|
@ -100,7 +104,7 @@ https://github.com/madneal/gshark |
|
|
|
|
|
|
|
|
|
在渗透测试前置准备工作过程种涉及到的各类信息收集 |
|
|
|
|
|
|
|
|
|
## [HaE](https://github.com/gh0stkey/HaE) |
|
|
|
|
### [HaE](https://github.com/gh0stkey/HaE) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow) ![](https://img.shields.io/badge/Author-gh0stkey-orange) ![](https://img.shields.io/badge/Language-Java-blue) |
|
|
|
|
|
|
|
|
@ -116,7 +120,7 @@ HaE是一款可以快速挖掘目标指纹和关键信息的Burp插件 |
|
|
|
|
如果说为了挖掘资产和敏感信息用专用的工具太过繁重,那选择一个burp插件不失为一个好的选择,作者整理的大量指纹也是项目的一个很大的亮点。 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## [zsdevX/DarkEye](https://github.com/zsdevX/DarkEye) |
|
|
|
|
### [zsdevX/DarkEye](https://github.com/zsdevX/DarkEye) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Author-zsdevX-orange) ![](https://img.shields.io/badge/Language-Go-blue) |
|
|
|
|
|
|
|
|
@ -132,7 +136,7 @@ https://github.com/zsdevX/DarkEye |
|
|
|
|
信息收集作为渗透测试的前置步骤一直以来都繁琐复杂,这个工具很好的集成了多个功能以及api来完成这一步,且内置图形界面的工具会让使用者的体验大大提升。 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## [Glass](https://github.com/s7ckTeam/Glass) |
|
|
|
|
### [Glass](https://github.com/s7ckTeam/Glass) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow) ![](https://img.shields.io/badge/Author-s7ckTeam-orange) ![](https://img.shields.io/badge/Language-Python-blue) |
|
|
|
|
|
|
|
|
@ -147,7 +151,7 @@ Glass是一款针对资产列表的快速指纹识别工具,通过调用Fofa/Z |
|
|
|
|
|
|
|
|
|
如果从大量杂乱的信息收集结果中提取有用的系统是一个亘古不变的话题,足够的指纹识别+多来源的数据不失为一个有效的手段。 |
|
|
|
|
|
|
|
|
|
## [AppInfoScanner](https://github.com/kelvinBen/AppInfoScanner) |
|
|
|
|
### [AppInfoScanner](https://github.com/kelvinBen/AppInfoScanner) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Language-Python-blue) ![](https://img.shields.io/badge/Author-kelvinBen-orange) |
|
|
|
|
|
|
|
|
@ -162,7 +166,20 @@ https://github.com/kelvinBen/AppInfoScanner |
|
|
|
|
|
|
|
|
|
从移动端APP(Android,iOS)中收集信息是在渗透测试过程中很容易忽略的一个点,如果有一个合适的工具来完成它那么最合适不过了。 |
|
|
|
|
|
|
|
|
|
### [ZoomEye-go](https://github.com/gyyyy/ZoomEye-go) ![](https://img.shields.io/badge/-New-red) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Language-Go-blue) ![](https://img.shields.io/badge/Author-gyyyy-orange) |
|
|
|
|
|
|
|
|
|
##### 项目链接: |
|
|
|
|
|
|
|
|
|
https://github.com/gyyyy/ZoomEye-go |
|
|
|
|
|
|
|
|
|
##### 项目简述: |
|
|
|
|
ZoomEye-go 是一款基于 ZoomEye API 开发的 Golang 库,提供了 ZoomEye 命令行模式,同时也可以作为SDK集成到其他工具中。该库可以让技术人员更便捷地搜索、筛选、导出 ZoomEye 的数据。 |
|
|
|
|
|
|
|
|
|
##### 推荐评语: |
|
|
|
|
|
|
|
|
|
ZoomEye-go是Golang版本的Zoomeye命令行工具,无论是直接下载release还是在使用Go编写的工具中引入都是不错的使用方案。 |
|
|
|
|
|
|
|
|
|
## Vulnerability Assessment 漏洞探测 |
|
|
|
|
|
|
|
|
@ -220,6 +237,37 @@ Redis 4.x/Redis 5.x RCE利用脚本. 项目最初来源于[https://github.com/n0 |
|
|
|
|
|
|
|
|
|
基于主从复制的Redis getshell方式出现之后,各种利用脚本也不断被开源出来,这个脚本是完善程度最高的。不但适配了5.0.8,且实现了主动连接模式和被动链接模式,非常实用。 |
|
|
|
|
|
|
|
|
|
### [CDK](https://github.com/cdk-team/CDK) ![](https://img.shields.io/badge/-New-red) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Language-Go-blue) ![](https://img.shields.io/badge/Author-cdkteam-orange) |
|
|
|
|
|
|
|
|
|
##### 项目链接: |
|
|
|
|
|
|
|
|
|
https://github.com/cdk-team/CDK |
|
|
|
|
|
|
|
|
|
##### 项目简述: |
|
|
|
|
CDK是一款为容器环境定制的渗透测试工具,在已攻陷的容器内部提供零依赖的常用命令及PoC/EXP。集成Docker/K8s场景特有的逃逸、横向移动、持久化利用方式,插件化管理。 |
|
|
|
|
|
|
|
|
|
##### 推荐评语: |
|
|
|
|
|
|
|
|
|
针对容器的渗透已经成了现代渗透中很重要的一环,而一款集成了各种场景以及漏洞的工具可以说是事半功倍了。 |
|
|
|
|
|
|
|
|
|
### [MysqlT](https://github.com/BeichenDream/MysqlT) & [WhetherMysqlSham](https://github.com/BeichenDream/WhetherMysqlSham) ![](https://img.shields.io/badge/-New-red) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Language-C%23-blue) ![](https://img.shields.io/badge/Author-BeichenDream-orange) |
|
|
|
|
|
|
|
|
|
##### 项目链接: |
|
|
|
|
|
|
|
|
|
- https://github.com/BeichenDream/MysqlT |
|
|
|
|
- https://github.com/BeichenDream/WhetherMysqlSham |
|
|
|
|
|
|
|
|
|
##### 项目简述: |
|
|
|
|
MysqlT: 伪造Myslq服务端,并利用Mysql逻辑漏洞来获取客户端的任意文件反击攻击者. |
|
|
|
|
WhetherMysqlSham:检测目标Mysql数据库是不是蜜罐。 |
|
|
|
|
|
|
|
|
|
##### 推荐评语: |
|
|
|
|
|
|
|
|
|
针对Mysql客户端攻击可以说大家已经很熟悉了,Mysqlt可以在利用的过程中节省很多麻烦,相应的反制工具设计思路也非常有趣。 |
|
|
|
|
|
|
|
|
|
## Information analysis 信息分析 |
|
|
|
|
对在渗透测试中获取到的各种信息做分析 |
|
|
|
@ -240,7 +288,7 @@ java内存对象搜索辅助工具,配合IDEA在Java应用运行时,对内 |
|
|
|
|
|
|
|
|
|
当你知道某个或某种类型对象存在于内存并且你刚好需要它时,却往往因为它隐藏得太深而放弃寻找,这款<java内存对象搜索辅助工具>可能帮助你从成千上万对象构成的森林中解脱。 |
|
|
|
|
|
|
|
|
|
### [HackBrowserData](https://github.com/moonD4rk/HackBrowserData) ![](https://img.shields.io/badge/-New-red) |
|
|
|
|
### [HackBrowserData](https://github.com/moonD4rk/HackBrowserData) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Author-moonD4rk-orange) ![](https://img.shields.io/badge/Language-Go-blue) |
|
|
|
|
|
|
|
|
@ -255,7 +303,7 @@ hack-browser-data 是一个解密浏览器数据(密码|历史记录|Cookies| |
|
|
|
|
|
|
|
|
|
这是一个你无论什么时候都有可能突然用上的工具,基于golang编写的项目也适用于各种不同场合。 |
|
|
|
|
|
|
|
|
|
### [frida-skeleton](https://github.com/Margular/frida-skeleton) ![](https://img.shields.io/badge/-New-red) |
|
|
|
|
### [frida-skeleton](https://github.com/Margular/frida-skeleton) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Author-Margular-orange) ![](https://img.shields.io/badge/Language-Python-blue) |
|
|
|
|
|
|
|
|
@ -270,7 +318,7 @@ frida-skeleton是基于frida的安卓hook框架,提供了很多frida自身不 |
|
|
|
|
|
|
|
|
|
调试apk项目时不可避免地需要用到frida来做辅助工具,这个项目建立在frida的基础上进一步优化了使用的许多细节以及体验。 |
|
|
|
|
|
|
|
|
|
### [MySQLMonitor & FileMonitor](https://github.com/TheKingOfDuck/MySQLMonitor) ![](https://img.shields.io/badge/-New-red) |
|
|
|
|
### [MySQLMonitor & FileMonitor](https://github.com/TheKingOfDuck/MySQLMonitor) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![![](https://img.shields.io/badge/Author-madneal-orange) ](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow) ![](https://img.shields.io/badge/Author-TheKingofDuck-orange) ![](https://img.shields.io/badge/Language-Java|Python-blue) |
|
|
|
|
|
|
|
|
@ -309,11 +357,26 @@ https://github.com/AntSwordProject/antSword |
|
|
|
|
|
|
|
|
|
一个真正的安全从业人员,那他一定不应该错过蚁剑。一个成熟、稳定的开源项目。 |
|
|
|
|
|
|
|
|
|
### [ServerScan](https://github.com/Adminisme/ServerScan) ![](https://img.shields.io/badge/-New-red) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Language-Go-blue) ![](https://img.shields.io/badge/Author-Adminisme-orange) |
|
|
|
|
|
|
|
|
|
##### 项目链接: |
|
|
|
|
|
|
|
|
|
https://github.com/Adminisme/ServerScan |
|
|
|
|
|
|
|
|
|
##### 项目简述: |
|
|
|
|
一款使用Golang开发且适用于攻防演习内网横向信息收集的高并发网络扫描、服务探测工具。 |
|
|
|
|
|
|
|
|
|
##### 推荐评语: |
|
|
|
|
|
|
|
|
|
网络扫描、服务探测工具并不稀奇。但专注于在内网环境的时候可用的工具就变少了很多,往往都需要用回nmap。这个工具依托于开发者诸多的实战经验,不但支持cs且在多种环境下都使用自如,实用体验极佳。 |
|
|
|
|
|
|
|
|
|
## Others 其他相关 |
|
|
|
|
|
|
|
|
|
其他安全链路下的安全类工具 |
|
|
|
|
|
|
|
|
|
## [passive-scan-client](https://github.com/c0ny1/passive-scan-client) |
|
|
|
|
### [passive-scan-client](https://github.com/c0ny1/passive-scan-client) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85-yellow) ![](https://img.shields.io/badge/Language-Java-blue) ![](https://img.shields.io/badge/Author-c0ny1-orange) |
|
|
|
|
|
|
|
|
@ -322,4 +385,19 @@ https://github.com/AntSwordProject/antSword |
|
|
|
|
https://github.com/c0ny1/passive-scan-client |
|
|
|
|
|
|
|
|
|
##### 项目简述: |
|
|
|
|
Passive Scan Client是一款可以将经过筛选的流量转发到指定代理的Burp被动扫描流量转发插件 |
|
|
|
|
Passive Scan Client是一款可以将经过筛选的流量转发到指定代理的Burp被动扫描流量转发插件 |
|
|
|
|
|
|
|
|
|
### [f8x](https://github.com/ffffffff0x/f8x) ![](https://img.shields.io/badge/-New-red) |
|
|
|
|
|
|
|
|
|
![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Language-Bash-blue) ![](https://img.shields.io/badge/Author-ffffffff0x-orange) |
|
|
|
|
|
|
|
|
|
##### 项目链接: |
|
|
|
|
|
|
|
|
|
https://github.com/ffffffff0x/f8x |
|
|
|
|
|
|
|
|
|
##### 项目简述: |
|
|
|
|
一款红/蓝队环境自动化部署工具,支持多种场景,渗透,开发,代理环境,服务可选项等。 |
|
|
|
|
|
|
|
|
|
##### 推荐评语: |
|
|
|
|
|
|
|
|
|
快速、针对、便携、无需环境依赖,这个工具解决了在红/蓝队场景下对环境最大的几个痛点,不得不说,这一定是深度从业者才能做的出来的好工具。 |