-# HackBrowserData
+`HackBrowserData` 是一个浏览器数据(密码|历史记录|Cookie|书签|信用卡|下载记录|localStorage|浏览器插件)的导出工具,支持全平台主流浏览器。
-hack-browser-data 是一个浏览器数据(密码 | 历史记录 | Cookie | 书签 | 信用卡 | 下载记录)的导出工具,支持全平台主流浏览器。
-
-> 特别声明:此工具仅限于安全研究,用户承担因使用此工具而导致的所有法律和相关责任!作者不承担任何法律责任!
+> 免责声明:此工具仅限于安全研究,用户承担因使用此工具而导致的所有法律和相关责任!作者不承担任何法律责任!
## 各平台浏览器支持情况
@@ -26,11 +27,13 @@ hack-browser-data 是一个浏览器数据(密码 | 历史记录 | Cookie |
| Chromium | ✅ | ✅ | ✅ | ✅ |
| Microsoft Edge| ✅ | ✅ | ✅ | ✅ |
| 360 极速浏览器 | ✅ | ✅ | ✅ | ✅ |
-| QQ 浏览器| ✅ | ✅ | ✅ | ✅ |
-| Brave 浏览器 | ✅ | ✅ | ✅ | ✅ |
-| Opera 浏览器 | ✅ | ✅ | ✅ | ✅ |
-| OperaGX 浏览器 | ✅ | ✅ | ✅ | ✅ |
-| Vivaldi 浏览器 | ✅ | ✅ | ✅ | ✅ |
+| QQ | ✅ | ✅ | ✅ | ✅ |
+| Brave | ✅ | ✅ | ✅ | ✅ |
+| Opera | ✅ | ✅ | ✅ | ✅ |
+| OperaGX | ✅ | ✅ | ✅ | ✅ |
+| Vivaldi | ✅ | ✅ | ✅ | ✅ |
+| Yandex | ✅ | ✅ | ✅ | ✅ |
+| CocCoc | ✅ | ✅ | ✅ | ✅ |
| Firefox | ✅ | ✅ | ✅ | ✅ |
| Firefox Beta | ✅ | ✅ | ✅ | ✅ |
| Firefox Dev | ✅ | ✅ | ✅ | ✅ |
@@ -42,8 +45,8 @@ hack-browser-data 是一个浏览器数据(密码 | 历史记录 | Cookie |
由于 MacOS 的安全性设置,基于 `Chromium` 内核浏览器解密时**需要当前用户密码**
-| 浏览器 | 密码 | Cookie | 书签 | 历史记录 |
-| :--------------------------- | :------: | :----: | :------: | :-----: |
+| 浏览器 | 密码 | Cookie | 书签 | 历史记录 |
+| :--- | :------: | :----: | :------: | :-----: |
| Google Chrome | ✅ | ✅ | ✅ | ✅ |
| Google Chrome Beta | ✅ | ✅ | ✅ | ✅ |
| Chromium | ✅ | ✅ | ✅ | ✅ |
@@ -52,6 +55,8 @@ hack-browser-data 是一个浏览器数据(密码 | 历史记录 | Cookie |
| Opera | ✅ | ✅ | ✅ | ✅ |
| OperaGX | ✅ | ✅ | ✅ | ✅ |
| Vivaldi | ✅ | ✅ | ✅ | ✅ |
+| Yandex | ✅ | ✅ | ✅ | ✅ |
+| CocCoc | ✅ | ✅ | ✅ | ✅ |
| Firefox | ✅ | ✅ | ✅ | ✅ |
| Firefox Beta | ✅ | ✅ | ✅ | ✅ |
| Firefox Dev | ✅ | ✅ | ✅ | ✅ |
@@ -62,7 +67,7 @@ hack-browser-data 是一个浏览器数据(密码 | 历史记录 | Cookie |
### Linux
| 浏览器 | 密码 | Cookie | 书签 | 历史记录 |
-| :------------ | :------: | :----: | :------: | :-----: |
+| :----- | :------: | :----: | :------: | :-----: |
| Google Chrome | ✅ | ✅ | ✅ | ✅ |
| Google Chrome Beta | ✅ | ✅ | ✅ | ✅ |
| Chromium | ✅ | ✅ | ✅ | ✅ |
@@ -86,16 +91,14 @@ hack-browser-data 是一个浏览器数据(密码 | 历史记录 | Cookie |
### 从源码编译
-支持版本 `go 1.14+`
+仅支持 `go 1.18+` 以后版本,一些函数使用到了泛型
``` bash
-git clone https://github.com/moonD4rk/HackBrowserData
-
-cd HackBrowserData
+$ git clone https://github.com/moonD4rk/HackBrowserData
-go get -v -t -d ./...
+$ cd HackBrowserData/cmd/hack-browser-data
-go build
+$ CGO_ENABLED=1 go build
```
### 跨平台编译
@@ -107,7 +110,7 @@ go build
``` shell
brew install mingw-w64
-CGO_ENABLED=1 GOOS=windows GOARCH=amd64 CC="x86_64-w64-mingw32-gcc" go build
+CGO_ENABLED=1 GOOS=windows GOARCH=amd64 CC=x86_64-w64-mingw32-gcc go build
```
#### Linux
@@ -128,55 +131,64 @@ NAME:
USAGE:
[hack-browser-data -b chrome -f json -dir results -cc]
- Get all data(password/cookie/history/bookmark) from chrome
+ Export all browingdata(password/cookie/history/bookmark) from browser
+ Github Link: https://github.com/moonD4rk/HackBrowserData
VERSION:
- 0.3.6
+ 0.4.2
+
GLOBAL OPTIONS:
- --verbose, --vv verbose (default: false)
- --compress, --cc compress result to zip (default: false)
- --browser value, -b value available browsers: all|opera|firefox|chrome|edge (default: "all")
- --results-dir value, --dir value export dir (default: "results")
- --format value, -f value format, csv|json|console (default: "csv")
- --profile-dir-path value, -p value custom profile dir path, get with chrome://version
- --key-file-path value, -k value custom key file path
- --help, -h show help (default: false)
- --version, -v print the version (default: false)
-
-PS C:\test> .\hack-browser-data.exe -b all -f json --dir results --cc
-[x]: Get 44 cookies, filename is results/microsoft_edge_cookie.json
-[x]: Get 54 history, filename is results/microsoft_edge_history.json
-[x]: Get 1 passwords, filename is results/microsoft_edge_password.json
-[x]: Get 4 bookmarks, filename is results/microsoft_edge_bookmark.json
-[x]: Get 6 bookmarks, filename is results/360speed_bookmark.json
-[x]: Get 19 cookies, filename is results/360speed_cookie.json
-[x]: Get 18 history, filename is results/360speed_history.json
-[x]: Get 1 passwords, filename is results/360speed_password.json
-[x]: Get 12 history, filename is results/qq_history.json
-[x]: Get 1 passwords, filename is results/qq_password.json
-[x]: Get 12 bookmarks, filename is results/qq_bookmark.json
-[x]: Get 14 cookies, filename is results/qq_cookie.json
-[x]: Get 28 bookmarks, filename is results/firefox_bookmark.json
-[x]: Get 10 cookies, filename is results/firefox_cookie.json
-[x]: Get 33 history, filename is results/firefox_history.json
-[x]: Get 1 passwords, filename is results/firefox_password.json
-[x]: Get 1 passwords, filename is results/chrome_password.json
-[x]: Get 4 bookmarks, filename is results/chrome_bookmark.json
-[x]: Get 6 cookies, filename is results/chrome_cookie.json
-[x]: Get 6 history, filename is results/chrome_history.json
-[x]: Compress success, zip filename is results/archive.zip
+ --verbose, --vv verbose (default: false)
+ --compress, --zip compress result to zip (default: false)
+ --browser value, -b value available browsers: all|chrome|opera-gx|vivaldi|coccoc|brave|edge|chromium|chrome-beta|opera|yandex|firefox (default: "all")
+ --results-dir value, --dir value export dir (default: "results")
+ --format value, -f value file name csv|json (default: "csv")
+ --profile-path value, -p value custom profile dir path, get with chrome://version
+ --help, -h show help (default: false)
+ --version, -v print the version (default: false)
+
+
+PS C:\test> .\hack-browser-data.exe -b all -f json --dir results -zip
+[NOTICE] [browser.go:46,pickChromium] find browser Chrome success
+[NOTICE] [browser.go:46,pickChromium] find browser Microsoft Edge success
+[NOTICE] [browsingdata.go:59,Output] output to file results/microsoft_edge_download.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/microsoft_edge_password.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/microsoft_edge_creditcard.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/microsoft_edge_bookmark.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/microsoft_edge_cookie.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/microsoft_edge_history.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/chrome_history.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/chrome_download.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/chrome_password.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/chrome_creditcard.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/chrome_bookmark.json success
+[NOTICE] [browsingdata.go:59,Output] output to file results/chrome_cookie.json success
+
```
+### 基于此工具的一些其他项目
+[Sharp-HackBrowserData](https://github.com/S3cur3Th1sSh1t/Sharp-HackBrowserData)
+
+[Reflective-HackBrowserData](https://github.com/idiotc4t/Reflective-HackBrowserData)
+
+
## 项目相关
## 最近更新
+#### [v0.4.2] - 2022-05-01
+
+**更新**
+- 新增导出扩展
+- 新增设置控制台 log 日志的色彩
+- 文档添加 HackBrowserData 的 logo
+
#### [v0.4.1] - 2022-04-20
**更新**
-- 支持所有浏览器的导出本地存储
+- 支持所有浏览器导出 local storage
- 修复 firefox ans1 数据结构
- 修复 windows 平台上 chromium 密钥查找失败的问题
diff --git a/detail/Kunyu.md b/detail/Kunyu.md
index a5b678b..c294099 100644
--- a/detail/Kunyu.md
+++ b/detail/Kunyu.md
@@ -7,6 +7,7 @@
![Time](https://img.shields.io/badge/Join-20211122-green)
+中文文档 | [English](../README.md)
# 0x00 介绍
@@ -58,7 +59,7 @@ kunyu init --apikey --seebug
```
![](https://github.com/knownsec/Kunyu/raw/main/images/setinfo.png)
-初次使用需要通过ZoomEye登录凭证,才使用该工具进行信息收集。
+初次使用需要通过ZoomEye登录凭证,才使用该工具进行信息收集,目前ZoomEye注册用户每月赠送1w条查询额度,足够日常工作使用。
**ZoomEye访问地址:https://www.zoomeye.org/**
@@ -94,14 +95,17 @@ Global commands:
SearchDomain Domain name associated/subdomain search
EncodeHash Encryption method interface
HostCrash Host Header Scan hidden assets
+ show / Show can set options or Kunyu config
Seebug Search Seebug vulnerability information
set
# GShark [![Go Report Card](https://goreportcard.com/badge/github.com/madneal/gshark)](https://goreportcard.com/report/github.com/madneal/gshark)
-The project is based on go with vue to build a management system for sensitive information detection. This is the total fresh version, you can refer the [old version](https://github.com/madneal/gshark/blob/gin/OLD_README.md) here. For the full introduction of the new version, please refer [here](https://mp.weixin.qq.com/s/Yoo1DdC2lCtqOMAreF9K0w).
+项目基于 Go 以及 Vue 搭建的敏感信息检测管理系统。关于的完整介绍请参考[这里](https://mp.weixin.qq.com/s/Yoo1DdC2lCtqOMAreF9K0w)。
+# 特性
-# Features
+* 支持多个搜索平台,包括 Github,Gitlab(不稳定支持),Searchcode
+* 灵活的菜单以及 API 权限管理
+* 灵活的规则以及过滤规则设置
+* 支持 gobuster 作为子域名爆破的支持
+* 方便易用
-* Support multi platform, including Gitlab, Github, Searchcode
-* Flexible menu and API permission setting
-* Flexible rules and filter rules
-* Utilize gobuster to brute force subdomain
-* Easily used management system
-
-# Quick start
+# 快速开始
![GShark](https://user-images.githubusercontent.com/12164075/114326875-58e1da80-9b69-11eb-82a5-b2e3751a2304.png)
-## Deployment
+## 部署
-For the deployment, it's suggested to install nginx. Place the `dist` folder under `html`, modify the `nginx.conf` to reverse proxy the backend service. I have also made a video for the deployment in [bilibili](https://www.bilibili.com/video/BV1Py4y1s7ap/) and [youtube](https://youtu.be/bFrKm5t4M54). For the deploment in windows, refer [here](https://www.bilibili.com/video/BV1CA411L7ux/).
+建议通过 nginx 部署前端项目。 将 `dist` 文件夹放在 `/var/www/html`下,修改 `nginx.conf` 来反向代理后端服务。在[bilibili](https://www.bilibili.com/video/BV1Py4y1s7ap/) 和 [youtube](https://youtu.be/bFrKm5t4M54) 可以参考部署视频教程。 Windows 下的部署请参考[这里](https://www.bilibili.com/video/BV1CA411L7ux/)。
```
location /api/ {
@@ -40,23 +45,23 @@ proxy_pass http://127.0.0.1:8888;
}
```
-The deployment work is very easy. Find the corresponding binary zip file from [releases](https://github.com/madneal/gshark/releases). Unzip and run. Remember to copy the files inside `dist` to `html` folder of nginx.
+部署工作非常简单。 从 [releases](https://github.com/madneal/gshark/releases) 中找到对应的版本 zip 文件。 解压后得将 `dist` 中的文件复制到 `/var/www/html` 文件夹中。
-### Web service
+### Web 服务
```
./gshark web
```
-### Scan service
+### 扫描服务
```
./gshark scan
```
-## Development
+## 开发
-### Server side
+### 服务端
```
git clone https://github.com/madneal/gshark.git
@@ -72,7 +77,7 @@ go build
./gshark web
```
-If you want to set up the scan service, please run:
+启动扫描服务:
```
./gshark scan
@@ -80,7 +85,7 @@ If you want to set up the scan service, please run:
-### Web side
+### Web 端
```
cd ../web
@@ -90,7 +95,7 @@ npm install
npm run serve
```
-## Run
+## 运行
```
USAGE:
@@ -110,12 +115,35 @@ GLOBAL OPTIONS:
--version, -v print the version
```
-### Add Token
+### 添加 Token
-To execute `./gshark scan`, you need to add a Github token for crawl information in github. You can generate a token in [tokens](https://github.com/settings/tokens). Most access scopes are enough. For Gitlab search, remember to add token too.
+执行扫描任务需要在 Github 的 Github token。你可以在 [tokens](https://github.com/settings/tokens) 中生成令牌,只需要 public_repo 的读权限即可。对于 Gitlab 扫描,请记得添加令牌。
[![iR2TMt.md.png](https://s1.ax1x.com/2018/10/31/iR2TMt.md.png)](https://imgchr.com/i/iR2TMt)
+## FAQ
+
+1. 默认登录的用户名密码(**及时修改**):
+
+gshark/gshark
+
+2. 数据库初始化失败
+
+确保数据库 mysql 版本高于 5.6。如果是第二次初始化的时候记得移除第一次初始化产生的实例。
+
+3. `go get ./... connection error`
+
+[使用 GOPROXY](https://madneal.com/post/gproxy/:
+
+```
+go env -w GOPROXY=https://goproxy.cn,direct
+go env -w GO111MODULE=on
+```
+4. 部署前端项目后,页面空白
+
+尝试清除 LocalStorage
+
+
## 项目相关
@@ -123,6 +151,23 @@ To execute `./gshark scan`, you need to add a Github token for crawl information
## 最近更新
+#### [v0.9.6] - 2022-05-04
+
+**新增**
+- 增加 DNS 内置模块进行子域名爆破
+- 前端增加 domian 类型
+- 调整登录页样式
+- 增加中文 README
+- 增加 sql.md,用于增量部署
+
+**修复**
+- 修复保存时的数据库报错
+- 修复未发送消息提醒的问题
+- 修复未处理结果重复保存的问题
+
+**优化**
+- 简化 token 的数据结构
+
#### [v0.9.3] - 2022-04-14
**更新**
diff --git a/detail/veinmind-tools.md b/detail/veinmind-tools.md
index 60810fe..5c3d8fe 100644
--- a/detail/veinmind-tools.md
+++ b/detail/veinmind-tools.md
@@ -3,24 +3,47 @@
![Language](https://img.shields.io/badge/Language-Golang/Python-blue)
![Author](https://img.shields.io/badge/Author-长亭科技-orange)
![GitHub stars](https://img.shields.io/github/stars/chaitin/veinmind-tools.svg?style=flat&logo=github)
-![Version](https://img.shields.io/badge/Version-V1.2.0-red)
+![Version](https://img.shields.io/badge/Version-V1.2.2-red)
![Time](https://img.shields.io/badge/Join-20220316-green)
veinmind-tools 是由长亭科技自研,基于veinmind-sdk打造的容器安全工具集
## 🔥 Demo
-![](https://dinfinite.oss-cn-beijing.aliyuncs.com/image/20220307110440.gif)
+![](https://dinfinite.oss-cn-beijing.aliyuncs.com/image/20220415144819.gif)
+
+
+## 🕹️ 快速开始
+### 1. 确保机器上正确安装 docker
+```
+docker info
+```
+### 2. 安装 [veinmind-runner](https://github.com/chaitin/veinmind-tools/tree/master/veinmind-runner) 镜像
+```
+docker pull veinmind/veinmind-runner:latest
+```
+### 3. 下载 [veinmind-runner](https://github.com/chaitin/veinmind-tools/tree/master/veinmind-runner) 平行容器启动脚本
+```
+wget -q https://download.veinmind.tech/scripts/veinmind-runner-parallel-container-run.sh -O run.sh && chmod +x run.sh
+```
+### 4. 快速扫描本地镜像
+```
+./run.sh scan-host
+```
+
## 🔨 工具列表
| 工具 | 功能 |
|---|---|
+| [veinmind-runner](https://github.com/chaitin/veinmind-tools/tree/master/veinmind-runner) | 扫描工具运行宿主 |
| [veinmind-malicious](https://github.com/chaitin/veinmind-tools/tree/master/veinmind-malicious) | 扫描镜像中的恶意文件 |
| [veinmind-weakpass](https://github.com/chaitin/veinmind-tools/tree/master/veinmind-weakpass) | 扫描镜像中的弱口令 |
| [veinmind-sensitive](https://github.com/chaitin/veinmind-tools/tree/master/veinmind-sensitive) | 扫描镜像中的敏感信息 |
| [veinmind-backdoor](https://github.com/chaitin/veinmind-tools/tree/master/veinmind-backdoor) | 扫描镜像中的后门 |
| [veinmind-history](https://github.com/chaitin/veinmind-tools/tree/master/veinmind-history) | 扫描镜像中的异常历史命令 |
+
+PS: 目前所有工具均已支持平行容器的方式运行
@@ -29,6 +52,12 @@ veinmind-tools 是由长亭科技自研,基于