Windows

ghba

ghba is a PTR record (reverse DNS) scanner. It is a Golang rewrite of ghba.c that runs much faster than the original ghba.c. It can scan an entire private class C network in under a minute if 32 threads are available.

Currently being updated/maintained both here and at https://git.hardenedbsd.org/SoldierX/ghba

Author(s): 
Blake
Version: 
1.00
Date: 
04-01-2024
Filename: 
Size: 
3.30KB
Requirements: 

go

Status: 
Inactive
Future Plans: 
None

Network Multitool

Hey all. This is my first project for SX. This is also my first full blown project coding in python. The goal of this project is to create an all in one tool that can be run from the command line (or somewhere down the line a front end) and be able to conduct all your networking, and website surveillance. This is an open beta and will have more iterations to come. You can see all the updates that come in for the tool here: https://www.soldierx.com/bbs/201704/Ongoing-SX-Networking-Project.

Tool is easy to run just download the tool, cd into the root of the folder, and run python tool.py. Currently working modules are The port Scanner, Hex to Dec converter, DNS lookup, Sub Domain Scanner, and the website link crawler.

Notes
For the sub domain scanner you enter the sub domains you want to scan for into the wordlist.txt file. Example: "login dev code".

GitHub:
https://github.com/Od01/Network-Multitool

Author(s): 
Od0_
Version: 
1.00 Alpha
Date: 
07-27-2017
Size: 
8.11KB
Status: 
Active
Future Plans: 
URL Fuzzer
GUI to replace command line interface

PassiveScanner

PassiveScanner is a script that uses free online services to passively enumerate and scan a domain's parameter, without actually touching the target network. The tool uses DNSDumpster to enumerate DNS information for a given domain and then checks the IPs against Zoomeye (Chinese shodan). Future versions of the tool will also incorporate Scans.io/Censys.io data as well as pull ip addresses from ASN information to also 'scan'.

Usage:
PassiveScanner -d targetdomain.com

Author(s): 
Ogma
Version: 
0.1-alpha
Date: 
01-01-2009
Filename: 
Size: 
4.00KB
Requirements: 

Python 2.7

pip install dnsdumpster

Status: 
Active
Future Plans: 
Expanding functionality to include Censys and enumeration of other hosts

OFACE

Openly
Facilitating
Accuracy
Consistency (and)
Efficiency

It's like MRI, but not owned by a bunch of jerks. It's a portal for computer repair tools.

"The quicker computer fixer upper"

Testing now available for VIP users.

OFACE itself (Released so that users can create WinPE thumbdrives that use it): http://entropy.soldierx.com/~amp/private/OFACEAlpha.zip
OFACE POC ISO (Updated September 29th, 2017): http://entropy.soldierx.com/~amp/private/OFACEAlphaISO.rar (Pass: sh0wh3ry0ur0f@c3)

Please report bugs that you find with the program in this thread.

Author(s): 
Amp
Version: 
0.2.8
Date: 
9-24-2017
Size: 
239616.00KB
Requirements: 

Windows 7 or newer. (Win PE 3 ISO and newer preferred)

Status: 
Active
Future Plans: 
Investigate various malware removal tools and determine what is worth adding
Investigate future features

RAPTORRDP

This is a series of software that will allow you to connect to your computers from anywhere in the world, without using an untrusted middleman or closed source commerical software that may have an intentional backdoor.

You can transfer files between client and host computers, and control host computers almost as if you were in front of it.

I also have one thing that most of the commercial vendors I looked at do not appear to have: a native HTML5 web interface for both the remote control client AND the file manager.

The software on windows works in the UAC enviroment thanks to the help of a C++ and java native interface (JNI) code i found on github..

The software with the exception of the Java UAC interface is written in python-2.7

Windows Apple El Capitan, and Linux are currently tested and working. BSD and Solaris should work.

Major changes have been made In version 8.5:

- Now supports Left click, right click, full mouse drag AND double click.
- The python native Remote control client "RAPTORV" has been rewritten.
- Some performance and speed changes have been made.
- DPI Issues with Microsoft Windows have been resolved (your screen will be displayed properly)
- Easy configure and build scripts are now included! (this program is a pain in the ass to build without these scripts)
- A list of requirements is shipped with the software.

IMPORTANT:

Due to size constraints i am unable to supply the entire library source i used for building the java "winsysi" (windows system interact) tool.

I have supplied my pre-built jars and the source code to winsysi.

the winrobot library can be found at: https://github.com/caoym/WinRobot

also, microsoft security essentals flags parts of the java library as a trojan, Malwarebytes and other vendors i use do not flag the software at all.

Author(s): 
r3q13m
Version: 
8.5
Date: 
6/25/2017
Filename: 
Size: 
1490.00KB
Requirements: 

Python-2.7

pywin32-220 (windows only)

twisted 15.0

autobahn 0.13.1

pygame-1.9.1

pillow-2.9.0

psutil-4.3.0

Tkinter

cxfreeze 4.3.2 (Windows)

cffi-1.6.0

cryptography-1.3.4

pyOpenSSL-16

Latest Java JRE (windows)

homebrew (Apple)

brew python2.7.x (Apple)

Xcode (Apple)

PyAutoGUI 0.9.33 (ALL)

pyobjc-2.51 or above (Apple)

pyinstaller-3.2 (Apple, Linux, Unix)

Status: 
Active
Future Plans: 
Fix bugs based on user feedback
Audio support

VulnTrack

VulnTrack monitors the nist vulnerability feed and compares it against your config file. When patterns are match based on your configuration, VulnTrack alerts you by email and/or desktop notification. Vulntrack also checks exploit-db.com for the existence of exploits for a matched vulnerability and checks against exploits that don't have an associated CVE. Useful for being notified about vulnerabilities in network appliances and other things that might not fall into your normal patch management routine. Also useful for profiling a network on a pentest to be notified if vulnerabilities related to that network are publicized during the engagement.

A few things to note:
* In version 1.1 VulnTrack-gtk has been replaced with vulntrack-cli, which is works on both Windows and Linux
* Still need to work out some issues with alerting.
* Acknowledge acknowledges you've seen the vulnerability and it won't show up anymore, however it still is in the database.
* Remove deletes the vulnerability from the database.
* Vulnerabilities with an exploit available are listed in red text
* The database comes pre populated with all exploits from 2017 to 4/24/19

Author(s): 
Ogma
Version: 
1.1
Date: 
4-25-19
Size: 
278.00KB
Requirements: 

python2.7

Status: 
Active
Future Plans: 
Add module to scan installed packages and build a config file automatically
Curses command line interface

Mirage Disk Image

This is a Python-2.7 version of "DD" i wrote maybe about 2 years ago and dug up recently. It can make a backup of both windows and linux machines and it can also do "Hot" imaging, meaning it can backup a system while running.

Author(s): 
r3q13m
Version: 
1.0
Date: 
06-26-2016
Filename: 
Size: 
0.86KB
Requirements: 

python == 2.7

pywin32 >= 220

Status: 
Inactive

wdivulge

wdivulge is a tool designed to find and download hidden files from a webserver. This is most commonly pictures, but you can adjust the file definitions to bruteforce any type of file that you'd like. wdivulge technically falls under the definition of a web fusker. The latest version supports socks proxies (including TOR) and custom user agents for better anonymity.

Please see the README.txt file for instructions on how to use it. Special thanks to cisc0ninja for testing this application and writing the original README file.

Please post bugs or suggestions to this thread.

Author(s): 
Blake
Version: 
0.2.0
Date: 
06-17-2013
Filename: 
Size: 
27.00KB
Requirements: 

Perl

LWP::UserAgent

LWP::Protocol::socks

Status: 
Active
Future Plans: 
Directory bruteforcing

Stream Inspector

This is a code library + example .exe that will detect a file type based on the contents of the file by using "magic bytes".

Magic bytes reference:
http://en.wikipedia.org/wiki/File_format#Magic_number

CODE LIBRARY
The code library is intended to be used in other applications (such as network sniffers to detect file transfers on the wire). It is flexible enough to add new signatures post-compile via adding them to the Resources\SimpleDefinitions.txt.

The code library is in the StreamInspector.dll

EXAMPLE EXE
To see the library in action I created a very simple (5 minute) application that lets you select a file and attempts to identify what type of file it is based on the contents.

The example exe is the FileInspector.exe

LINUX/UNIX
Not sure why you're even reading this, just use the "File" command
http://linux.about.com/library/cmd/blcmdl1_file.htm

NOTE

Author(s): 
Kayin
Version: 
0.1
Date: 
08-18-2011
Filename: 
Size: 
12.00KB
Requirements: 

.NET 4

Status: 
Active
Future Plans: 
Utilize the same definitions that the unix "File" app uses.
Add more file type signatures.

DES_GEN - DES Cracker (Dictionary Based Brute Force)

DES_GEN was written as a POC for a specific application that shall remain anonymous several months ago.

The belief at the company was that cracking DES requires custom hardware (See EFF's US$250,000 DES cracking machine) so the vendor refused to update to newer methods of password storage.

Here's a single threaded x86 based slap in the face for that company written in perl none the less - yes a dictionary file and some fairly weak mutations cracked your root password in 46 minutes.

I'm not sure if anyone will get any use out of this, but here it is.

--If there is enough interest in updates or future releases Threading and CUDA support may be added. Cheers.

Author(s): 
EverestX
Version: 
B4_POC
Date: 
8/2011
Filename: 
Size: 
2.60KB
Requirements: 

Perl, Word list, DES

Status: 
Inactive
Syndicate content