Wednesday, 9 October 2013

[Smbexec v2.0] A rapid tool based on psexec style attack with samba tools


A rapid tool based on psexec style attack with samba tools.

Key features
  • Enumerate systems with domain admin logged in
  • Grab hashes
  • Extract cached creds (based on cachedump)
  • Remote Login Validation
  • Dump cleartext credentials
  • Pop shells
Includes
  • smbexec.sh
  • installer.sh
  • patches to compile binaries
  • source for samba-3.6.9 and winexe-1.00
Credit where credit is due:

[WFacebook] Facebook Password Cracker


Facebook Password Cracker.

Video:

[PoshSec Framework v0.2] Graphical Interface for Powershell scripts


The PoshSec Framework is a tool that is designed to provide a graphical interface for powershell scripts, functions, modules, and cmdlets.

It allows the community to write scripts that can interact with the interface by providing alerts, and output directly from their powershell scripts. This framework can be used for offensive, defensive, or simply system administrative tasks.

The PoshSec Framework is not merely a defense tool. It can be used for offense, defense, and even system administration. The whole idea is to give people a tool for powershell that isn’t just a command line. The roadmap is to add graphs, a dashboard, scheduling, reporting, etc. This is a very active project and I encourage you to download it and see what it can do for you. The sky is the limit. This project is not the sum of it’s code. It’s the sum of what the community wants to invest into it.

PoshSec video

Read more here about PoshSec

Wednesday, 2 October 2013

[jSQL Injection v0.5] Java tool for automatic database injection


jSQL Injection is a lightweight application used to find database information from a distant server.

jSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris).

jSQL Injection change log - version 0.5

0.5
  • SQL shell
  • Uploader
0.4
  • Admin page checker and preview
  • Brute forcer (md5 mysql...)
  • Coder (encode decode base64 hex md5...)
0.3
  • Distant file reading
  • Webshell deposit
  • Terminal for webshell commands
  • Configuration backup
  • Update checker
0.2
  • Time based algorithm
  • Multi-thread control (start/pause/resume/stop)
  • Shows URL calls
0.0 and 0.1
  • GET, POST, header, cookie methods
  • Normal, error based, blind algorithms
  • Automatic best algorithm selection
  • Progression bars
  • Simple evasion
  • Proxy setting
  • Supports MySQL 

[Matriux Leandros v3.0 rc1] The pentesting distrib (Now added Blackhat Arsenal 2013 Tools)


Matriux is a Debian-based security distribution designed for penetration testing and forensic investigations. Although it is primarily designed for security enthusiasts and professionals, it can also be used by any Linux user as a desktop system for day-to-day computing. Besides standard Debian software, Matriux also ships with an optimised GNOME desktop interface, over 340 open-source tools for penetration testing, and a custom-built Linux kernel.

Matriux was first released in 2009 under code name “lithium” and then followed by versions like “xenon” based on Ubuntu. Matriux “Krypton” then followed in 2011 where we moved our system to Debian. Other versions followed for Matriux “Krypton” with v1.2 and then Ec-Centric in 2012. This year we are releasing Matriux “Leandros” RC1 on 2013-09-27 which is a major revamp over the existing system.


Matriux arsenal is divided into sections with a broader classification of tools for Reconnaissance, Scanning, Attack Tools, Frameworks, Radio (Wireless), Digital Forensics, Debuggers, Tracers, Fuzzers and other miscellaneous tool providing a wider approach over the steps followed for a complete penetration testing and forensic scenario. Although there are were many questions raised regarding why there is a need for another security distribution while there is already one. We believed and followed the free spirit of Linux in making one. We always tried to stay updated with the tool and hardware support and so include the latest tools and compile a custom kernel to stay abreast with the latest technologies in the field of information security. This version includes a latest section of tools PCI-DSS.

Matriux is also designed to run from a live environment like a CD/ DVD or USB stick which can be helpful in computer forensics and data recovery for forensic analysis, investigations and retrievals not only from Physical Hard drives but also from Solid state drives and NAND flashes used in smart phones like Android and iPhone. With Matriux Leandros we also support and work with the projects and tools that have been discontinued over time and also keep track with the latest tools and applications that have been developed and presented in the recent conferences.

Features (notable updates compared to Ec-Centric):

• Custom kernel 3.9.4 (patched with aufs, squashfs and xz filesystem mode, includes support for wide range of wireless drivers and hardware) Includes support for alfacard 0036NH
• USB persistent
• Easy integration with virtualbox and vmware player even in Live mode.
• MID has been updated to make it easy to install check http://www.youtube.com/watch?v=kWF4qRm37DI
• Includes latest tools introduced at Blackhat 2013 and Defcon 2013, Updated build until September 22 2013.
• UI inspired from Greek Mythology
• New Section Added PCI-DSS
• IPv6 tools included.

[Kvasir] Tools for effective data management during a Penetration Test


Welcome to Kvasir! Herein these directories lay the groundwork tools for effective data management during a Penetration Test.

Penetration tests can be data management nightmares because of the large amounts of information that is generally obtained. Vulnerability scanners return lots of actual and potential vulnerabilitites to review. Port scanners can return thousands of ports for just a few hosts. How easy is it to share all this data with your co-workers?

That's what Kvasir is here to help you with. Here's what you'll need to get started:

  •     The latest version of web2py (http://www.web2py.com/)
  •     A database (PostgreSQL known to work)
  •     A network vulnerability scanner (Nexpose/Nmap supported)
  •     Additional python libraries

Kvasir is a web2py application and can be installed for each customer or task. This design keeps data separated and from you accidentally attacking or reviewing other customers.

This tool was developed primarily for the Cisco Systems Advanced Services Security Posture Assessment (SPA) team. While not every method used by the SPA team may directly relate we hope that this tool is something that can be molded and adapted to fit almost any working scenario.

[Hook Analyser v2.6] Application (and Malware) Analysis tool


Application (and Malware) Analysis tool. Hook Analyser is a hook tool which could be potentially helpful in reversing application and analysing malwares.

Changelog v2.6

  • Added new signatures (and removed redundant ones)
  • Bug fixes – Many thanks for community users to reporting them.
  • Fixed start-up error.
More Information: