s1l3nt78
The Dead Bunny Club
Because enumeration is key
- Potatoes - Used for Privilege elevation on a low level session on a target machine
- SweetPotatoes
- BadPotatoes
- Spiderfoot - Integrates mulpitple tool & data snslysis sources, making that data easy to navigate from an HTTP panel.
- Intrigue-Core - Automation & orchestration framework geared towards data collection & Attack Surface Mapping
- ODIN - Key feature is the data management and reporting.
'--> Database can be converted into an HTML report or a Neo4j graph database for visualizing the data.
- SubFinder - Sub-Directory enumeration tool
- reNgine - Automated reconnaissance framework for gathering information web applications.
- Pulsar - Automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters.
- Airgeddon - WiFi Security ToolKit
- Anonsurf - Added to Anonymise your system while running recon or OSINT tasks
Sifter is a osint, recon & vulnerability scanner. It combines a plethara
of tools within different module sets in order to quickly perform recon tasks,
check network firewalling, enumerate remote and local hosts, and scan for the 'blue'
vulnerabilities within microsft and if unpatched, exploit them. It uses tools like
blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM.
Gathered info is saved to the results folder, these output files can be easily parsed over to TigerShark
in order to be utilised within your campaign. Or compiled for a final report to wrap up a penetration test.
Setup Video
Demo Video - Its long, but you can skip through to get the general idea.
Most modules are explained along with demos of a lot of the tools
- theHarvester
- Osmedeus
- ReconSpider
- CredNinja
- OSINT-Framework
- ActiveReign
- iSpy
- SMBGhost
-- SMBGhost Scanner
-- SMBGhost Exploit
- EoP Exploit (Privilege Escalation Exploit)
- Omega
- WinPwn
- CredHarvester
- PowerSharp
- ACLight2
- PowerHub
- InveighZero
- SweetPotato
- BadPotato
+ FuzzyDander - Equation Group, Courtesy of the Shadow Brokers
(Obtained through issue request.)
- FuzzBunch
- Danderspritz
+ NevrrMore - Private Exploitation framework I've been developing that will
not be released opensource. Due to certain 0days and other exploits/tools
it would cause too much unintentional/illintentioned damage.
+ TigerShark
- Nmap
- AttackSurfaceMapper
- aSnip
- wafw00f
- Arp-Scan
- Espionage
- Intrigue-Core
- RouterSploit
- MkCheck
- Airgeddon
- Flan
- Rapidscan
- Yuki-Chan
- KatanaFramework
- OWASP-Nettacker
- Nikto
- Blackwidow
- Wordpress
--- WPScan
--- WPForce/Yertle
- Zeus-Scanner
- Dirb
- DorksEye
- This was added in order to have a fun way to pass time
during the more time intensive modules.
Such as nMap Full Port scan or a RapidScan run.
$ sifter runs the programs bringing up the menu in a cli environment
$ sifter -c will check the existing hosts in the hostlist
$ sifter -a 'target-ip' appends the hostname/IP to host file
$ sifter -m Opens the Main Module menu
$ sifter -q Opens Router Focused Tools
$ sifter -e Opens the Exploitation Modules
$ sifter -i Opens the Info-based Module menu
$ sifter -d Opens the Domain Focused Modules
$ sifter -n Opens the Network Mapping Modules menu
$ sifter -w Opens the Website Focused Modules
$ sifter -b Opens the Web-App Focused Module menu
$ sifter -p opens the passtools for passlist generation or hash decryption
$ sifter -v Opens the Vulnerability Scanning Module Menu
$ sifter -r Opens the results folder for easy viewing of all saved results
$ sifter --stealth Starts Sifter in Anonymous Mode.
$ sifter -u Checks for/and installs updates
$ sifter -h This Help Menu
All information on projects in development can be found here.
For any requests or ideas on current projects please submit an issue request to the corresponding tool.
For ideas or collaboration requests on future projects., contact details can be found on the page.
GitHub Pages can be found here.
- MkCheck = MikroTik Router Exploitation Tool
- TigerShark = Multi-Tooled Phishing Framework
############# VGhlIERlYWQgQnVubnkgQ2x1Yg== #############