Summery:
- Main tools
- Protocol
- MITM
- Packet analyse
- Tools
- Priv Esc
- Post-Exploit
- AD
- Network
- Reverse shell
- Password Cracking
- System upgrade
Alias: spm = sudo pacman
spm -S nmap
Nmap doc:
Check nmap privilege:
getcap $(which nmap)
Set nmap privilege:
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which nmap)
Check nmap privilege:
getcap $(which nmap)
Add to shell alise:
alias nmap="nmap --privileged"
spm -S exploitdb
yay ftpmap
cd /usr/share
sudo git clone https://github.com/arthepsy/ssh-audit.git
spm -S bind-tools
yay dnsrecon
spm -S net-snmp
spm -S smbmap
spm -S smbclient
spm -S nikto
spm -S dirsearch
spm -S wpscan
yay cmsmap
spm -S curl
spm -S gobuster
spm -S zaproxy
cd /usr/share
sudo git clone https://github.com/commixproject/commix.git
spm -S skipfish
spm -S sslscan
spm -S burpsuite
https://webkul.com/blog/burp-suite-installation-process-for-mozilla-firefox/
yay aquatone
spm -S wfuzz
spm -S mysql-clients
spm -S sqlmap
yay sipvicious
yay realvnc-vnc-viewer
spm -S vncrack
spm -S sslsplit
spm -S responder
Grabs passwords and other data from pcaps/network streams.
yay -S dsniff
yay visual-studio-code-bin
spm -S tor
yay tor-browser
cd /tmp
git clone https://aur.archlinux.org/tor-browser.git
cd tor-browser
gpg --recv-keys EB774491D9FF06E2
makepkg -si
tor-browser -u
Check tor
https://check.torproject.org/
A script to make Tor Network your default gateway
cd /tmp
git clone https://github.com/GouveaHeitor/nipe
sudo cpan install Switch JSON LWP::UserAgent Config::Simple Config::Simple
sudo cp -r /tmp/nipe /usr/share/
cd /usr/share/nipe
perl nipe.pl install
reboot
Examples:
perl nipe.pl start
perl nipe.pl stop
perl nipe.pl restart
perl nipe.pl status
cvs converter
yay csvkit
spm -S openvpn
spm -S flameshot
wget https://raw.githubusercontent.com/xMilkPowderx/OSCP/master/Linux%20Priv%20Esc.md
wget https://raw.githubusercontent.com/xMilkPowderx/OSCP/master/Windows%20Priv%20Esc.md
cd /usr/share
sudo git clone https://github.com/xymn/wce
or http://www.ampliasecurity.com/research/wce_v1_42beta_x32.zip http://www.ampliasecurity.com/research/wce_v1_42beta_x64.zip
// copy all to
sudo mkdir /usr/share/wce
sudo cp /home/bob/Downloads/wce.exe mkdir /usr/share/wce/wce_x64.exe
sudo cp /home/bob/Downloads/wce_v1_42beta_x32/* /usr/share/wce/
cd /tmp
mkdir mimikatz_trunk
cd mimikatz_trunk
wget https://github.com/gentilkiwi/mimikatz/releases/download/2.2.0-20190720/mimikatz_trunk.zip
unzip mimikatz_trunk.zip
rm mimikatz_trunk.zip
cd ..
sudo mv mimikatz_trunk /usr/share/mimikatz
Download script
wget https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1
Do some obfuscation
sed -i -e 's/Invoke-Mimikatz/Invoke-Mimidogz/g' Invoke-Mimikatz.ps1
sed -i -e '/<#/,/#>/c\\' Invoke-Mimikatz.ps1
sed -i -e 's/^[[:space:]]*#.*$//g' Invoke-Mimikatz.ps1
sed -i -e 's/DumpCreds/DumpCred/g' Invoke-Mimikatz.ps1
sed -i -e 's/ArgumentPtr/NotTodayPal/g' Invoke-Mimikatz.ps1
sed -i -e 's/CallDllMainSC1/ThisIsNotTheStringYouAreLookingFor/g' Invoke-Mimikatz.ps1
sed -i -e "s/\-Win32Functions \$Win32Functions$/\-Win32Functions \$Win32Functions #\-/g" Invoke-Mimikatz.ps1
sed -i -e 's/ArgumentPtr/BirdIsTheWord/g' Invoke-Mimikatz.ps1
sed -i -e 's/CallDllMainSC1/UnceUnceUnce/g' Invoke-Mimikatz.ps1
yay kerbrute
spm -S patator
spm -S wireshark-qt
sudo usermod -a -G wireshark bob
yay -S Yersinia vlan screen arp-scan bc dmidecode
cd /usr/share
git clone https://github.com/nccgroup/vlan-hopping.git
cd vlan-hopping
chmod +x frogger.sh
sudo ./frogger.sh
cd /usr/share
sudo git clone https://github.com/samratashok/nishang.git
# spm -S python-argcomplete
git clone https://github.com/0x00-0x00/shellpop
sudo python2 setup.py install
sudo pip install pyperclip argcomplete
yay -S nbtool
yay unicorn-powershell
spm -S john
spm -S seclists