Miscellaneous Tools Flashcards
SearchSploit
a command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database and search it offline.
PowerSploit
a series of Microsoft PowerShell scripts that can be used in post-exploitation scenarios during authorized penetration tests.
Responder
a Link Local Multicast Name Resolution (LLMNR), NBT-NS, and MDNS poisoner.
Impacket tools
an open source collection of modules written in Python for programmatically constructing and manipulating network protocols. Impacket contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks.
Empire
implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework.
Metasploit
a pentesting framework that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
mitm6
a pentesting tool that exploits the default configuration of Windows to take over the default DNS server.
CrackMapExec
Python-based post-exploitation tool, CrackMapExec is used by adversaries and penetration tests to gain remote access to protected servers. It can be used to abuse Windows Management Instrumentation (WMI) for execution of malicious commands and payloads.
TruffleHog
search source code repositories for high entropy strings that can represent git secrets.
Censys
provides a 360-degree depiction of an organization’s Internet attack surface.