Supported services for extracting internet exposures: * API Gatewayįrom studying Open API documentation on RESTful AWS endpoints we determined these are the patterns of exposure URIs that you may find in AWS accounts. noraj improved template v1 (UNLICENSED).whoisflynn improved template v3.2 (UNLICENSED).Official Offensive Security Template v1 (UNLICENSED).Official Offensive Security Template v1.Well rendering color sets you can use in the template YAML frontmatter: titlepage-color You can change the code syntax highlight theme with -highlight-style. from markdown+yaml_metadata_block+raw_html \ o output/OSCP-OS-XXXXX-Exam-Report.pdf \ Generate the report PDF from the markdown template: pandoc src/OSCP-exam-report-template_whoisflynn_v3.2.md \ Let you choose the syntax highlight style.Ubuntu: apt install texlive-full pandoc p7zip-full.openSUSE: zypper in texlive-scheme-medium pandoc p7zip-full.ArchLinux: pacman -S texlive-most pandoc p7zip.p7zip (if you want to use the script, for generating the archive). TeX Live) in order to get pdflatex or xelatex You can copy-paste the agent folder from server to server for easy setup.Create a folder wordlist and rule and put there your favorite wordlist and rules."Options": "-quiet -status -status-timer=1 -machine-readable -logfile-disable -restore-disable -outfile-format=2" "RepeatedStringsBeforeKill": 100, //defaut 1000 strings "SilencePeriodBeforeKill": 5, //default - 60 minutes "Path": "/home/admin/Kraker/agent/Kracker.App/bin/Release/net5.0/hashcat/hashcat.bin", //hashcat path Modify appsettings.json in Kracker.App/bin/Release/net5.0 and put ServerURL and Hashcat.Path like:.You need to download hashcat from the official page at, unpack it into the agent's folder.After that in Kracker.App/bin/Release/net5.0 folder you will get the built project. To compile agent from source code, go to agent folder and run the next command: dotnet build -configuration Release.Sudo apt-get install -y apt-transport-https NET Core 5, which can be downloaded from the following link: The agent is responsible for performing brute-force tasks that it receives from the server.įor the agent to work on the host, you need to install. NET Core 5 and works on any OS where this framework is available - Linux, Windows, MacOS (not tested yet). Navigate the server IP address and enter the next credentials: Sudo docker-compose exec app php artisan db:seed -class=UserSeeder Sudo docker-compose exec app php artisan db:seed -class=HashtypeSeeder Sudo docker-compose exec app php artisan migrate Sudo docker-compose exec app php artisan key:generate Sudo docker-compose exec app composer install Sudo chmod +x /usr/local/bin/docker-compose Sudo curl -L "$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose Server is written on Laravel and provides a web interface for creating brute force tasks and also serves for managing agents. You always can download a Release that is already built and run it. Here you can find a manual on how to setup your own server, build an agent from the source and run it. No liability and are not responsible for any misuse or damage caused. To obey all applicable local, state and federal laws. Legal disclaimer: Usage of godehashed for attacking targets without Godehashed -s phone -i apikey.txt -p "phonenumber" -o leaks.csv Godehashed -s name -i apikey.txt -n "Name" -o leaks.csv Godehashed -s username -i apikey.txt -u USERNAME -o leaks.csv Godehashed -s list -e email -i apikey.txt -l list.txt -o leaks.csv Godehashed -s email -i apikey.txt -e -o leaks.csv Specify what we are searching for: "name", "email", "phone", "username" or "list". Outfile file name, will output in CSV Format. godehashed -s email -i apikey.txt -e SOMEDOMAIN -o leaks.csv Godehashed Usage(): To install the tool in CLI run the following command. Results can then be compiled into a CSV for further analysis. A golang tool that uses the API to search for compromised assets.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |