<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    一鍵自動部署滲透工具

    VSole2021-11-02 08:07:10

    背景介紹:


    如果你有一臺VPS,或者對Kali-Linux諸多的工具搞的頭暈眼花,想要在自己搭建的Linux虛擬機中快速部署一些好用的滲透工具,那么本篇文章也許可以幫到你。

    操作系統支持:

    • Ubuntu 20.04 x64
    • Debian 10 x64

    工具列表(基本均來自Github):

    子域名枚舉


    • Amass
    • Assetfinder
    • Crobat
    • Findomain
    • Github-subdomains

    DNS解析器


    • dnsx
    • MassDNS
    • PureDNS

    視覺偵察


    • Aquatone
    • Gowitness

    HTTP 探測


    • httprobe
    • httpx

    網絡爬蟲


    • Gospider
    • Hakrawler

    網絡掃描儀


    • Masscan
    • Naabu
    • Nmap

    HTTP 參數


    • Arjun

    模糊測試工具-fuzzing


    • ffuf
    • Gobuster

    SSRF工具


    • SSRFmap *
    • Gopherus *
    • Interactsh *

    API 黑客工具


    • Kiterunner + API routes *

    密碼字典列表


    • SecLists

    漏洞 – XSS


    • Dalfox
    • kxss
    • XSStrike

    漏洞 – SQL 注入


    • NoSQLMap
    • SQLMap

    CMS掃描儀


    • WPscan *
    • droopescan *
    • AEM-Hacker *

    漏洞掃描器


    • Jaeles
    • Nuclei

    JavaScript 搜索


    • LinkFinder
    • SecretFinder
    • subjs

    有用的工具


    • anti-burl
    • getallurls
    • gron
    • anti-burl *
    • unfurl *
    • anew *
    • qsreplace *
    • Interlace
    • Tmux
    • Ripgrep

    一鍵安裝命令:

    apt-get update -y && apt-get install git -ycd /tmp && git clone https://github.com/supr4s/VPS-web-hacking-tools && cd VPS-web-hacking-tools && ./installer.sh
    

    installer.sh源碼:

    #!/bin/bash -i#Check if the script is executed with root privilegesif [ "$EUID" -ne 0 ]  then echo -e ${RED}"Please execute this script with root privileges !"  exitfi
    #Creating tools directory if not existsource ./.env && mkdir -p $TOOLS_DIRECTORY;clear;
    ENVIRONMENT () {  echo -e ${BLUE}"[ENVIRONMENT]" ${RED}"Packages required installation in progress ...";  #Check Operating System  OS=$(lsb_release -i 2> /dev/null | sed 's/:\t/:/' | cut -d ':' -f 2-)  if [ "$OS" == "Debian" ]; then    #Specific Debian    #chromium    apt-get update -y > /dev/null 2>&1 && apt-get install chromium -y > /dev/null 2>&1  elif [ "$OS" == "Ubuntu" ]; then    #Specific Ubuntu    #chromium          apt-get update -y > /dev/null 2>&1 && apt-get install chromium-browser -y > /dev/null 2>&1    #Bash colors    sed -i '/^#.*force_color_prompt/s/^#//' ~/.bashrc && source ~/.bashrc  else          echo "O.S unrecognized";          echo "End of the script";        exit  fiunset OS  #Generic fot both OS  #Python and some packages  apt-get install -y python python3 python3-pip unzip make gcc libpcap-dev curl build-essential libcurl4-openssl-dev libxml2 libxml2-dev libxslt1-dev ruby-dev ruby libgmp-dev zlib1g-dev > /dev/null 2>&1;  cd /tmp && curl https://bootstrap.pypa.io/pip/2.7/get-pip.py --output get-pip.py > /dev/null 2>&1 && python2 get-pip.py > /dev/null 2>&1;  echo -e ${BLUE}"[ENVIRONMENT]" ${GREEN}"Packages required installation is done !"; echo "";  #Golang  echo -e ${BLUE}"[ENVIRONMENT]" ${RED}"Golang environment installation in progress ...";  cd /tmp && curl -O https://dl.google.com/go/go$GOVER.linux-amd64.tar.gz > /dev/null 2>&1 && tar xvf go$GOVER.linux-amd64.tar.gz > /dev/null 2>&1 && mv go /usr/local && echo "export PATH=$PATH:/usr/local/go/bin" >> ~/.bashrc && source ~/.bashrc;  echo -e ${BLUE}"[ENVIRONMENT]" ${GREEN}"Golang environment installation is done !"; echo "";}
    SUBDOMAINS_ENUMERATION () {  #Subfinder  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${RED}"Subfinder installation in progress ...";  GO111MODULE=on go get -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder > /dev/null 2>&1 && ln -s ~/go/bin/subfinder /usr/local/bin/;  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${GREEN}"Subfinder installation is done !"; echo "";  #Assetfinder  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${RED}"Assetfinder installation in progress ...";  go get -u github.com/tomnomnom/assetfinder > /dev/null 2>&1 && ln -s ~/go/bin/assetfinder /usr/local/bin/;  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${GREEN}"Assetfinder installation is done !"; echo "";  #Findomain  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${RED}"Findomain installation in progress ...";  cd /tmp && wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-linux > /dev/null 2>&1 && chmod +x findomain-linux && mv ./findomain-linux /usr/local/bin/findomain;  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${GREEN}"Findomain installation is done !"; echo "";  #Github-subdomains  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${RED}"Github-subdomains installation in progress ...";  go get -u github.com/gwen001/github-subdomains > /dev/null 2>&1 && ln -s ~/go/bin/github-subdomains /usr/local/bin/;  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${GREEN}"Github-subdomains installation is done !"; echo "";  #Amass  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${RED}"Amass installation in progress ...";  cd /tmp && wget https://github.com/OWASP/Amass/releases/download/v$AMASSVER/amass_linux_amd64.zip > /dev/null 2>&1 && unzip amass_linux_amd64.zip > /dev/null 2>&1 && mv amass_linux_amd64/amass /usr/local/bin/;  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${GREEN}"Amass installation is done !"; echo "";  #Crobat  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${RED}"Crobat installation in progress ...";  go get github.com/cgboal/sonarsearch/crobat > /dev/null 2>&1 && ln -s ~/go/bin/crobat /usr/local/bin/;  echo -e ${BLUE}"[SUBDOMAINS ENUMERATION]" ${GREEN}"Crobat installation is done !"; echo "";}
    DNS_RESOLVER () {  #MassDNS  echo -e ${BLUE}"[DNS RESOLVER]" ${RED}"MassDNS installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/blechschmidt/massdns.git > /dev/null 2>&1 && cd massdns && make > /dev/null 2>&1 && ln -s $TOOLS_DIRECTORY/massdns/bin/massdns /usr/local/bin/;  echo -e ${BLUE}"[DNS RESOLVER]" ${GREEN}"MassDNS installation is done !"; echo "";  #dnsx  echo -e ${BLUE}"[DNS RESOLVER]" ${RED}"dnsx installation in progress ...";  GO111MODULE=on go get -v github.com/projectdiscovery/dnsx/cmd/dnsx > /dev/null 2>&1 && ln -s ~/go/bin/dnsx /usr/local/bin/;  echo -e ${BLUE}"[DNS RESOLVER]" ${GREEN}"dnsx installation is done !"; echo "";  #PureDNS  echo -e ${BLUE}"[DNS RESOLVER]" ${RED}"PureDNS installation in progress ...";  GO111MODULE=on go get github.com/d3mondev/puredns/v2 > /dev/null 2>&1 && ln -s ~/go/bin/puredns /usr/local/bin;  echo -e ${BLUE}"[DNS RESOLVER]" ${GREEN}"PureDNS installation is done !"; echo "";}
    VISUAL_RECON () {  #Aquatone  echo -e ${BLUE}"[VISUAL RECON]" ${RED}"Aquatone installation in progress ...";  cd /tmp && wget https://github.com/michenriksen/aquatone/releases/download/v$AQUATONEVER/aquatone_linux_amd64_$AQUATONEVER.zip > /dev/null 2>&1 && unzip aquatone_linux_amd64_$AQUATONEVER.zip > /dev/null 2>&1 && mv aquatone /usr/local/bin/;  echo -e ${BLUE}"[VISUAL RECON]" ${GREEN}"Aquatone installation is done !"; echo "";  #Gowitness  echo -e ${BLUE}"[VISUAL RECON]" ${RED}"Gowitness installation in progress ...";  cd /tmp && wget https://github.com/sensepost/gowitness/releases/download/$GOWITNESSVER/gowitness-$GOWITNESSVER-linux-amd64 > /dev/null 2>&1 && mv gowitness-$GOWITNESSVER-linux-amd64 /usr/local/bin/gowitness && chmod +x /usr/local/bin/gowitness;  echo -e ${BLUE}"[VISUAL RECON]" ${GREEN}"Gowitness installation is done !"; echo "";}
    HTTP_PROBE () {  #httpx  echo -e ${BLUE}"[HTTP PROBE]" ${RED}"httpx installation in progress ...";  GO111MODULE=on go get -v github.com/projectdiscovery/httpx/cmd/httpx > /dev/null 2>&1 && ln -s ~/go/bin/httpx /usr/local/bin/;  echo -e ${BLUE}"[HTTP PROBE]" ${GREEN}"Httpx installation is done !"; echo "";  #httprobe  echo -e ${BLUE}"[HTTP PROBE]" ${RED}"httprobe installation in progress ...";  go get -u github.com/tomnomnom/httprobe > /dev/null 2>&1 && ln -s ~/go/bin/httprobe /usr/local/bin/;  echo -e ${BLUE}"[HTTP PROBE]" ${GREEN}"httprobe installation is done !"; echo "";}
    WEB_CRAWLING () {  #Gospider  echo -e ${BLUE}"[WEB CRAWLING]" ${RED}"Gospider installation in progress ...";  go get -u github.com/jaeles-project/gospider > /dev/null 2>&1 && ln -s ~/go/bin/gospider /usr/local/bin/;  echo -e ${BLUE}"[WEB CRAWLING]" ${GREEN}"Gospider installation is done !"; echo "";  #Hakrawler  echo -e ${BLUE}"[WEB CRAWLING]" ${RED}"Hakrawler installation in progress ...";  go get github.com/hakluke/hakrawler > /dev/null 2>&1 && ln -s ~/go/bin/hakrawler /usr/local/bin/;  echo -e ${BLUE}"[WEB CRAWLING]" ${GREEN}"Hakrawler installation is done !"; echo "";}
    NETWORK_SCANNER () {  #Nmap  echo -e ${BLUE}"[NETWORK SCANNER]" ${RED}"Nmap installation in progress ...";  apt-get install nmap -y > /dev/null 2>&1;  echo -e ${BLUE}"[NETWORK SCANNER]" ${GREEN}"Nmap installation is done !"; echo "";  #masscan  echo -e ${BLUE}"[NETWORK SCANNER]" ${RED}"Masscan installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/robertdavidgraham/masscan > /dev/null 2>&1 && cd masscan && make > /dev/null 2>&1 && make install > /dev/null 2>&1 && mv bin/masscan /usr/local/bin/;  echo -e ${BLUE}"[NETWORK SCANNER]" ${GREEN}"Masscan installation is done !"; echo "";  #naabu  echo -e ${BLUE}"[NETWORK SCANNER]" ${RED}"Naabu installation in progress ...";  GO111MODULE=on go get -v github.com/projectdiscovery/naabu/v2/cmd/naabu > /dev/null 2>&1 && ln -s ~/go/bin/naabu /usr/local/bin/;  echo -e ${BLUE}"[NETWORK SCANNER]" ${GREEN}"Naabu installation is done !"; echo "";}
    HTTP_PARAMETER () {  #Arjun  echo -e ${BLUE}"[HTTP PARAMETER DISCOVERY]" ${RED}"Arjun installation in progress ...";  pip3 install arjun > /dev/null 2>&1;  echo -e ${BLUE}"[HTTP PARAMETER DISCOVERY]" ${GREEN}"Arjun installation is done !"; echo "";}
    FUZZING_TOOLS () {  #ffuf  echo -e ${BLUE}"[FUZZING TOOLS]" ${RED}"ffuf installation in progress ...";  go get -u github.com/ffuf/ffuf > /dev/null 2>&1 && ln -s ~/go/bin/ffuf /usr/local/bin/;  echo -e ${BLUE}"[FUZZING TOOLS]" ${GREEN}"ffuf installation is done !"; echo "";  #masscan  echo -e ${BLUE}"[FUZZING TOOLS]" ${RED}"Gobuster installation in progress ...";  go install github.com/OJ/gobuster/v3@latest > /dev/null 2>&1 && ln -s ~/go/bin/gobuster /usr/local/bin/;  echo -e ${BLUE}"[FUZZING TOOLS]" ${GREEN}"Gobuster installation is done !"; echo "";}
    SSRF_TOOLS () {  #SSRFmap  echo -e ${BLUE}"[SSRF TOOLS]" ${RED}"SSRFmap installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/swisskyrepo/SSRFmap > /dev/null 2>&1 && cd SSRFmap && pip3 install -r requirements.txt > /dev/null 2>&1;  echo -e ${BLUE}"[SSRF TOOLS]" ${GREEN}"SSRFmap installation is done !"; echo "";  #Gopherus  echo -e ${BLUE}"[SSRF TOOLS]" ${RED}"Gopherus installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/tarunkant/Gopherus.git > /dev/null 2>&1 && cd Gopherus && chmod +x install.sh && ./install.sh > /dev/null 2>&1;  echo -e ${BLUE}"[SSRF TOOLS]" ${GREEN}"Gopherus installation is done !"; echo "";  #Interactsh  echo -e ${BLUE}"[SSRF TOOLS]" ${RED}"Interactsh installation in progress ...";  GO111MODULE=on go get -v github.com/projectdiscovery/interactsh/cmd/interactsh-client > /dev/null 2>&1 && ln -s ~/go/bin/interactsh-client /usr/local/bin/;  echo -e ${BLUE}"[SSRF TOOLS]" ${GREEN}"Interactsh installation is done !"; echo "";}
    API_TOOLS () {  #Kiterunner  echo -e ${BLUE}"[API TOOLS]" ${RED}"Kiterunner installation in progress ...";  cd /tmp && wget https://github.com/assetnote/kiterunner/releases/download/v"$KITERUNNERVER"/kiterunner_"$KITERUNNERVER"_linux_amd64.tar.gz > /dev/null 2>&1 && tar xvf kiterunner_"$KITERUNNERVER"_linux_amd64.tar.gz > /dev/null 2>&1 && mv kr /usr/local/bin;  cd $TOOLS_DIRECTORY && mkdir -p kiterunner-wordlists && cd kiterunner-wordlists && wget https://wordlists-cdn.assetnote.io/data/kiterunner/routes-large.kite.tar.gz > /dev/null 2>&1 && wget https://wordlists-cdn.assetnote.io/data/kiterunner/routes-small.kite.tar.gz > /dev/null 2>&1 && for f in *.tar.gz; do tar xf "$f"; rm -Rf "$f"; done  echo -e ${BLUE}"[API TOOLS]" ${GREEN}"Kiterunner installation is done !"; echo "";}
    WORDLISTS () {  #SecLists  echo -e ${BLUE}"[WORDLISTS]" ${RED}"SecLists installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/danielmiessler/SecLists.git > /dev/null 2>&1;  echo -e ${BLUE}"[WORDLISTS]" ${GREEN}"SecLists installation is done !"; echo "";}
    VULNS_XSS () {  #Dalfox  echo -e ${BLUE}"[VULNERABILITY - XSS]" ${RED}"Dalfox installation in progress ...";  GO111MODULE=on go get -v github.com/hahwul/dalfox/v2 > /dev/null 2>&1 && ln -s ~/go/bin/dalfox /usr/local/bin/;  echo -e ${BLUE}"[VULNERABILITY - XSS]" ${GREEN}"Dalfox installation is done !"; echo "";  #XSStrike  echo -e ${BLUE}"[VULNERABILITY - XSS]" ${RED}"XSStrike installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/s0md3v/XSStrike > /dev/null 2>&1 && cd XSStrike && pip3 install -r requirements.txt > /dev/null 2>&1;  echo -e ${BLUE}"[VULNERABILITY - XSS]" ${GREEN}"XSStrike installation is done !"; echo "";  #kxss  echo -e ${BLUE}"[VULNERABILITY - XSS]" ${RED}"kxss installation in progress ...";  go get -u github.com/tomnomnom/hacks/kxss > /dev/null 2>&1 && ln -s ~/go/bin/kxss /usr/local/bin/;  echo -e ${BLUE}"[VULNERABILITY - XSS]" ${GREEN}"kxss installation is done !"; echo "";}
    VULNS_SQLI () {  #SQLmap  echo -e ${BLUE}"[VULNERABILITY - SQL Injection]" ${RED}"SQLMap installation in progress ...";  apt-get install -y sqlmap > /dev/null 2>&1  echo -e ${BLUE}"[VULNERABILITY - SQL Injection]" ${GREEN}"SQLMap installation is done !"; echo "";  #NoSQLMap  echo -e ${BLUE}"[VULNERABILITY - SQL Injection]" ${RED}"NoSQLMap installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/codingo/NoSQLMap.git > /dev/null 2>&1 && cd NoSQLMap && python setup.py install > /dev/null 2>&1;  echo -e ${BLUE}"[VULNERABILITY - SQL Injection]" ${GREEN}"NoSQLMap installation is done !"; echo "";}
    CMS_SCANNER () {  #WPScan  echo -e ${BLUE}"[CMS SCANNER]" ${RED}"WPScan  installation in progress ...";  gem install wpscan > /dev/null 2>&1;  echo -e ${BLUE}"[CMS SCANNER]" ${GREEN}"WPScan installation is done !"; echo "";  #Droopescan  echo -e ${BLUE}"[CMS SCANNER]" ${RED}"Droopescan installation in progress ...";  pip install droopescan > /dev/null 2>&1;  echo -e ${BLUE}"[CMS SCANNER]" ${GREEN}"Droopescan installation is done !"; echo "";  #AEM-Hacking  echo -e ${BLUE}"[CMS SCANNER]" ${RED}"AEM-Hacking installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/0ang3el/aem-hacker.git > /dev/null 2>&1 && cd aem-hacker && pip3 install -r requirements.txt > /dev/null 2>&1;  echo -e ${BLUE}"[CMS SCANNER]" ${GREEN}"AEM-Hacking installation is done !"; echo "";}
    VULNS_SCANNER () {  #Nuclei + nuclei templates  echo -e ${BLUE}"[VULNERABILITY SCANNER]" ${RED}"Nuclei installation in progress ...";  GO111MODULE=on go get -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei > /dev/null 2>&1 && ln -s ~/go/bin/nuclei /usr/local/bin/;  nuclei -update-templates > /dev/null 2>&1  echo -e ${BLUE}"[VULNERABILITY SCANNER]" ${GREEN}"Nuclei installation is done !"; echo "";  #Jaeles  echo -e ${BLUE}"[VULNERABILITY SCANNER]" ${RED}"Jaeles installation in progress ...";  GO111MODULE=on go get github.com/jaeles-project/jaeles  > /dev/null 2>&1 && ln -s ~/go/bin/jaeles /usr/local/bin/;  cd $TOOLS_DIRECTORY && git clone https://github.com/jaeles-project/jaeles-signatures.git > /dev/null 2>&1;  echo -e ${BLUE}"[VULNERABILITY SCANNER]" ${GREEN}"Jaeles installation is done !"; echo "";}
    JS_HUNTING () {  #Linkfinder  echo -e ${BLUE}"[JS FILES HUNTING]" ${RED}"Linkfinder installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/GerbenJavado/LinkFinder.git > /dev/null 2>&1 && cd LinkFinder && pip3 install -r requirements.txt > /dev/null 2>&1 && python3 setup.py install > /dev/null 2>&1;  echo -e ${BLUE}"[JS FILES HUNTING]" ${GREEN}"Linkfinder installation is done !"; echo "";  #SecretFinder  echo -e ${BLUE}"[JS FILES HUNTING]" ${RED}"SecretFinder installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/m4ll0k/SecretFinder.git > /dev/null 2>&1 && cd SecretFinder && pip3 install -r requirements.txt > /dev/null 2>&1;  echo -e ${BLUE}"[JS FILES HUNTING]" ${GREEN}"SecretFinder installation is done !"; echo "";  #subjs  echo -e ${BLUE}"[JS FILES HUNTING]" ${RED}"subjs installation in progress ...";  go get -u github.com/lc/subjs > /dev/null 2>&1 && ln -s ~/go/bin/subjs /usr/local/bin/;  echo -e ${BLUE}"[JS FILES HUNTING]" ${GREEN}"subjs installation is done !"; echo "";}
    USEFUL_TOOLS () {  #getallurls  echo -e ${BLUE}"[USEFUL TOOLS]" ${RED}"getallurls installation in progress ...";  GO111MODULE=on go get -u -v github.com/lc/gau > /dev/null 2>&1 && ln -s ~/go/bin/gau /usr/local/bin/;  echo -e ${BLUE}"[USEFUL TOOLS]" ${GREEN}"getallurls installation is done !"; echo "";  #anti-burl  echo -e ${BLUE}"[USEFUL TOOLS]" ${RED}"anti-burl installation in progress ...";  go get -u github.com/tomnomnom/hacks/anti-burl > /dev/null 2>&1 && ln -s ~/go/bin/anti-burl /usr/local/bin/;  echo -e ${BLUE}"[USEFUL TOOLS]" ${GREEN}"anti-burl installation is done !"; echo "";  #unfurl  echo -e ${BLUE}"[USEFUL TOOLS]" ${RED}"unfurl installation in progress ...";  go get -u github.com/tomnomnom/unfurl > /dev/null 2>&1 && ln -s ~/go/bin/unfurl /usr/local/bin/;  echo -e ${BLUE}"[USEFUL TOOLS]" ${GREEN}"unfurl installation is done !"; echo "";  #anew  echo -e ${BLUE}"[USEFUL TOOLS]" ${RED}"anew installation in progress ...";  go get -u github.com/tomnomnom/anew > /dev/null 2>&1 && ln -s ~/go/bin/anew /usr/local/bin/;  echo -e ${BLUE}"[USEFUL TOOLS]" ${GREEN}"anew installation is done !"; echo "";  #gron  echo -e ${BLUE}"[USEFUL TOOLS]" ${RED}"gron installation in progress ...";  go get -u github.com/tomnomnom/gron > /dev/null 2>&1 && ln -s ~/go/bin/gron /usr/local/bin/;  echo -e ${BLUE}"[USEFUL TOOLS]" ${GREEN}"gron installation is done !"; echo "";  #qsreplace  echo -e ${BLUE}"[USEFUL TOOLS]" ${RED}"qsreplace installation in progress ...";  go get -u github.com/tomnomnom/qsreplace > /dev/null 2>&1 && ln -s ~/go/bin/qsreplace /usr/local/bin/;  echo -e ${BLUE}"[USEFUL TOOLS]" ${GREEN}"qsreplace installation is done !"; echo "";  #Interlace  echo -e ${BLUE}"[USEFUL TOOLS]" ${RED}"Interlace installation in progress ...";  cd $TOOLS_DIRECTORY && git clone https://github.com/codingo/Interlace.git > /dev/null 2>&1 && cd Interlace && python3 setup.py install > /dev/null 2>&1;  echo -e ${BLUE}"[USEFUL TOOLS]" ${GREEN}"Interlace installation is done !"; echo "";  #Tmux  echo -e ${BLUE}"[USEFUL TOOLS]" ${RED}"Tmux installation in progress ...";  apt-get install tmux -y > /dev/null 2>&1;  echo -e ${BLUE}"[USEFUL TOOLS]" ${GREEN}"Tmux installation is done !"; echo "";  #Ripgrep  echo -e ${BLUE}"[USEFUL TOOLS]" ${RED}"Ripgrep installation in progress ...";  apt-get install -y ripgrep > /dev/null 2>&1  echo -e ${BLUE}"[USEFUL TOOLS]" ${GREEN}"Ripgrep installation is done !" ${RESTORE}; echo "";}
    ENVIRONMENT && SUBDOMAINS_ENUMERATION && DNS_RESOLVER && VISUAL_RECON && HTTP_PROBE && WEB_CRAWLING && NETWORK_SCANNER && HTTP_PARAMETER && FUZZING_TOOLS && SSRF_TOOLS && API_TOOLS && WORDLISTS && VULNS_XSS && VULNS_SQLI && CMS_SCANNER && VULNS_SCANNER && JS_HUNTING && USEFUL_TOOLS;
    

    Github下載地址:

    也可通過Github下載zip包至本地解壓使用

    https://github.com/supr4s/VPS-web-hacking-tools/archive/refs/heads/main.zip

    linux系統dev
    本作品采用《CC 協議》,轉載必須注明作者和本文鏈接
    因此做為運維人員,就必須了解一些安全運維準則,同時,要保護自己所負責的業務,首先要站在攻擊者的角度思考問題,修補任何潛在的威脅和漏洞。 本文主要分為如下部分展開:
    arch #顯示機器的處理器架構(1) uname -m #顯示機器的處理器架構(2) uname -r #顯示正在使用的內核版本 dmidecode -q #顯示硬件系統部件 - (SMBIOS / DMI) hdparm -i /dev/hda #羅列一個磁盤的架構特性 hdparm -tT /dev/sda #在磁盤上執行測試性讀取操作 cat /p
    Linux系統基線檢查
    2023-03-21 15:55:16
    1查詢系統信息1. Linux 查看內核版本(I級)uname -acat /proc/version. 檢查并修改如下內容:PASS_MAX_DAYS 90 #一個密碼可使用的最大天數PASS_MIN_DAYS 0 #兩次密碼修改之間最小的間隔天數PASS_MIN_LEN 8 #密碼最小長度PASS_WARN_AGE 7 #密碼過期前給出警告的天數。daytime 服務:使用TCP 協議的 Daytime 守護進程,該協議為客戶機實現從遠程服務器獲取日期和時間的功能。rlogin服務的認證體系相當簡單而易受攻擊,攻擊者可以通過該服務遠程暴力窮舉猜測用戶名、口令,也可以監聽其它授權用戶的通信過程以獲取口令明文。
    查命令絕對路徑: which用于查找并顯示給定命令的絕對路徑,環境變量中PATH參數也可以被查出來。
    Linux系統加固指南
    2021-09-08 08:51:48
    本幫助手冊旨在指導系統管理人員或安全檢查人員進行Linux操作系統的安全合規性檢查和加固。
    當企業發生網絡安全事件時,急需第一時間進行處理,使企業的網絡信息系統在最短時間內恢復正常工作,同時還需進一步查找入侵來源,還原入侵事故過程,給出解決方案與防范措施,為企業挽回或減少經濟損失。 常見的網絡安全事件:
    一些命令可以顯示單個進程所使用的帶寬。iftop可測量通過每一個套接字連接傳輸的數據;它采用的工作方式有別于nload。它可以顯示每個連接以及主機之間傳輸的數據量。沒有進一步的選項,僅僅實時顯示和更新流量的統計信息。netload命令只顯示關于當前流量負載的一份簡短報告,并顯示自程序啟動以來所傳輸的總字節量。ifstat能夠以批處理式模式顯示網絡帶寬。
    Chainguard本周發布了內存安全Linux發行版——Wolfi,宣稱能從根本上杜絕大量已知軟件漏洞。
    VSole
    網絡安全專家
      亚洲 欧美 自拍 唯美 另类