linux-smart-enumeration
Seatbelt
linux-smart-enumeration | Seatbelt | |
---|---|---|
2 | 8 | |
3,198 | 3,490 | |
- | 1.4% | |
6.2 | 6.1 | |
4 months ago | about 1 month ago | |
Shell | C# | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
linux-smart-enumeration
-
I passed with 100 points on second attempt AMA
Linux privesc is a bunch of manual checks from my notes that I have built over time. I also like https://github.com/diego-treitos/linux-smart-enumeration (lse.sh) which is similar to linpeas but the output is less busy.
- diego-treitos/linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels
Seatbelt
-
Allowed tools for OSCP
I'm taking my OSCP exam next Wednesday and was just wondering on what tools are actually prohibited and which are not. I'm specifically referring to linpeas, winpeas, seatbelt. I often times run these tools when I've exausted my enumeration methods for a quick find. Are these tools allowed on the AD set and the individual machines?
-
Cannot Load .NET assemblies in memory!
However, whenever I tried to run Seatbelt or similar software, it keeps failing at Load_3() with the error code 0x8007000b.
-
What are the alternative tools for wmic on cmd?
I'd recommend poking around at github and see what you find. A good starting point is WinPEAS if you're looking for automation. Seatbelt might also be helpful
-
Hardening Best Practices: Materials for Windows 10/11
Seatbelt: https://github.com/GhostPack/Seatbelt
- I passed with 100 points on second attempt AMA
- AzureDevOps + Github Question
- GhostPack/Seatbelt - Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
What are some alternatives?
airgeddon - This is a multi-use bash script for Linux systems to audit wireless networks.
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
owasp-mastg - The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
OSCP-Priv-Esc - Mind maps / flow charts to help with privilege escalation on the OSCP.
SUDO_KILLER - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
Windows11_Hardening - a collection about Windows 11
CapProcess - A simple and useful script for capturing the processes running on a machine and some basic information about the system
Ryujinx - Experimental Nintendo Switch Emulator written in C#
pdfcrack - An Advanced tool to Crack Any Password Protected PDF file. A very user friendly script especially for noob hackers.
PrivescCheck - Privilege Escalation Enumeration Script for Windows
ActiveDirectoryAttackTool - ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Controller. This tool is is best utilized using a set of known credentials against the host.
exec-assembly - Execute .NET assemblies in Memory!