This commit is contained in:
Mariusz B. / mgeeky
2021-10-24 23:11:42 +02:00
parent 2e115fe796
commit 558762a498
78 changed files with 124 additions and 124 deletions

View File

@ -8,7 +8,7 @@
# Python requirements:
# - scapy
#
# Mariusz B. / mgeeky, '18, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky, '18, <mb@binary-offensive.com>
#
import sys
@ -202,7 +202,7 @@ def parseOptions(argv):
print('''
:: CDP Flooding / Denial of Service tool
Floods the interface with fake, randomly generated CDP packets.
Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
v{}
'''.format(VERSION))

View File

@ -6,7 +6,7 @@
# Python requirements:
# - scapy
#
# Mariusz B. / mgeeky, '18, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky, '18, <mb@binary-offensive.com>
#
import sys
@ -122,7 +122,7 @@ def parseOptions(argv):
print('''
:: HSRP Flooding / Denial of Service tool
Floods the interface with Active router Coup HSRP packets.
Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
v{}
'''.format(VERSION))

View File

@ -33,7 +33,7 @@ PS D:\> python3 .\exchangeRecon.py 10.10.10.9
:: Exchange Fingerprinter
Tries to obtain internal IP address, Domain name and other clues by talking to Exchange
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
v0.2
[.] Probing for Exchange fingerprints...
@ -141,7 +141,7 @@ bash $ python RoutingAttackKit.py
:: Routing Protocols Exploitation toolkit
Sends out various routing protocols management frames
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
v0.1
Available attacks:
@ -157,7 +157,7 @@ bash # python RoutingAttackKit.py -t rip-fuzzer -v
:: Routing Protocols Exploitation toolkit
Sends out various routing protocols management frames
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
v0.1
[.] Using 192.168.1.14 as local/spoof IP address
@ -241,7 +241,7 @@ $ ./VLANHopperDTP.py --help
:: VLAN Hopping via DTP Trunk negotiation
Performs VLAN Hopping via negotiated DTP Trunk / Switch Spoofing technique
Mariusz B. / mgeeky, '18
Mariusz Banach / mgeeky, '18
v0.3
usage: ./VLANHopperDTP.py [options]
@ -279,7 +279,7 @@ $ sudo ./VLANHopperDTP.py -i enp5s0f1
:: VLAN Hopping via DTP Trunk negotiation
Performs VLAN Hopping via negotiated DTP Trunk / Switch Spoofing technique
Mariusz B. / mgeeky, '18
Mariusz Banach / mgeeky, '18
v0.2
[+] VLAN Hopping IS possible.

View File

@ -13,7 +13,7 @@
# Python requirements:
# - scapy
#
# Mariusz B. / mgeeky, '19, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky, '19, <mb@binary-offensive.com>
#
import sys
@ -618,7 +618,7 @@ def parseOptions(argv):
print('''
:: Routing Protocols Exploitation toolkit
Sends out various routing protocols management frames
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
v{}
'''.format(VERSION))

View File

@ -39,7 +39,7 @@
# - Add auto-packets capture functionality via tshark/tcpdump to specified out directory
# - Add functionality to auto-scan via arp-scan desired network
#
# Mariusz B. / mgeeky, '18-19, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky, '18-19, <mb@binary-offensive.com>
#
import os
@ -724,7 +724,7 @@ def parseOptions(argv):
print('''
:: VLAN Hopping via DTP Trunk negotiation
Performs VLAN Hopping via negotiated DTP Trunk / Switch Spoofing technique
Mariusz B. / mgeeky '18-19, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '18-19, <mb@binary-offensive.com>
v{}
'''.format(VERSION))

View File

@ -5,7 +5,7 @@
# the switch's port. This reconessaince will be helpful for performing
# VLAN Hopping attacks.
#
# Mariusz B. / mgeeky, '18
# Mariusz Banach / mgeeky, '18
#
import os

View File

@ -32,7 +32,7 @@
# - packaging
#
# Author:
# Mariusz B. / mgeeky, '19, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky, '19, <mb@binary-offensive.com>
#
import re
@ -1300,7 +1300,7 @@ def parseOptions(argv):
print('''
:: Exchange Fingerprinter
Tries to obtain internal IP address, Domain name and other clues by talking to Exchange
Mariusz B. / mgeeky '19, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '19, <mb@binary-offensive.com>
v{}
'''.format(VERSION))

View File

@ -6,7 +6,7 @@
#
# Based on "Black Hat Python" book by Justin Seitz.
#
# Mariusz B.
# Mariusz Banach
#
import os

View File

@ -51,7 +51,7 @@ if __name__ == '__main__':
print '\n\tMicrosoft IIS WebDAV Write Code Execution exploit'
print '\t(based on Metasploit HDM\'s <iis_webdav_upload_asp> implementation)'
print '\tMariusz B. / mgeeky, 2016\n'
print '\tMariusz Banach / mgeeky, 2016\n'
host = sys.argv[1]
if not host.startswith('http'):

View File

@ -25,7 +25,7 @@
# Requirements:
# - paramiko
#
# Mariusz B. / mgeeky, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky, <mb@binary-offensive.com>
#
import sys
@ -360,7 +360,7 @@ def main():
sys.stderr.write('''
:: CVE-2018-10993 libSSH authentication bypass exploit.
Tries to attack vulnerable libSSH libraries by accessing SSH server without prior authentication.
Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
v{}
'''.format(VERSION))

View File

@ -5,7 +5,7 @@
# configuration files in order to extract plain and cipher passwords out of them.
# Equipped with functionality to decrypt Cisco Type 7 passwords.
#
# Mariusz B., mgeeky '18-20
# Mariusz Banach, mgeeky '18-20
#
import re
@ -427,7 +427,7 @@ def printResults():
def main(argv):
Logger._out('''
:: Network-configuration Credentials extraction script
Mariusz B. / mgeeky, '18
Mariusz Banach / mgeeky, '18
''')
opts = parseOptions(argv)
if not opts:

View File

@ -72,7 +72,7 @@
# - Microsoft Exchange Server 2013
#
# Author:
# Mariusz B. / mgeeky, '17-19,
# Mariusz Banach / mgeeky, '17-19,
# <mb@binary-offensive.com>
#
@ -2958,7 +2958,7 @@ Date: {dateNow}
smtpAudit.py ({VERSION}) - SMTP Server penetration testing / audit tool,
(https://gist.github.com/mgeeky/ef49e5fb6c3479dd6a24eb90b53f9baa)
by Mariusz B. / mgeeky (<mb@binary-offensive.com>)
by Mariusz Banach / mgeeky (<mb@binary-offensive.com>)
.
'''
@ -3698,7 +3698,7 @@ class ParseOptions:
def banner():
sys.stderr.write('''
:: SMTP Black-Box Audit tool.
v{}, Mariusz B. / mgeeky, '17
v{}, Mariusz Banach / mgeeky, '17
'''.format(VERSION))
@ -3828,7 +3828,7 @@ def main(argv):
sys.stderr.write('''
:: SMTP configuration Audit / Penetration-testing tool
Intended to be used as a black-box tool revealing security state of SMTP.
Mariusz B. / mgeeky, '17-19
Mariusz Banach / mgeeky, '17-19
v{}
'''.format(VERSION))

View File

@ -3,7 +3,7 @@
# Simple script intended to abuse SMTP server's VRFY command to leak
# usernames having accounts registered within it.
#
# Mariusz B., 2016
# Mariusz Banach, 2016
#
import socket

View File

@ -7,7 +7,7 @@
# Nothing fancy, just set of needed commands. Especially handy when
# used with `startEAPHammer.sh` script.
#
# Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
#
if [ $# -ne 2 ]; then

View File

@ -5,7 +5,7 @@
# that takes as input list of APs against which should deauth be launched,
# and then attempts that attack.
#
# Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
#
if [ $# -ne 1 ]; then

View File

@ -14,7 +14,7 @@
# Especially handy when used with companion script called:
# `initDHCPServer.sh`
#
# Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
#
####################################################################