feroxbuster
pspy
feroxbuster | pspy | |
---|---|---|
12 | 8 | |
5,395 | 4,510 | |
- | - | |
8.0 | 0.0 | |
7 days ago | over 1 year ago | |
Rust | Go | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
feroxbuster
-
gobuster or dirbuster or dirb
Ferox https://github.com/epi052/feroxbuster
- Blackbox testing web API's?
- Fastest webpath scanner out here?
-
Trying to learn fuzzing, not sure if I am doing it right...
Suggest using feroxbuster since you can brute force directories recursivly. Try
-
Your daily toolbox as a pentester
feroxbuster to do some web app browsing (you have also gobuster)
-
What's the best Linux CLI tool to scan a website for hidden pages/files/directories?
feroxbuster is a powerful mutli-threaded dir enumerator but be careful if you use it. It can crash websites if it hits them too fast.
-
TOR in a python script
Have you tried feroxbuster?
-
What are some underrated (legal) tools that you have used during the OSCP that no one talks about or knows?
I redirect you here : https://github.com/epi052/feroxbuster
-
New Tools in Kali Linux 2021.2
CloudBrute - To find company(mostly cloud hence the name) infrastructure files and arch to a certain extent Dirsearch - Yet another web app path scanner like Gobuster/Dirbuster FeroxBuster - Rust based tool to perform forced browsing(read about it on GitHub Ghidra - Binary disassembler and decompiler (alternatives are gdb and ISA) Pacu - AWS exploitation framework GitHub Pirates - Kali package tracker(maybe like yay or pacman,not too sure on that one) quark-engine - android malware analysis system here Viscose - very popular and good code editor
-
Here's my quick tutorial on using Dirbuster! Enjoy!
Dirbuster always bugs for me, I can't change anything after starting an attack without getting the entire GUI messed up. I recommend trying out ffuf or feroxbuster.
pspy
-
Ask HN: What's the big deal with Go (Golang)?
* https://github.com/DominicBreuker/pspy
When you deploy them they just work. Compare that to compiled C++ code you often face issues with the deployment in my experience. And production machines usually do not ship compilers.
-
Need help getting rid of malware "perfcc / perfctl"
Configure auditd to log everything. Then use ausearch and aureport to inspect the events. You could also configure rsyslog to send the logs to a remote grafana server. There're a lot of tools you could use: falco, tracee, osquery, go-auditd+elastic, pspy , ...
-
LinPEAS
Literally using this right now on a pentest looking for privesc in some Linux boxes - the great thing about this tool is it's a shell script that's portable and does a significant amount of enumeration - big time saver. Feel as if it's better then the most others out there.
The second go-to tool after Linpeas is pspy which "allows you to see commands run by other users, cron jobs, etc. as they execute" [1]
[1] https://github.com/DominicBreuker/pspy
-
Tips to improve speed during CTFs
skipping processes (use tools such as pspy)
-
I passed with 100 points on second attempt AMA
I also forgot https://github.com/DominicBreuker/pspy obviously for linux privesc
-
What are some underrated (legal) tools that you have used during the OSCP that no one talks about or knows?
![pspy](https://github.com/DominicBreuker/pspy)
-
Startup CTF room, priv esc
It’s not in crontab either. You need to use a tool like pspy to find it.
-
alpha-sudo - my first emacs package
All you need to do is run a tool like ps or top often enough and eventually you'll catch a short-lived process exposing sensitive data in its command line. In fact, people wrote specialized scripts doing that at fast enough speed to catch them: https://github.com/DominicBreuker/pspy
What are some alternatives?
ffuf - Fast web fuzzer written in Go
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
gobuster - Directory/File, DNS and VHost busting tool written in Go
hackenv - Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs, Hack The Box, etc.) :rocket::wrench:
wfuzz - Web application fuzzer
traitor - :arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
dirble - Fast directory scanning and scraping tool
PrivEsc-MindMap
quark-engine - Dig Vulnerabilities in the BlackBox
OSCP-Priv-Esc - Mind maps / flow charts to help with privilege escalation on the OSCP.
tanoshi - Selfhosted web manga reader.
linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels