Skip to content
Exploits and Security Tools Framework 2.0.1
Python JavaScript Assembly HTML Other
Branch: master
Clone or download

Latest commit

C0reL0ader heartbleed scanner
by Sam Freeside (@snovvcrash)
Latest commit 5031699 Dec 7, 2018

Files

Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
3rdParty - 0.9.5.9 Jan 7, 2016
3rdPartyTools 1) Changed core messages communication Mar 20, 2017
Documentation first public version Nov 10, 2015
core 1) Changed core messages communication Mar 20, 2017
data version: 0.9.8 Jan 25, 2016
docs -files for first tutorial Apr 17, 2017
exploits heartbleed scanner Dec 7, 2018
help first public version Nov 10, 2015
listener 1) Changed core messages communication Mar 20, 2017
shellcodes Version 2.0.1 Dec 4, 2017
ui 1) Changed core messages communication Mar 20, 2017
.gitignore dates error Dec 4, 2017
README.md Update README.md Dec 16, 2016
logo.png - Added logo and changed README.md Apr 13, 2016
start.py 1) Changed core messages communication Mar 20, 2017

README.md

EaST Framework

«EAST» – «Exploits And Security Tools» penetration testing framework.

1. Overview

Pentest framework environment is the basis of IT security specialist’s toolkit. This software is essential as for learning and improving of knowledge in IT systems attacks and for inspections and proactive protection. The need of native comprehensive open source pen test framework with high level of trust existed for a long time. That is why EAST framework was created for native and native friendly IT security markets. EAST is a framework that has all necessary resources for wide range exploits to run, starting from Web to buffer overruns. EAST differs from similar toolkits by its ease of use. Even a beginner can handle it and start to advance in IT security.

Main features:

  • Framework security. Software used for IT security must have a high level of user trust. Easy to check open source Python code realized in EAST. It is used for all parts of the framework and modules. Relative little amount of code eases its verification by any user. No OS changes applied during software installation.
  • Framework maximum simplicity. Archive downloads, main python script start.py launches, which allows exploits start-stop and message traffic. All handled local or remotely via browser.
  • Exploits simplicity of creation and editing. Possibility to edit and add modules and exploits on the fly without restart. Module code body is easy and minimal in terms of amount.
  • Cross-platform + minimal requirements and dependencies. Tests for Windows and Linux. Should function everywhere where Python is installed. Framework contains all dependencies and does not download additional libraries.
  • Full capacity of vanilla pen test framework. In spite of simplicity and “unoverload” the framework has all necessary resources for wide range exploits to run, starting from Web to buffer overruns.
  • Wide enhancement possibilities. Third party developers can create their own open source solutions or participate in EAST development by use of Server-client architecture, message traffic API and support libraries.

2. Requirements

3. Usage

git clone https://github.com/C0reL0ader/EaST && cd EaST
python start.py [-p PORT] [--all-interfaces]

4. Additional resources

You can’t perform that action at this time.