The main idea is to create a set of tools to be easily copied and started on a limited/small machine.
- ag
- heartbleeder
- lsciphers
- ncat
- nmap
- nping
- objcopy
- objdump
- readelf
- size
- socat
- strings
- go_metaDataPdf
- go_sshCrack
- go_sshSwarm
- go_tcpProxy
- go_sshTunnel
- go_shell
- go_forensicImage
- go_getGeoTagPhoto
- go_rsaapp
- go_cipherOfCaesar
- go_cryptographer
- go_calculateYouByMac
- go_getFileInfo
- go_readingBootSector
- go_webChecker
- go_steganoImgArch
- go_detectSteganoImgAndExtractIt
- go_lookupIP
- go_lookupHost
- go_getMXRec
- go_getServName
- go_csprng
- go_bruteHtmlForm
- go_httpHead
- go_findHtmlComm
- go_findFilesOnWebServ
- go_userAgent
- go_getHeader
- go_grabbing
- go_netScan
- go_base64
- go_findWrFiles
- go_fileTimestamp
- go_filePerm
- go_fileOwnership
- go_buildPNGmap
- go_extrLinkToMaltego
- go_extrEmailToMaltego
- go_findAltSites
- go_cipherROT13
- go_vigenere
- go_bookCipher
- go_perconscan
- go_dnsGetA
- go_subdomains
- go_filepathInfoSearcher
- go_icmpPayload
ag:
Is a text search tool, like grep but faster.
In the next examples we will use it to search "text" in the files in the current folder, by default recursively, then it searcht"text" in the current folder, recursivelly, only in files with ".txt" extention:
Usage:
ag text
ag -G .txt text
Docker usage:
docker run -t --rm -v $PWD:/mnt ppamo/nettools sh -c "ag text"
docker run -t --rm -v $PWD:/mnt ppamo/nettools sh -c "ag -G .txt text"
Checks if the remote secure server is protected for CVE-2014-0160 vulnerability, also known as Heartbleed Bug.
In the next example we will check the github web server:
Usage:
heartbleeder github.com:443
Docker usage:
docker run -t --rm --network host ppamo/nettools sh -c "heartbleeder github.com:443"
Lists the ciphers supported by the remote host.
The next example will list the ciphers supported by github.com secure web server:
Usage:
lsciphers github.com:443
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c "lsciphers github.com:443"
ncat:
Is a utility which reads and writes data across networks from command line.
The next example will read the output for a web server request:
Usage:
printf "GET / HTTP/1.0\r\n\r\n" | nc google.com 80
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c 'printf "GET / HTTP/1.0\r\n\r\n" | nc google.com 80'
nmap:
Is the most popular network mapper for discovery and security auditing.
The next example will scan for open ports at scanme.nmap.org:
Usage:
nmap -v scanme.nmap.org
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c "nmap -v scanme.nmap.org"
Is a tool for network packet generation, response analysis and response time measurement.
A representative Nping execution sending packages at two different hosts:
Usage:
nping -c 1 --tcp scanme.nmap.org google.com
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c "nping -c 1 --tcp scanme.nmap.org google.com"
A DNS resolver
Usage:
go_dnsGetA github.com
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c "go_dnsGetA github.com"
An IP lookup tool
Usage:
go_lookupIP 8.8.8.8
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c "go_lookupIP 8.8.8.8"
A hostname lookup tool
Usage:
go_getServName github.com
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c "go_getServName github.com"
A ssh server cracker
Usage:
go_sshCrack IPList userDic passDic
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c "go_sshCrack IPList userDic passDic"
A force brute tool for web forms
Usage:
go_bruteHtmlForm passwords.txt https://test.com/login admin username password
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c "go_bruteHtmlForm passwords.txt https://test.com/login admin username password"
A tool to reset a file's timestamp
Usage:
go_fileTimestamp test.txt
Docker usage:
docker run -ti --rm --network host ppamo/nettools sh -c "go_fileTimestamp test.txt"