No description or website provided.
Python PHP Shell
Latest commit 43e2b2a Dec 19, 2016 @darkeyepy committed on GitHub Delete ok.txt
Permalink
Failed to load latest commit information.
payload Initial Commit. Nov 6, 2016
COPYING COPYING created online with Bitbucket Aug 24, 2016
README.md Initial Commit. Nov 6, 2016
blackbox.py Fix SSL CERT requests Dec 19, 2016
install First Commit Dec 19, 2016
requirements.txt Initial Commit. Nov 13, 2016

README.md

BLACKBOx Penetration Testing Framework

Python 2.7 License Twitter

PASSWORD ATTACKs:
  • MD5, SHA1, SHA224, SHA256, SHA384, SHA512, MSSQL2000, MSSQL2005, MYSQL323, MYSQL41, ORACLE11 CRACKER
BRUTEFORCING :
  • Wordpress Bruteforce – Bruteforce wordpress panel
  • FTP Bruteforce – Bruteforcing FTP LOGIN
  • SSH Bruteforce – Bruteforcing SSH LOGIN
  • Admin Page Finder – Find Admin Page
INFORMATION GATHERING :
  • Dnsinfo – dns info via Yougetsignal & viewdns & hackertarget
EXPLOIT :
  • Magento Rce – Magento eCommerce - Remote Code Execution
  • Joomla Rce – 1.5 - 3.4.5 remote code execution
  • Prestashop Exploit – PrestaShop Arbitrary file Upload (9 Modules)
  • PhpmoAdmin Rce – Exploit for phpMoAdmin, CVE-2015-2208
  • ElasticSearch rce – Exploit for ElasticSearch , {CVE-2015-1427}
  • PhpmoAdmin Rce – Exploit for phpMoAdmin, {CVE-2015-2208}
  • ElasticSearch rce – Exploit for ElasticSearch , {CVE-2015-1427}
  • LotusCMS Rce – LotusCMS 3.0 Unauthenticated Remote Code Execution
  • WPNmedia upload vuln – Wordpress N-Media Website Contact Form with File Upload 1.3.4
  • WPSHOP upload vuln – Wordpress WPShop eCommerce Shell Upload (WPVDB-7830)
WEB HACKING :
  • Google Dorker – google dorker (LFI/SQLi/XSS/RCE SCANNER)
  • Bing Dorker – bing dorker (LFI/SQLi/XSS/RCE SCANNER )
  • Scan list – Scan url in list from Vuln (SQLi/RCE/XSS/LFI)
INSTALL :
git clone https://github.com/darkeyepy/blackbox.git && cd blackbox \
      && chmod +x install && sudo ./install && cd