Awesome Open Source
Awesome Open Source

CodeFactor





		                 ██████  ██▓  █████▒▄▄▄█████▓▓█████  ██▀███                 
		               ▒██    ▒ ▓██▒▓██   ▒ ▓  ██▒ ▓▒▓█   ▀ ▓██ ▒ ██▒               
		               ░ ▓██▄   ▒██▒▒████ ░ ▒ ▓██░ ▒░▒███   ▓██ ░▄█ ▒               
		                 ▒   ██▒░██░░▓█▒  ░ ░ ▓██▓ ░ ▒▓█  ▄ ▒██▀▀█▄                 
		 ██▓  ██▓  ██▓ ▒██████▒▒░██░░▒█░      ▒██▒ ░ ░▒████▒░██▓ ▒██▒ ██▓  ██▓  ██▓
		 ▒▓▒  ▒▓▒  ▒▓▒ ▒ ▒▓▒ ▒ ░░▓   ▒ ░      ▒ ░░   ░░ ▒░ ░░ ▒▓ ░▒▓░ ▒▓▒  ▒▓▒  ▒▓▒
		 ░▒   ░▒   ░▒  ░ ░▒  ░ ░ ▒ ░ ░          ░     ░ ░  ░  ░▒ ░ ▒░ ░▒   ░▒   ░▒  
		 ░    ░    ░   ░  ░  ░   ▒ ░ ░ ░      ░         ░     ░░   ░  ░    ░    ░   
		  ░    ░    ░        ░   ░                      ░  ░   ░       ░    ░    ░  
		  ░    ░    ░                                                  ░    ░    ░   

                                 s1l3nt78
                               The Dead Bunny Collective
                               Because enumeration is key


              Recon Development Currently on hold

            Offensive Development Currently in Progress


Notice

[!] If you are the developer of any of the tools within Sifter and don't think your tool is
    being utilized to its full potential please let me know and i will take another look
    or optionally you can make an edit to the execution script of your specific tool and
    submit a pull request and I will review it within 12hrs

[!] Or if you are a developer and would like your program added just submit an issue with the link
    and ill check it out and if it fits, I'll make the addition with 24-48hrs

Release

@Codename: Violet
@Version : 11.7

[Violet's] latest release's zip package can be downloaded from here
[Violet's] latest .deb package is also available for download from here
Older Releases can be found here


Sifter Plugins

# Released Extensions - G - Sifter's g extension gives a GUI overlay
  '--> Built on top of eDEX-UI
- F - Sifter's f extension provides the DanderFuzz Exploitational Plugin for Sifter
  '--> Framework created by the EquationGroup courtesy of The Shadow Brokers
- M - Sifter's m extension provided malware analysis tools.
- C - Sifter's c extension is just a small script allowing CobaltStrike to be added to exploitation frameworks.
   (A copy of CobaltStrike will NOT be provided, You must provide your own)

Updates:

Additions:

#__ Version: 11.7 _|_ Violet __#
- TorBot - Onion URL info gatherer & crawler
- TacticalEK - Tactical exploitation toolkit to assist penetration testers during their assignments.

*Version: 11.5* - GitSearch - Tool to search git from CLI and clone (if required)
- Mosint - MOSINT is an OSINT Tool for emails. It helps you gather information about the target email.

- Snaffler - Gather targets from Active Directories, searches out file shares, and whether they're readable.
- WeblogicScanner - Weblogic Vulnerability Scanning Tool
- Responder - LLMNR, NBT-NS and MDNS poisoner.
- Vailyn - Multi-phased vulnerability analysis and LFI exploitation tool
- Mitre-Attack Website - Provides basic navigation and annotation of ATT&CK matrices
- DroneSploit (Optional)- Hacking techniques and exploits especially focused on drone hacking.

- Typing info into any menu will bring up the Module Information Screen.
- Typing session into any menu will start a new Sifter session to run concurrently.
- All Results can now be exported to Desktop and a backup zip package is created and time stamped.


Removed

# Depreciated tools: - BFAC
- Maryam
- ODIN
- xRay
- Removing redundant tools to make Sifter less bulky

Menu:


Overview

Sifter is a fully stocked Op Centre for Pentesters. It combines a plethara of OSINT, recon and vulnerability analysis tools within catagorized modsets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsoft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM.
Gathered info is saved to the results folder, these output files can be easily parsed over to TigerShark in order to be utilised within your campaign. Or compiled for a final report to wrap up a penetration test.

Instructional Videos:

Click the images to goto the videos

Official Version 11.5 [Violet] setup video.

Setup

-----------------------------------------------------------------------------------------------------------

[Old Walkthrough](Version 6-7)

Old Demo

-----------------------------------------------------------------------------------------------------------

[New Walkthrough](Version 11.5)

Mod Walkthrough


Tested OS

Working on: - Kali
	    - Parrot
	    - Ubuntu
	    - Linux (any distro)
	    - Windows (Linux Subsystem with Docker and VcXsrc or KeX)

Works on windows with linux-subsystem but please ensure docker is properly installed and configured,
following the instructions from docker website
Untested on mac, though theoretically the same should apply to mac as windows - regarding docker install & tools

Important

[ ! ] Please do not run sifter or the install as ROOT user.
use a regular user and give permissions only when needed.


NOTE!!

If a scan does not work correctly at first, remove web-protocol from target. eg:

  • use target.com
  • instead of https;//target.com

Installation:

[!] For oneliner install (Deb Package), copy and paste the following code into a terminal:
*
$ wget https://github.com/s1l3nt78/sifter/releases/download/11.5/sifter_11.5.deb; sudo dpkg -i sifter_11.5.deb; sifter


[!] For oneliner install (source), copy and paste the following into a terminal:
*
$ git clone https://github.com/s1l3nt78/sifter.git && cd sifter && bash install.sh


[!] Sifter Plugins can be found at https://github.com/Sifter-Ex
[!] To install Sifter with plugins run:
*
$ git clone --recursive https://github.com/s1l3nt78/sifter; cd sifter; bash install.sh

Modules:

  • Click to Expand
#Enterprise Information Gatherers - theHarvester
- Osmedeus
- ReconSpider
- CredNinja
- OSINT-Framework
#Targeted Information Gatherers - Maryam
- Seeker
- Sherlock
- E2P (Email2Phone)
- CardPwn
- iKy
- GHunt
#Domain Recon Gathering - DnsTwist
- Armory
- SpiderFoot
- Pulsar
- SubFinder
- SubDover
#Microsoft Exploitation - ActiveReign
- iSpy
- SMBGhost
  -- SMBGhost Scanner
  -- SMBGhost Exploit
#Website Exploiters - DDoS
  -- Dark-Star
  -- Impulse
  -- UFONet
- NekoBot
- xShock
- VulnX
#Exploit Searching - FindSploit
- ShodanSploit
- GitSearcher
#Post-Exploitation - EoP Exploit (Privilege Escalation Exploit)
- Potatoes
  -- BadPotato
  -- SweetPotato
- PEAS
  -- winPEAS
  -- linPEAS
- WinPwn
- CredHarvester
- PowerSharp
- ACLight2
- PowerHub
- InveighZero
#Exploitation Frameworks + DanderFuzz - Equation Group, Courtesy of the Shadow Brokers
  - FuzzBunch
  - Danderspritz
 (Provided by the F plugin.)

+ CobaltStrike
  (Provided by the C plugin.)
+ PHPSploit
+ Thoron
+ Metasploit
#Phishing + TigerShark
#BruteForcing + BruteDUM
+ WBruter
#Password Tools - Mentalist
- DCipher
- Ciphey
#Network Scanners - nMap
- WebMap
- AttackSurfaceMapper
- aSnip
- wafw00f
- Arp-Scan
- Espionage
- Intrigue-Core
- Responder
#HoneyPot Detection Systems - HoneyCaught
- SniffingBear
- HoneyTel (telnet-iot-honeypot)
- HFish
#Vulnerability Scanners - Flan
- Rapidscan
- Yuki-Chan
- Katana-VF (Vulnerability Framework)
- OWASP-Nettacker
- Big IP Remote Execution Scanner
- WeblogicScanner
- Vailyn
#Router Tools - RouterSploit
- MkCheck
- Airgeddon
#WebApplication Scanners - Sitadel
- OneFind
- AapFinder
- reNgine
#Website Scanners & Enumerators - Nikto
- Blackwidow
- Wordpress
  --- WPScan
  --- WPForce/Yertle
- Zeus-Scanner
- Dirb
- DorksEye
- Katana-DS (Dork Scanner)
#Operational Security & Threat Analysis - EventCleaner
- Threat Dragon
- TruffleSNout
- Snaffler
- Mitre-Attack Website
#Cross-Site Scripting & SQL Injection - SQLinjection
  --- WhiteWidow
  --- V3n0M-Scanner
- Cross-Site Scripting
  --- XSStrike
  --- finDOM-XSS
  --- XSS-Freak
#Web Mini-Games - This was added in order to have a fun way to pass time
 during the more time intensive modules.
 Such as nMap Full Port scan or a RapidScan run.
---------------------------------------------------------------------------------------------------------------------


Other Projects


All information on projects in development can be found here.
For any requests or ideas on current projects please submit an issue request to the corresponding tool.
For ideas or collaboration requests on future projects., contact details can be found on the page.

GitHub Pages can be found here.
- MkCheck = MikroTik Router Exploitation Tool
- TigerShark = Multi-Tooled Phishing Framework


  <!--#############           VGhlIERlYWQgQnVubnkgQ29sbGVjdGl2ZQ==           #############--!>

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
shell (10,203
network (467
pentesting (371
penetration-testing (244
scanner (225
osint (214
pentest (208
exploitation (100
recon (90
post-exploitation (54
vulnerability-scanner (33