Some tools we developped during our PFA
project with different functionalities :
JCrack
: JWT Cracking Toolpbkdf2 cracker
: PBKDF2 Hash CrackerSofFuzz
: Customised Web Directory fuzzingExiftShell
: DNS exfiltration encoded reverse shell server
pip install -r requirment.txt
- Arguments :
- -h : For Help
- -i Input : It can be a string or a file
- -w wordlist : The path of the wordlist of the attack (
/usr/share/wordlists/rockyou.txt
by default) - --rule :
- classic : cracking using the lines of the file
- base32 : encoding lines in base32 before attacking
- base64 : encoding lines in base64 before attacking
- Use Exemple :
python Jcrak.py -i token --rule base64
- Arguments :
- -i Input : The file containing hash(s)
- -w wordlist : The path of the wordlist of the attack (
/usr/share/wordlists/rockyou.txt
by default)
- HashFormat :
pkbdf2:<algo>:<iterations>$SALT$HASH
- the format usually found in SQLITE databases
- Use Exemple
python werkCrack.py -i hashes.txt
Some Webapps don't render http status code instead they render an error customized page which makes directory fuzzing challenging that's why this tool :
- Arguments
- -h : For help
- -u URL : The Target URL
- -w wordlist : The path of the wordlist of the attack (
/usr/share/wordlists/rockyou.txt
by default)
- Use Exemple :
python softDirectory.py -u $IP
We'll use our reverse shell tool with HTTP or DNS exfiltration, which will enable us to obtain our first step on the target machine.
- Use exemple :
- Open The Server with
python exiftshell.py
- Run the client on target
This work is crafted with ❤ and released as an open source . Feel free to remix, share, and build upon this work!