0xsp-Mongoose

Privilege Escalation Enumeration Toolkit (ELF 64/32 ) , fast , intelligent enumeration with Web API integration . Mastering Your Own Finding

Github星跟蹤圖

GPLv3 license



0xsp Mongoose Linux / Windows Privilege Escalation intelligent Enumeration Toolkit

using 0xsp mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from
collecting information stage unitl reporting information through 0xsp Web Application API .

user will be able to scan different linux / windows Operation systems at same time with high perfromance , with out spending time looking inside the terminal or text file for what is found , mongoose shorten this way by allowing you to send these information directly into web application friendly interface through easy API endpoint .

project is divided into two sections server & agent .

server has been coded with PHP(codeigniter) you need to install this application into your preffered environment , you can use it online or on your localhost . user is free to choice .also contribution to enhance features are most welcomed .

Agent has been coded as ELF with Lazarus Free Pascal will be released with ( 32 , 64 bit) ,
while executing Agent on targeted system with all required parameters . user is free to decided whether willing to communicate with Server App to store results and explore them easily . or he can also run this tool with out Web Api Connection .

Linux Agent Usage

  1. make sure to give it executable permission chmod +x agent
  2. ./agent -h (display help instructions)
-k --check kernel for common used privilige escalations exploits. 
-u --Getting information about Users , groups , releated information.
-c --check cronjobs. 
-n --Retrieve Network information,interfaces ...etc.
-w --Enumerate for Writeable Files , Dirs , SUID , 
-i --Search for Bash,python,Mysql,Vim..etc History files.
-f --search for Senstive config files accessible & private stuff. 
-o --connect to 0xsp Web Application. 
-p --Show All process By running under Root,Check For Vulnerable Packages. 
-e --Kernel inspection Tool, it will help to search through tool databases for kernel vulnerabilities. 
-x --secret Key to authorize your connection with WebApp API (default is 0xsp). 
-a --Display README. 




Windows Agent Usage Wiki

-s --Enumerate Active Windows Services , Drivers  ..etc .
-u --Getting information about Users , groups , Roles , Releated information .
-c --Search for Senstive Config files Accessible & Private stuff .
-n --Retrieve Network information,interfaces ...etc .
-w --Enumerate for Writeable Directories , Access Permission Check , Modified Permissions.
-i --Enumerate Windows System information , Sessions , Releated information.
-l --Search in Any File by Specific Keywork , ex : agent.exe -l c:\ password *.config.
-o --Connect to 0xsp Mongoose Web Application API.
-p --Enumerate installed Softwares , Running Processes, Tasks .
-e --Kernel inspection Tool, it will help to search through tool databases for windows kernel vulnerabilities
-x --Secret Key to authorize your connection with WebApp.
-d --Download Files directly into Target Machine .
-t --Upload Files From Target Machine into Mongoose Web Application API. [agent.exe -t filename api secretkey]
-m --Run All Known Scan Types together .

Server Web App (must be like this : http://host/0xsp/ )

  1. make sure to have at least php 5.6 or above
  2. requires mysql 5.6
  3. make sure to add Web application on root path / with folder name 0xsp as [ http://localhost/0xsp/] , Agent will not connect to it in case not configured correctly . the agent will connect only as following case :
./agent {SCAN OPTION} -o localhost -x secretkey

Examples With WebApi

./agent -c -o localhost -x 0xsp { enumerate for CRON Tasks and Transfer results into Web Api} 
./agent -e -o localhost -x 0xsp { intelligent Exploits Detector }
./agent -c -e localhost -x 0sxp { will run two scans together and send found results directly }
./agent -m -o 10.10.13.1 -x 0xsp { RUN all Scans together and export it to Web API} 

Examples Without WebApi

./agent -c -k -p { this will run 3 scans at the same time with out sending results into Web Api }

Agent Features

  1. High performance , stability , Output results Generated while executing no delays
  2. Ability to execute most of functions with intelligent techniques .
  3. results are being sent to Quick Web API
  4. Exception Handling .
  5. inbuilt Json Data set for publicly disclosed Exploits .
  6. Fast As Mongoose

IMAGE ALT TEXT HERE
IMAGE ALT TEXT HERE

主要指標

概覽
名稱與所有者zux0x3a/0xsp-Mongoose
主編程語言Pascal
編程語言HTML (語言數: 7)
平台
許可證GNU General Public License v3.0
所有者活动
創建於2019-06-12 20:12:16
推送於2022-03-27 06:11:24
最后一次提交2020-02-18 05:29:15
發布數5
最新版本名稱2.2.2 (發布於 )
第一版名稱1.6 (發布於 )
用户参与
星數537
關注者數27
派生數122
提交數230
已啟用問題?
問題數6
打開的問題數0
拉請求數6
打開的拉請求數3
關閉的拉請求數2
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?