Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for pentest professionals.
Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of many security resources for pentest gurus. LETK (Linux evil toolkit) has couple very simple commands, 1 of which is the INIT will allow you to outline a concentrate on, and consequently use all the equipment with no typing anything else. Is LETK superior than setoolkit? Sure and no, there are two that serve the exact same matter and in a various way, the Linux Evil Toolkit and an automated attack facts automation script.
Warning
Warning: I am not accountable for the way that this software will be utilised by 3rd events. The reason of this application is only academic.
Difficulties, inquiries? Verify main webpage: https://github.com/th3void/linux-evil-toolkit
Issues
1 About usage
This script was designed to automate the actions of collecting data about internet targets, the misuse, and duty of the consumer, to report bugs or make suggestions open a report on GitHub.
2 About simple_scan
Automap was replaced by straightforward_scan, it is lighter and quicker, in addition to staying a lot less detectable, now it has diverse modes of execution that make it possible from a quick and very simple execution to additional intricate modes.
3 About Console
The output of the script can be really extended, so see if your console, (gnome-terminal, cmd, console) is configured to show 1000 lines (I specially advocate 10,000 lines), for expert reasons it permits the documentation, it data the commands, exits, and formats the textual content.
Use
Observe: When you begin a pentest, style the INIT command and outline the concentrate on, or publish values in linux-evil-toolkit/config/letk.rb
Basics
|exit | Near this script
|distinct | Clear terminal
|update | Update Linux evil toolkit
|train | Show educate in terminal, tuutuu
|INIT | Set up world wide variables
|reset | Distinct terminal and reset world-wide variables
|go over | Protect your tracks on your pc
|basic_map | This command execute automap (auto namap)
|lookup | Search e mail, whois and banner grep
|standing | Demonstrate device standing
|dnsscanner | Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA'
|dirscanner | Scan data files and folders
|banner | Display Linux evil Toolkit banner in terminal
|webdns | Display World-wide-web Web pages for dns scanner
|linuxfiles | Demonstrate vital linux documents
|linuxfolders | Show significant linux folders
|windowsfolders | Exhibit critical windows folders
|linuxutil | Clearly show useful commands in linux
|examination | For advancement only
simple_scan solutions
alone
"-sL" --> "Record Scan - basically checklist targets to scan"
"-sP" --> "Ping Scan - go no further than deciding if host is on the web"
default
"-sS -sV" --> "TCP SYN"
"-sU -sV" --> "UDP Scan"
icmp_echo
"-sS -sV -PE" --> "TCP SYN + ICMP echo discovery probes"
"-sU -sV -PE" --> "UDP Scan + ICMP echo discovery probes"
"-sA -sV -PE" --> "ACK + ICMP echo discovery probes"
port_record
"-sS" --> "TCP SYN + [portlist]: TCP SYN discovery probes to presented ports"
"-sA" --> "ACK + [portlist]: TCP ACK discovery probes to provided ports"
"-sU" --> "UDP Scan + [portlist]: TCP UDP discovery probes to specified ports"
exclusive
"-sT -sV" --> "Hook up()"
"-sW -sV" --> "Window"
"-sM -sV" --> "Maimon scans"
"-sN -sV" --> "TCP Null"
"-sF -sV" --> "FIN"
"-sX -sV" --> "Xmas scans"
DeepLink
DeepLink is a deepweb (tor onion area) database for your take a look at and examine “deep world wide web” for enjoyment
usage: form deeplink and style solution
--site | Cat finest website for your find out about deepweb
--darklinks | exhibit dark-internet backlinks
--onionlinks | display more 500 deep web links
--onionlinks-lively | present more one-way links, but lively inbound links only
--searchlinks | demonstrate tor look for (google-like)
--toralt | exhibit tor alternatives (i2-, freenet, and many others)
Backend Features
From engine module
Motor.INIT() | Setup variables
Motor.sys("ls") | Test Function
Motor.R() | Reset variables
Motor.address() | Include bash historical past
Motor.compress() | Compress data files
Motor.port_scanner() | Repleced by automap
Engine.research() | Search whois, e-mails, banner grep
Motor.standing() | Exhibit device standing
Motor.dns_scanner() | Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA'
Emgine.dir_scanner() | Brute force for look for information and folders
Engine.straightforward_scan() | Execute automap
Motor.assembly() | Backend function
Engine.exec() | Backend operate
From Visual module
Visual.banner() | Functionality for clearly show text
Visual.internet_dns() | Function for exhibit textual content
Visible.linux_documents() | Purpose for show text
Visible.linux_folders() | Functionality for display text
Visible.linux_util() | Purpose for display text
From Interpreter Module
Interpreter.interpreter() | Backend perform
Interpreter.most important() | Backend purpose
Error CODES & Shades
prGreen() | Succesful
prRed() | Mistake
Other[Cyan, yellow] | Execultion error
The publish Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of different security equipment for pentest industry experts. appeared 1st on Hakin9 – IT Stability Journal.