Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for pentest professionals.

Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for pentest professionals.

Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of many security resources for pentest gurus. LETK (Linux evil toolkit) has couple very simple commands, 1 of which is the INIT will allow you to outline a concentrate on, and consequently use all the equipment with no typing anything else. Is LETK superior than setoolkit? Sure and no, there are two that serve the exact same matter and in a various way, the Linux Evil Toolkit and an automated attack facts automation script.

Warning

Warning: I am not accountable for the way that this software will be utilised by 3rd events. The reason of this application is only academic.

Difficulties, inquiries? Verify main webpage: https://github.com/th3void/linux-evil-toolkit

Issues

1 About usage

This script was designed to automate the actions of collecting data about internet targets, the misuse, and duty of the consumer, to report bugs or make suggestions open a report on GitHub.

2 About simple_scan

Automap was replaced by straightforward_scan, it is lighter and quicker, in addition to staying a lot less detectable, now it has diverse modes of execution that make it possible from a quick and very simple execution to additional intricate modes.

3 About Console

The output of the script can be really extended, so see if your console, (gnome-terminal, cmd, console) is configured to show 1000 lines (I specially advocate 10,000 lines), for expert reasons it permits the documentation, it data the commands, exits, and formats the textual content.

Use

Observe: When you begin a pentest, style the INIT command and outline the concentrate on, or publish values in linux-evil-toolkit/config/letk.rb

Basics

|exit           |   Near this script                                           
|distinct          |   Clear terminal                                              
|update         |   Update Linux evil toolkit                                   
|train          |   Show educate in terminal, tuutuu                              
|INIT           |   Set up world wide variables                                      
|reset          |   Distinct terminal and reset world-wide variables                   
|go over          |   Protect your tracks on your pc                          
|basic_map     |   This command execute automap (auto namap)
|lookup         |   Search e mail, whois and banner grep      
|standing         |   Demonstrate device standing         
|dnsscanner     |   Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA'         
|dirscanner     |   Scan data files and folders       
|banner         |   Display Linux evil Toolkit banner in terminal      
|webdns         |   Display World-wide-web Web pages for dns scanner      
|linuxfiles     |   Demonstrate vital linux documents      
|linuxfolders   |   Show significant linux folders    
|windowsfolders |   Exhibit critical windows folders  
|linuxutil      |   Clearly show useful commands in linux       
|examination           |   For advancement only        

simple_scan solutions

alone

    "-sL" --> "Record Scan - basically checklist targets to scan"
    "-sP" --> "Ping Scan - go no further than deciding if host is on the web"

default

    "-sS -sV" --> "TCP SYN"
    "-sU -sV" --> "UDP Scan"

icmp_echo

    "-sS -sV -PE" --> "TCP SYN + ICMP echo discovery probes"
    "-sU -sV -PE" --> "UDP Scan + ICMP echo discovery probes"
    "-sA -sV -PE" --> "ACK + ICMP echo discovery probes"

port_record

    "-sS" --> "TCP SYN + [portlist]: TCP SYN discovery probes to presented ports"
    "-sA" --> "ACK + [portlist]: TCP ACK discovery probes to provided ports"
    "-sU" --> "UDP Scan + [portlist]: TCP UDP discovery probes to specified ports"

exclusive

    "-sT -sV" --> "Hook up()"
    "-sW -sV" --> "Window"
    "-sM -sV" --> "Maimon scans"
    "-sN -sV" --> "TCP Null"
    "-sF -sV" --> "FIN"
    "-sX -sV" --> "Xmas scans"

DeepLink

DeepLink is a deepweb (tor onion area) database for your take a look at and examine “deep world wide web” for enjoyment


usage: form deeplink and style solution
--site | Cat finest website for your find out about deepweb
--darklinks | exhibit dark-internet backlinks
--onionlinks | display more 500 deep web links
--onionlinks-lively | present more one-way links, but lively inbound links only
--searchlinks | demonstrate tor look for (google-like)
--toralt | exhibit tor alternatives (i2-, freenet, and many others)

Backend Features

From engine module

Motor.INIT()               | Setup variables
Motor.sys("ls")            | Test Function
Motor.R()                  | Reset variables
Motor.address()              | Include bash historical past
Motor.compress()           | Compress data files
Motor.port_scanner()       | Repleced by automap
Engine.research()             | Search whois, e-mails, banner grep
Motor.standing()             | Exhibit device standing
Motor.dns_scanner()        | Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA'
Emgine.dir_scanner()        | Brute force for look for information and folders
Engine.straightforward_scan()        | Execute automap
Motor.assembly()           | Backend function
Engine.exec()               | Backend operate 

From Visual module

Visual.banner()             | Functionality for clearly show text 
Visual.internet_dns()            | Function for exhibit textual content
Visible.linux_documents()        | Purpose for show text
Visible.linux_folders()      | Functionality for display text
Visible.linux_util()         | Purpose for display text

From Interpreter Module

Interpreter.interpreter()   | Backend perform
Interpreter.most important()          | Backend purpose

Error CODES & Shades

prGreen()                   | Succesful
prRed()                     | Mistake 
Other[Cyan, yellow]         | Execultion error

The publish Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of different security equipment for pentest industry experts. appeared 1st on Hakin9 – IT Stability Journal.

Picture and Article Supply hyperlink

Read through Much more on Pentesting Instruments

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: