⬅ Retour

CheatSheetTools / lists.ini

Fichier

# need pip git apt gem pip3 pipx

# _________                        __          
# \_   ___ \_______ ___.__._______/  |_  ____  
# /    \  \/\_  __ <   |  |\____ \   __\/  _ \ 
# \     \____|  | \/\___  ||  |_> >  | (  <_> )
#  \______  /|__|   / ____||   __/|__|  \____/ 
#         \/        \/     |__|                

[haiti]
name=haiti
path=
exec=haiti
install=gem install haiti-hash
tag=hash
description=tool pour identifier les hashs
categorie=Crypto

[john]
name=john
path=tools/Crypto/john-1.9.0/
exec=john
install=wget https://www.openwall.com/john/k/john-1.9.0.tar.gz && tar -xvf john-1.9.0.tar.gz && cd john-1.9.0/src && make -sj$(nproc) && cd ../run
tag=hash
description=tool pour crack beaucoup de type de hashs et puissant (utilisable dans john/run)
categorie=Crypto

[hashcat]
name=hashcat
path=tools/Crypto/hashcat-6.2.6/
exec=hashcat
install=wget https://hashcat.net/files/hashcat-6.2.6.7z && 7z x hashcat-6.2.6.7z
tag=hash
description=tool pour crack beaucoup de type de hashs différents
categorie=Crypto

[zip2john]
name=zip2john
path=
exec=zip2john
install=wget https://www.openwall.com/john/k/john-1.9.0.tar.gz && tar -xvf john-1.9.0.tar.gz && cd john-1.9.0/src && make -sj$(nproc) && cd ../run
tag=zip
description=tool for crack zip
categorie=Crypto

[gpp-decrypt]
name=gpp-decrypt
path=tools/Crypto/gpp-decrypt/
exec=gpp-decrypt
install=git clone https://github.com/t0thkr1s/gpp-decrypt.git && cd gpp-decrypt && python3 setup.py install
tag=GPP
description=tool pour parse les Groupes policy preference (XML), et decrypt cpasswd
categorie=Crypto

# ___________                                .__        
# \_   _____/__________   ____   ____   _____|__| ____  
# |    __)/  _ \_  __ \_/ __ \ /    \ /  ___/  |/ ___\ 
# |     \(  <_> )  | \/\  ___/|   |  \\___ \|  \  \___ 
# \___  / \____/|__|    \___  >___|  /____  >__|\___  >
#     \/                    \/     \/     \/        \/

[autopsy]
name=autospy
path=tools/Forensic/autopsy-4.22.0/
exec=autopsy
install=wget https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.22.0/autopsy-4.22.0.zip && unzip autopsy-4.22.0.zip
tag=dump
description=tool qui parse les fichiers memoire
categorie=Forensic

[binwalk]
name=binwalk
path=
exec=binwalk
install=sudo apt install binwalk
tag=file
description=tool qui extrait les fichier contenu dans un fichier.
categorie=Forensic

[photorec]
name=photorec
path=
exec=photorec
install=yum install testdisk
tag=recovery
description=tool qui retrouver des fichiers supprimés
categorie=Forensic

[FTK imager]
name=FTK imager
path=
exec=echo "pas encore test"
install=wget https://go.exterro.com/l/43312/2023-05-03/fc4b78 -o FTK_imager
tag=dump
description=tool pour parse de manière intelligente tout type de dump mémoire
categorie=Forensic

#  _______          __                       __    
#  \      \   _____/  |___  _  _____________|  | __
#  /   |   \_/ __ \   __\ \/ \/ /  _ \_  __ \  |/ /
# /    |    \  ___/|  |  \     (  <_> )  | \/    < 
# \____|__  /\___  >__|   \/\_/ \____/|__|  |__|_ \
#         \/     \/                              \/

[wireshark]
name=wireshark
path=
exec=wireshark
install=wget https://2.na.dl.wireshark.org/src/wireshark-4.4.5.tar.xz && tar xf wireshark-4.4.5.tar.xz
tag=capture
description=Outil pour capturer les paquets réseaux
categorie=Network

[tshark]
name=tshark
path=
exec=tshark
install=sudo apt install tshark
tag=capture
description=wiresharl tool in CLI
categorie=Network

[hydra]
name=hydra
path=tools/Network/hydra
exec=hydra
install=git clone https://github.com/vanhauser-thc/thc-hydra.git && cd thc-hydra && ./configure && make
tag=brute force
description=tool pour brute force n importe quel login
categorie=Network

[nmap]
name=nmap
path=
exec=nmap
install=sudo apt install nmap
tag=scan
description=tool pour scan de tout sur un reseau / une machine
categorie=Network

[xfreerdp]
name=xfreerdp
path=
exec=xfreerdp
install=sudo apt install freerdp-x11
tag=rdp
description=tool pour se connecter en rdp avec interface avec login password
categorie=Network

[tcpdump]
name=tcpdump
path=
exec=tcpdump
install=sudo apt install tcpdump
tag=spoof
description=dump tcp
categorie=Network

[netcat]
name=netcat
path=
exec=netcat
install=sudo apt install netcat
tag=spoof
description=connection a distance via n importe quel port
categorie=Network

[radsniff]
name=radsniff
path=
exec=radsniff
install=sudo apt install radsniff
tag=radius
description=sniff radius package
categorie=Network

[aircrack-ng]
name=aircrack-ng
path=
exec=aircrack-ng
install=wget https://download.aircrack-ng.org/aircrack-ng-1.7.tar.gz && tar -zxvf aircrack-ng-1.7.tar.gz && cd aircrack-ng-1.7 && autoreconf -i && ./configure --with-experimental && make && make install && ldconfig
tag=wifi
description=tool for crack wifi and brute force pcap
categorie=Network

# ________         .__        __   
# \_____  \   _____|__| _____/  |_ 
#  /   |   \ /  ___/  |/    \   __\
# /    |    \\___ \|  |   |  \  |  
# \_______  /____  >__|___|  /__|  
#         \/     \/        \/      

[blackbird]
name=blackbird
path=tools/Osint/blackbird
exec=blackbird.py
install=git clone https://github.com/p1ngul1n0/blackbird.git && cd blackbird && pip install -r requirements.txt --break-system-packages
tag=compte
description=tool pour chercher quelqu’un via un pseudo / username
categorie=Osint

# __________                
# \______   \__  _  ______  
#  |     ___/\ \/ \/ /    \ 
#  |    |     \     /   |  \
#  |____|      \/\_/|___|  /
#                        \/ 

[pasencore]
name=
path=
exec=
install=
tag=
description=
categorie=Pwn

# __________                                        
# \______   \ _______  __ ___________  ______ ____  
#  |       _// __ \  \/ // __ \_  __ \/  ___// __ \ 
#  |    |   \  ___/\   /\  ___/|  | \/\___ \\  ___/ 
#  |____|_  /\___  >\_/  \___  >__|  /____  >\___  >
#         \/     \/          \/           \/     \/ 

[gdb]
name=gdb
path=
exec=gdb
install=sudo apt install gdb
tag=exec
description=tool for debug and reverse so exec file
categorie=Reverse

#    _________ __                                     
#  /   _____//  |_  ____   _________    ____   ____  
#  \_____  \\   __\/ __ \ / ___\__  \  /    \ /  _ \ 
#  /        \|  | \  ___// /_/  > __ \|   |  (  <_> )
# /_______  /|__|  \___  >___  (____  /___|  /\____/ 
#         \/           \/_____/     \/     \/        

[steghide]
name=steghide
path=
exec=steghide
install=sudo apt install steghide
tag=hide file
description=Stegano tool pour retrouver des fichiers cachés
categorie=Stegano

[stegseek]
name=stegseek
path=
exec=stegseek
install=wget https://github.com/RickdeJager/stegseek/releases/download/v0.6/stegseek_0.6-1.deb -o stegseek_0.6-1.deb && sudo apt install stegseek_0.6-1.deb
tag=brute force
description=tool pour brute force la steg
categorie=Stegano

[zsteg]
name=zsteg
path=
exec=zsteg
install=gem install zsteg
tag=hidden file
description=tool pour decouvrir des fichier invisible
categorie=Stegano

#  __      __      ___.    
# /  \    /  \ ____\_ |__  
# \   \/\/   // __ \| __ \ 
#  \        /\  ___/| \_\ \
#   \__/\  /  \___  >___  /
#        \/       \/    \/ 

[jwt_tool]
name=jwt_tool
path=tools/Web/jwt_tool/
exec=jwt_tool.py
install=git clone https://github.com/ticarpi/jwt_tool.git && cd jwt_tool && pip install -r requirements.txt --break-system-packages
tag=jwt
description=jwt tool pour crack les jwts
categorie=Web

[sqlmap]
name=sqlmap
path=
exec=sqlmap
install=sudo apt install sqlmap
tag=sql
description=scan sql super pratique
categorie=Web

[sstimap]
name=sstimap
path=tools/Web/SSTImap/
exec=sstimap.py
install=git clone https://github.com/vladko312/SSTImap.git && cd SSTImap && pip install -r requirements.txt --break-system-packages
tag=ssti
description=scan ssti super pratique
categorie=Web

[Flask_unsign]
name=flask_unsign
path=
exec=flask_unsign
install=pip3 install flask-unsign
tag=flask
description=crack flask token
categorie=Web

[wpscan]
name=wpscan
path=
exec=wpscan
install=sudo apt install wpscan
tag=wordpress
description=tool pour scan les wordpress
categorie=Web

[XSStricke]
name=XSStricke
path=tools/Web/XSStricke/
exec=xsstricke.py
install=git clone https://github.com/s0md3v/XSStrike.git && cd XSStrike && sudo pip install -r requirements.txt --break-system-packages
tag=xss
description=Tool pour tester des payloads XSS
categorie=Web

[Sublist3r]
name=Sublist3r
path=tools/Osint/Sublist3r/
exec=sublist3r.py
install=git clone https://github.com/aboul3la/Sublist3r.git && cd Sublist3r && sudo pip install -r requirements.txt --break-system-packages
tag=domain
description=decouverte de sous domaine passif
categorie=Web

[ipsourcebypass]
name=ipsourcebypass
path=tools/Web/ipsourcebypass
exec=ipsourcebypass.py
install=git clone https://github.com/p0dalirius/ipsourcebypass.git && cd ipsourcebypass && sudo pip install -r requirements.txt --break-system-packages
tag=ip
description=tool qui permet de tester les paramètres d’un header par ip
categorie=Web

[xdebug-exploit]
name=xdebug-exploit
path=tools/Web/xdebug-exploit
exec=exploit.py
install= git clone https://github.com/D3Ext/xdebug-exploit && cd xdebug-exploit && pip3 install -r requirements.txt --break-system-packages
tag=php remoteXdebug
description=tool qui exploite la vulnérabilité type Xdebug en php
categorie=Web

[wafw00f]
name=wafw00f
path=
exec=wafw00f
install=pip3 install wafw00f
tag=firewall
description=decouvre proxy / firewall
categorie=Web

[HTTrack]
name=HTTrack
path=
exec=httrack
install= git clone https://github.com/xroche/httrack.git --recurse && cd httrack && ./configure --prefix=$HOME/usr && make -j8 && make install
tag=rack
description=clone web site
categorie=Web

[Gopherus]
name=Gopherus
path=tools/Web/Gopherus
exec=gopherus.py
install=git clone https://github.com/tarunkant/Gopherus.git && cd Gopherus && chmod +x install.sh && sudo ./install.sh
tag=wrapper
description=tool pour faire des shells avec wrapper
categorie=Web

[impacket]
name=impacket
path=
exec=impacket
install=pip install impacket --break-system-packages
tag=
description=tool pour le pentest AD en partie
categorie=Web

# copy paste
[ ]
name=
path=
exec=
install=
tag=
description=
categorie=