diff --git a/.assets/DAT.drawio b/.assets/DAT.drawio deleted file mode 100644 index 1289715c..00000000 --- a/.assets/DAT.drawio +++ /dev/null @@ -1 +0,0 @@ -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 \ No newline at end of file diff --git a/.assets/DockerHub registries.drawio b/.assets/DockerHub registries.drawio deleted file mode 100644 index 858265b3..00000000 --- a/.assets/DockerHub registries.drawio +++ /dev/null @@ -1 +0,0 @@ -7VtLk+MmEP4tObgqOXhLb8tH2/tM1aY2talk94glJFGDhYLw2M6vD0igF/JjZ0bW7IwvO6aBBvX30TTQO7FXm/0HCrLkMwkhnlhGuJ/YbyeWZTm+y/8IyUFK/NmslMQUhaXMrAVf0X9QCg0p3aIQ5q2GjBDMUNYWBiRNYcBaMkAp2bWbRQS3R81ADDXB1wBgXfoPClkipZZh1BUfIYoTNfTckjUboFpLQZ6AkOwaIvvdxF5RQlj5a7NfQSzMpwxT9nt/pLaaGYUpu6TDh932bvmn/Sn7/Y9vu/vV8u/pdj1Vau4B3spPlrNlB2UDSrZpCIUWc2Ivdwli8GsGAlG747BzWcI2WFZHCOMVwYQWfe3ID2AQcHkI8qTSkTNK7mCj2dp3HdcQNcpIokD4KIgJ6pR1RS8FA7ffUs4dUgb3R61iVrbmNIVkAxk98Caqg0JSMnRq21Kwq/F2PSlLmlA7Uggkx+JKeY0C/yGB+AFQTH9gUCLoXQBKOJuvjdFwML3RcbAuwAGm4UL4GV4ivF3b7jVIwm4RSZn0cKYjyw1zeyv/3ZJPd8ktRg/fRKc3rip+lxqLwtu91FiWDrKk48In9x7hIyyAZujCWR/wc29mA0/03yPWmAgvfVcj89/1NERBzaK0EAw1v9phArci2dIAnloHtvT4gMaQnQLK7edWkzo9zFEyCjFg6L494T42yRG+EMQ/paKu5bSpa3b4WH6n7NR00B09ptVZAk6X2aUhNE0FuavPfgTf5y+Z7yGAfhT08d0LfLiOngHfnUv57o3Jd9d6Gr675vyN29l8vesy3tUIn+5IyLZJztXBPYwJftKd9wgHU5LCEwukWEhyAipee8xe63T32ooZDQJVXq3JoOFCHus8EtMNyoNpRmFGSfgaYKkim/FgcS6E5TXA4Y+OxgXu6jWtD1sZZDxEZhcgst4iHOZPC4gL/dC5EBDfWtqeNwAg3YDVGnuBqAk04PhcOCcDbUAMOQYe5nNYrin/FbMieisleQbSFjzev1txMVPYbLqTk1/wJimhmyLurdsoZX8lMIdFfBUjDgwSAxrcmvzfbc6R5tMQg7BESPgiDWAuWpCI/1OQBKXxxFqJyu0aozwpygZIRdeE5Kws5zAgaQgKJNrfxY1Wfoj6uA7lONSszat+/jTIJkUAozjlRQwjoUHQBgUAL6SYkewIh9tHgtaFQ5uOZ88Lb2fzpVFH3I9irud3t9qe2wbzyrcN+l77hXJ8e3C+8fcn5O9S3XEOwd++W8tr81ePTkJ4PwCGATcSpD0oblAYimEuALJ1z6yjehxFcTe28PRL0SffW+fdo/FcR3jeA7A9GL6ehm9voPmTA1yFrwMD7MyeG8B231vQJdtLBDYIH8rt5SPE91CAVjg6o6jPC2uLWtPJ9s2KUl9nWyrr7gFFgP/l0AO2peIR8GS7AGTHmjS3v5kMIQwMGSfZNBco821J60loloBUqiwfOQxB7alk6aLQEbFGDeL8S+U4hvrQooZRriri2tU4Bd9LrIs3ysYgO0LD9rQqXfxL1neIqxM6y1U1lWxptVuD4C4u1sM0KJktqmm8/tVy/HKHtpy5/OEavzVmGvLNmQKGSDplCQruUrHHF91RihhS1um2bSB5sl1jOq12ESaAdY0TojzD4KCaY5SKwOMXtMkIZSBlvUHMJ+E7NjBEgDVimcPREKOOqG70vtF7GHp3OfrTu9Ubu54Ru3QvcPKMh/KWWzSKsjzfMVIMKxwsxx+LanFum4hjYCBirkBwhhsYBihCzYsVYw05RMLj8uOh6CdesKqDoFJdXU5yhoiJoxTgS5x0f4h57s7sdKBXXYsNcDVp9tyE+Vc9jdn6g0rOQFycwF9WwL7wPHfek6by1AH7tPs8b/eg3AfycAG73ROwD/ZeX9m5eq+vHuiLV/L68X7o/JR6Juq9ftJ4ra/e7od/r5cnuLPv9eViHC0/xe0Qd/bAB3tNke12NA38XG/rV6RyC3lZLm1mLryFM6BLqx7+Hf0Fre/WcDgXpl8aDujCKruO7sLqmYzrwi72YM6YHswxO47HUonlP+rCZucUDe3B9EvUW1j2uLCsyw3T1n3adcMyPSngtks9KjW8E76MvWddNS38FnYfyxU8v2mNmibrdKJl88F54eYZRUPvWVdNC7/FaA9OCy83nmfD99kDYzSN711FA/NdDX8+FzmE94PkWx7hZH96X5WRMHR633PIR9afqHVo+rJOXiAazyBpX79/PL5QXgMk42eI68fL3vXxmrzWkFnivFj/B+5y/6n/I7z97n8= \ No newline at end of file diff --git a/.assets/discord_join_us.png b/.assets/discord_join_us.png deleted file mode 100644 index cf2aa262..00000000 Binary files a/.assets/discord_join_us.png and /dev/null differ diff --git a/.assets/example-display-sharing.gif b/.assets/example-display-sharing.gif deleted file mode 100644 index 00a1f751..00000000 Binary files a/.assets/example-display-sharing.gif and /dev/null differ diff --git a/.assets/exegol-help.png b/.assets/exegol-help.png deleted file mode 100644 index a0f565eb..00000000 Binary files a/.assets/exegol-help.png and /dev/null differ diff --git a/.assets/exegol-info.png b/.assets/exegol-info.png deleted file mode 100644 index 02e05bd7..00000000 Binary files a/.assets/exegol-info.png and /dev/null differ diff --git a/.assets/exegol-start.png b/.assets/exegol-start.png deleted file mode 100644 index e5af1fd5..00000000 Binary files a/.assets/exegol-start.png and /dev/null differ diff --git a/.assets/github_actions.drawio b/.assets/github_actions.drawio deleted file mode 100644 index b7d4729a..00000000 --- a/.assets/github_actions.drawio +++ /dev/null @@ -1 +0,0 @@ -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 \ No newline at end of file diff --git a/.assets/logo.drawio b/.assets/logo.drawio deleted file mode 100644 index 18835ca8..00000000 --- a/.assets/logo.drawio +++ /dev/null @@ -1 +0,0 @@ -7ZldU6MwFIZ/TS9l8sHnbT9w3VVnHWfW0ZsdLCmglLBptO3++g0S2kRoS0foeiE3Je+hKbxPzklCB3g0X52zII+vaEjSAQLhaoDHA4QgxJ74KJR1qdiOWwoRS8JSAlvhNvlL5Dcr9SUJyUJqpcQpTXmS6+KUZhmZck0LGKNL/bIZTUNNyIOIaLdRCLfTICW1y+6SkMel6iJnq38jSRRXvwxt+cDzoLpYdryIg5AuFQlPBnjEKOXl2Xw1Imlhnu6LvyO6uTFGMt7mC68X+NqcX585+a8fi/sr5/7ugZ/JXl6D9EU+sLxZvq4cEL0Is0VjuIwTTm7zYFpEloK30GI+T0ULitNgkZcEZsmKiB8dzpI0HdGUsreOcHkIfcEZfSZVJKNZ0Xn9cap7I4yTlSLJxzsndE44W4tLZFQyWVcjyCrbyy03bEPDkwMwVrCpeiBHTLTpf2uqOJG+Nnt840TpdAHGv5+i2fn05/fLO+emjcfHOqs7WPe2GqrQ3IPhI45Ljz3HsHHdZRc1WFyJH/F3tl5af14fsPn0OGOXFz4dPj+08Tdi9CVv/7ybchI8pmp12DnykGN4jqcc+khEluF59bBqWVUlNMsqsXPL0AnTfjL2bd9vn/Z7GbeuBcg0ANhJpIhCJWi7NSLIaS4Vqt45F9wnl3elwW5doUXEHrmTod8Hr/+XBOZnNXsMJtBHPSYHFsMfge0BteQooliN1udRZIkksBuSQ9E752Ud5iXKfBYW/o/BYWbvEBUSozzgCc1E27T2zrPtJ9WO6hnQpxTTqUNxG9IH2UaFt3Mg9kmBnInR9YXkABLntEigC76QHEDinhSJ9wXkEBCvz3n/g3veblw3Lc110xQrVnUt3DCh4yYIuK+lV/V25yQMhq5lWo1psYn0BcIGYhgrSymggynC6joMmTUwYpfSuA1R9e7xfObXQt2QcZFOBmlgiiiqR1UultXMRdG753LKffuOtOmZC8TIwO9e5GFYs1+4jBr2H4rcvfktNuecJUEWpS3cP8psdcnl9VmvIPAMa3daQEsUnYYaBUBjLjjQAMfTEM3tS/G3mPLXAp78Aw==7Zhdb5swFIZ/TS6L/AEGLhcS1k3qpinTdjm5wQFWwMxxS5pfP1MgMYGMZIJtmspFBO8B27yPj33IDHvp7q2geXTHA5bMEAh2M7yYIWRjV/2WwnMlENuphFDEQSWBo7CK96wSYaM+xgHb1lolSc4TGedtcc2zjK1lS6NC8KJ924YnQUvIachawyiF1ZomrHPb1ziQUaU6yD7qtywOo6ZnSOoXTmlzc93wNqIBLzQJL2fYE5zL6izdeSwpvWt88fY8IuIu8NF9eGe74HO+ZDdVY/41jxxeQbBM/nbTxZu5+PEObDLsf92vHlZpuvtSPwKeaPJY+1W/q3xuDAwFf8wvHEE90icmJNv14aX3CTt1UM08xlMmxbO6r34K2YZru9pRtVLPQYgsw3W74eIIGDfUIg3uQaT1pAoPHR+NUye1d1cgwsM+qlbUnFcX8yKKJVvldF1GCpV1SotkqjpcQHVKt3mVCJt4x1Sn802cJB5PuHhpCC8XPvHVYOdbKfgDayIZz8rGu6R+Cf6U1HkipgHAWSJlFGpB4nSIIBsartOFouujczGn5FL536wqkHRRVUcHlYoQz1nO/Sl4/b0kIP+q2QuwhD6aMDmwmv4IHA/YSo4yivWo1U0OSyUB6UkOTR+dlzPMS639WVD6vwDDzE4QlZLgksqYZ+ratPrQHKCdgznZegbaW4ppd6E4PemDiNHgHR0IvGA7HpHIjZper0yGmMA/ywQ64JXJEJMLyq0RmbivRAaJXLCXjFYAn9noJy6ATatlu2mqqlWvh3s2ddxHAY9QflESbyG23n/8tieF90Hcut8/TVvrniCYO5Zp9abFITIVBwLUNNaqKdDmUob1UgyZHS7qQ6X3S0TXR6dj/fcJ4qA2GNTiUkZRN6pjsax+LJo+OpZJv1kuS5qJsUCMDGy3twwMO+4rk1HPB4gmj+69Pey9FDHNwuQC86/yWi+43CkXKwhcwzqfFNBSK07PAgVAbybY0ADXw1CXxz8pX2LaP714+RM=7ZrLcpswFIafxsswunBd1re2i05nmjbtrqMaGUgx8mD5lqevMGCLIAJuADutWWTsIyzQ/+lIOv9kgEeL3fuYLP1PzKXhAAF3N8DjAUIWdsTfJLBPA6ZlpwEvDtw0BE6B++CJpkGYR9eBS1dZLA1xxkIeLIvBGYsiOuOFGIljti3eNmehWwgsiUcLr5EE7mckpKXbvgcu99OojaxT/AMNPD9/MjSzAS9IfnPW8conLttKITwZ4FHMGE8/LXYjGiba5bqYw6E7m7wb7jc/p58fvz44P5xvd2ln03N+chxCTCPebtco7XpDwnWmVzZWvs8F9GK2XjZ8g+xNNzTmdKfCS36F9LmCYuZRtqA83ov7sl8hS3MsR7rSXrI5CJGhOU65eXsCjHNqvgT3GCTZpPKODz4JJz5k2p2hI67XUfQi5rz4Mtz6Aaf3SzJLWrYi60TM5wvxwDEUH8lqmSbCPNhR8dDhPAjDEQtZfOgIT8ZTcypedrjiMftN85aIRUnnDUmhClLVRHQNgEoiSSuUGk27RARZUHPsMhQ53joXvUsuqf75qgLNMqrp4SqhEi3p1QWvyyWB8f+JnbViMf0ROF2wkBxJK5ZbjXJyGCIJTEVySPHWeZn1vMTaH7mJ/mNQz+wZoiQUM054wCLxXTdUaI7QqmB2tp6B4paiW2UotiJ9kKnleFsHYvUK5E7MrhuSGiR2v0igDW5IapA4vSJxbkBq6xPQ5cbfbJfv+PSrGwXZdV0cWeXDsGJHxyoKuKuzF4Q9Mjiep3plYAIxhaVjFCgySZrlMxjSS0xEhaIsQeR4+2Qa1NhvPDtsVCSDCmCSVlRulbkYhpqLFG+fS581+2UyBmKkYau4YWBYkl+ojBS1hxRuX/wGhTmPAxJ5YQP1zxJbPm4dNvfO1AeOZlSnBTTEoqNYowBQ5oIFNdACjadt9GPvPYCPMTYsd/k433yZ3zXYv1MX8HXztzV3UIfFpR9Cs6Rjd96HUsI+t99zDcAXmf87BqBymJ1uvvWeVMVS9HKl8Epel0uCTnfU6xT7rRiAymE22IQ7NwCP0KpgdraeXbaSVg6igYPegwF4QyINol+TvMoAvCGRBtGvTa42AG9ApEE0MMkvVkm3o/o1+X/KETUwxbs2mVw6J+uQd0jh+h1AdW3Ypz9+mfy4dgdQzaXPov1cZ7YdLlfhAKrFb1CZ/7UD+LLYDRzAltS/AgdQfD39i+KhTfo/Tzz5Aw==7Zpdc6IwFIZ/jZcy+eDzVq3di+3sRXen00tWojCLhMFY7f76DQYwKVBpl6B2xBkHzoEA75OT5Bwd4el6f5/5afhAAxKPEAj2IzwbIeRgj3/nhldhsB1XGFZZFAgTOBoeo79EGGFp3UYB2RQ2YWKUxixKVeOCJglZMMXmZxndqactaRwohtRfEeUxcsPjwo9J7bSnKGChsLrIOdq/kWgVlneGdvHCa788uWh4E/oB3UkmfDfC04xSJvbW+ymJc+1KXcaT2dPPe+vh++zX87OVRj/GbD8Wjc0/ckn1ChlJWL9NI9H0ix9vC72Kd2WvpYCrjG7Tjk9QPOkLyRjZN+H1f8fkrYK85xG6Jix75ecVVyHH8BxP2kQrRR+EyDI8r+7eHQHjkloowa2MftGpVtWNj8LxnUK7D+iIT+vIW+F9nh9MdmHEyGPqL3LPjkcdt4VszW84g3zX36QiEJbRnvCbTpZRHE9pTLNDQ/huNrfn/GEnG5bRP6T0JDTJG+9ICrWQaidiGgC0Esm9UHLabo0IcqDhuXUosr13LqZOLkL/clSBdh0VIPmnhop70CT/6OB1viCwzit2JemAYhdezLs/AscNKsGRe7HsterBYfEgsBuCQ7L3zss+zYuP/UmQ6z8Dp5m9QZSbMsp8FtGEH5tWE5oqQtoiR9t4BtQpxXTqUNyG8EG2UeLtHYgzKJAx7103JCeQuMMigS64ITmBxBsUiXcDcjI/ATon/m5LKs2rX9NSZDdNvmSVF8MNMzpuooB1rb0gHJBBy0pLMwMb8C4sLaOAyiR3y2swZNaY8AylMQWR7f2T6ZBjX3l0uEglgxQwuRfVvTIXy2rmItn75zJkzn6eiIEYGdhRJwwMa/JzlVFD7iGZ+xe/Q2LOsshPVnEH9T8ktrzcOkzu2tQHnmG1hwW0+KDTMEYB0BgLDjSANhodMndRBvy/DtxbedCE6tgPoV0TcuDiB+yQTV9WCbCi/sVrgLBDWq2zLiW2pixifti0EDtjIHRImb+c3FddB4TDZtTNhcAKWxtOfaPaBabUqENKPUAp8AZFgdIhxx6gGHiDokDpkF5rLwfekChIhsysW6Z73Uvhiy8IIq0/fb+BUK2sVAgBWfrbmOnkcKVFQaT1t/LLCJGrrAqiIdP4lrDRDeZyy4KoQ6r+6bLg+2p/tiz4CfkvoC7ID49/XDz4pH9/4rt/7Zldb5swFIZ/TS4b+QMMXDZp6KRp2rRumtabygsOsBIcgdsk+/UzwyR2cRqyQKZJ5abwHnDK+5xzbCcjPF1ubgu6Sj7wiGUjBKLNCN+MEIIQB/JPpWxrhXh+LcRFGtUS2At36S+mnmzUpzRipdJqSXCeiXRlinOe52wuDI0WBV+bty14FhnCisbM+Dcq4W5OM9a67VsaiaRWfeTt9XcsjZPmkyFRL7ykzc1q4DKhEV9rEp6N8LTgXNRny82UZZV5jS9fHz5+uo4ny/zxsaTJNYH38P6qHiw85ZHdKxQsF/0Ojeqhn2n2pPxS7yq2jYEFf8ojVg0CRniyTlLB7lZ0XkXXMmWklohlJq+gPF2kWTblGS/+PIvrQ+q0XNVwF+mmGmtSioI/subWnOdyvEnH91R+PLNCsI1GWb33LeNLJoqtvEVFr7CvnlFJ7JNxYBx1dK0liKOoJ1pyOE0qUJWU8e6j9sbLE+X9CRzwcQ5yFFkz7DiDlteHoFyUgWcAgMBtWY4JHAd+23VdP8f47zwlm4C//xI+fF4kP8NFWS5UzbxqfCwrYHWmLbv+Rn9kers6nLIQmSkLsdd2DFmSFPeRpFav4HGvekvS2U1IwrB7kr4Kt3OSImcMQLsvbPdRqAWJ3yKCPHsO63rvXDo08b/nUvvfTJ2QdO4nMkKm/mwSDsHr3xXBoJ36HLNvwAyGaMDiwDL9EdgfZn+qoliPths8cmUREEtxaHrvvJyeVzgvEFVSwQUVKc/ltePa0OygHYI5WD8D5hzitOcQ5FvKB5Fxg7d3IO5FgVzJ7HpDcgQJuSwS6IM3JEeQeBdFErwBOQbEH3LeP3OH1o/rjmu47jhyxaqvhS0TOrZBwEMtvYILIpj4ruNaq2IXGYoDATKLtZUUMLlUYX0ZhpwWF7lJse5CdL3/3WGHrfR/XiE+MskgA0wVRe2ozsV17Vw0vX8ul9y2HyibgblAjMb4xRdMGLbsly4jy/ZDk/s3v8PeXBQpzeOsg/snma2vuIIh+xUEwdg9XBbQlU3H0qMAsNaCB8fgdBrycv9F/J+Y9nMGnv0G \ No newline at end of file diff --git a/.assets/logo_square.png b/.assets/logo_square.png deleted file mode 100644 index d29ed872..00000000 Binary files a/.assets/logo_square.png and /dev/null differ diff --git a/.assets/old_visuals/PREVIEW.png b/.assets/old_visuals/PREVIEW.png deleted file mode 100644 index 861841bd..00000000 Binary files a/.assets/old_visuals/PREVIEW.png and /dev/null differ diff --git a/.assets/old_visuals/PREVIEW.xcf b/.assets/old_visuals/PREVIEW.xcf deleted file mode 100644 index d3ee79bc..00000000 Binary files a/.assets/old_visuals/PREVIEW.xcf and /dev/null differ diff --git a/.assets/old_visuals/README.png b/.assets/old_visuals/README.png deleted file mode 100644 index c43b452a..00000000 Binary files a/.assets/old_visuals/README.png and /dev/null differ diff --git a/.assets/old_visuals/README.xcf b/.assets/old_visuals/README.xcf deleted file mode 100644 index 56be3729..00000000 Binary files a/.assets/old_visuals/README.xcf and /dev/null differ diff --git a/.assets/old_visuals/exegol_logo.ai b/.assets/old_visuals/exegol_logo.ai deleted file mode 100644 index 3e6e960c..00000000 --- a/.assets/old_visuals/exegol_logo.ai +++ /dev/null @@ -1,3327 +0,0 @@ -%PDF-1.5 % -1 0 obj <>/OCGs[5 0 R 134 0 R]>>/Pages 3 0 R/Type/Catalog>> endobj 2 0 obj <>stream - - - - - application/pdf - - - Print - - - 2020-11-07T00:39:03+05:00 - 2020-11-07T00:39:03+05:00 - 2020-11-07T00:37:58+05:00 - Adobe Illustrator CC 2015 (Windows) - - - - 256 - 168 - JPEG - /9j/4AAQSkZJRgABAgEASABIAAD/7QAsUGhvdG9zaG9wIDMuMAA4QklNA+0AAAAAABAASAAAAAEA AQBIAAAAAQAB/+4ADkFkb2JlAGTAAAAAAf/bAIQABgQEBAUEBgUFBgkGBQYJCwgGBggLDAoKCwoK DBAMDAwMDAwQDA4PEA8ODBMTFBQTExwbGxscHx8fHx8fHx8fHwEHBwcNDA0YEBAYGhURFRofHx8f Hx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8f/8AAEQgAqAEAAwER AAIRAQMRAf/EAaIAAAAHAQEBAQEAAAAAAAAAAAQFAwIGAQAHCAkKCwEAAgIDAQEBAQEAAAAAAAAA AQACAwQFBgcICQoLEAACAQMDAgQCBgcDBAIGAnMBAgMRBAAFIRIxQVEGE2EicYEUMpGhBxWxQiPB UtHhMxZi8CRygvElQzRTkqKyY3PCNUQnk6OzNhdUZHTD0uIIJoMJChgZhJRFRqS0VtNVKBry4/PE 1OT0ZXWFlaW1xdXl9WZ2hpamtsbW5vY3R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo+Ck5SVlpeYmZ qbnJ2en5KjpKWmp6ipqqusra6voRAAICAQIDBQUEBQYECAMDbQEAAhEDBCESMUEFURNhIgZxgZEy obHwFMHR4SNCFVJicvEzJDRDghaSUyWiY7LCB3PSNeJEgxdUkwgJChgZJjZFGidkdFU38qOzwygp 0+PzhJSktMTU5PRldYWVpbXF1eX1RlZmdoaWprbG1ub2R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo +DlJWWl5iZmpucnZ6fkqOkpaanqKmqq6ytrq+v/aAAwDAQACEQMRAD8A9U4q7FXYq7FXYq7FXYq7 FXYq7FXYq7FXYq7FWNefNR+p2GloOt5rOl2w28byNz+CZKKCyXIpdirsVdirsVdirsVdirsVdirs VdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVWTzwW8LzzyLFDGOUkjkBVA6lidgB44qvxV2 KqdxcwW6K87iNGdIlZunOVgiL/smYAe+KvEv+ciPzBsLGfRtBtKzanY30Gq3XBqCJYQ3pRsQDRn5 8vYAHuMtxxYSL1Xyz5y0LzF5fttcsZwtpcMkTLIQHjndhH6Ljs/NgvvUU2IysimQKeEgCp6YEuBB FR0xV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxVpwxRgp4sQeLUrQ+N MVYpp/ny3h1//DHmNV03XGobGTcWt9GxKq9u5J4sTsYmPIHYFuuS4eoRbKpYo5YnilUPFIpV0YVD KwoQQexyKXnWkebZvKXm0eSfMUxNhd0fyvqspJ5xMaC0mck1eI/ArHcildyKzqxbG6TX8zrzzBo2 jL5n0ImSfRiZL6wapjuLJqesCOzR0Dq3UAN44I1yKSkt/wCftA87/ltrFzo159X1W0tGvvqRIFzD PZEXCELtyX1I1o67fTtkuEgouw+dvNnmCLzZ5q1LX5ImQXrxlIq/ZVY1jUE7dAgGXwjs1SLNfyj8 02SJovlee4W0g/Tlxq17PK/posNpZrJErEso4tLHvU9QMrmOrKJZ15y/MaDzj5k03yD5VuGmtNRn 4a7fw1WtqnxTxROexjVuTdG2AqCaxEaFlkTez1vVdW0zR9Om1HUrhLSxtl5TTyGiqOw8ST0AG5Ow ysC2bDfInnPVfPGq3Or2aPYeU9PLW9ojhfWvbgj4pJCa8I4lIoq9WO7GnESkK97EG2V+YfMeieXd Mk1PWbtLOyjNDI9asxqQqKKszGnRRXIgWyJQHlDWdZ122bWbq1OnaZcgHS7GQf6S0RNRPcHohkFO Ma/ZHUmuyRSAyHAl2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2KuxV2Ksa/MDyHpPnPQn 02+Hp3EZMlheqP3kE1NmHip6Mvce9CDGVIIt495X/N3zV5C1xvKHn+N7qC2IWO+B5yrG32JFc09a I+/xD6OOWmIluGHFXNn3mqX8r/zM0EaaddtlnV+dhcCRY7iKalARFLwdlNaMtN/Y0IgBKLIkFh2s ecvzf/LNYYPMEdt5j0BiIINQYFXYBTxjeRfiVyoqfUV69mO+SAEkWQ8S1fURqGtT6hp1p+j4ZHLR rDROPI13CEKCK0PBVU9eK9MuiC1koexi4K0bim9Qf9XJAMShpopfVaWOoAZjXp8B98CWf+T/AM0b HyVpZi8uaQk+uXSgX2sXxLEg7+jDDGRxRW78/iO5HQCsxvmzEqZna+SvOPnGODXPzU106NoKNyt7 GZ4rV2JG3wNwjhrXqwLnwHXI8QHJNXzZRq/51flh5J8vrpXlcrqElmDFaWFr6noqSSxd7hwQyliS SrMWP35HgJ5suIBjH5ZeX9b/ADS15vOvnKY3OkafMU07TSONu0woxVYySPSj+Gv856k0bDI1sEAX zfQmVM3Yq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYqw78y/y00bzzo/1a5p b6lbgnT9RUVeJj+y380bftL9I3yUZUgi3yN5l8ua95X1h9M1WH05V3imjPKOVK0EkTjZl2+joaGo zIEraiFsWs6+mmy6cl5cnS5yGmsg7m3YghgTGDwqCAQaYaRbVjHUERhpHYElFqdh12AycWJVfqTy O6rK8XdVjRXG/YgslMaW1RbN/SKOjua7swoT33pX7sNItL4dUu9OvhNYTG3uYt4p4gA8beKOPiVv 8pTXKyzCHvr7VL65a61Cee5uZD+8nmdnZie5d6knBSXo/wCUP5M3nnG4TU9UWS28uQv8Uh+F7kqd 44T/AC1FGft0G/SE50mMbfV1hYWWn2UNlZQpb2lugjggjAVERRQAAZQ2q+KuxV2KuxV2KuxV2Kux V2KuxV2KuxV3XFXYq7FXYq7FXYq7FXYq7FXYq7FXz/8Anv8AlZdW9tP5h8vxGTTZHM2raUg5LFM1 AbuBB0Lbepx+ZqtaWwkwkHhdswVwh5pIfor7EEZeGoplYXT2SH0H9IzNQVVSwNO3INTpkxsxItNo tR1GRQUnr7cqkex42hH45Kz+P7GFD8f2rrnV7qOMICyzN3LKy08aNbwnfG1EWM3JEZLcOQfdQpKk bb12plZbQyL8v/Ier+c9bjs7dfTgSj3NwVJjhir9ojapPRV6sfapEZSoWUgW+wNC0ay0TSLTSbEM LSzjEUPqMXag7kn+G3hQZik23gI7ArsVdirsVdirsVdirsVdirsVdirsVdirumKuxV2KuxV2KuxV 2KuxV2KuxV2KuxVRurOzvITDdwR3ELdY5UV1P0MCMVY7qf5Xfl5qaBLrQLMU3DQR/Vm2/wAqD02/ HJCZ70cIYXqf/OOmgvc+rpOoNaI1fUhu7eK+UeHplvSdfpY1ywZj1YHEE28s/kZ5O0qRbnUYk1i7 4srpNDElpUtVWW2AYAhRTdj3OCWUlMYAMpPkPyOWDHy9ppZQFWtnBsBUgD4NuuV8RZUEz0/SdL02 NotOs4LONjVkt40iUn3CAYLSisVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirs VdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsV dirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVd irsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdi rsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdir sVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirs VdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsV dirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVd irsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdi rsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdir sVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirs VdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsV dirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVd irsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdi rsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdirsVdir sVdirsVdirsVdirsVdirsVdirsVdirsVdirsVY/f+bY4tQWysofrUvMRuS3pqWYlQisQRXn1xV// 2Q== - - - - uuid:0e2aa2fd-6955-4e00-bb74-630ef7462c98 - xmp.did:ed6ad660-eb3a-1241-a28f-d3d4ffbbff5b - uuid:5D20892493BFDB11914A8590D31508C8 - proof:pdf - - uuid:5ffb24c0-4e16-4f4c-bb10-80e09086c328 - xmp.did:64cd4f20-0553-4c4e-ab5a-fe809d337b3d - uuid:5D20892493BFDB11914A8590D31508C8 - proof:pdf - - - - - saved - xmp.iid:dcb77a33-bc4e-2a44-ad82-3fc9b21df040 - 2020-10-09T00:47:55+05:00 - Adobe Illustrator CC 2015 (Windows) - / - - - saved - xmp.iid:ed6ad660-eb3a-1241-a28f-d3d4ffbbff5b - 2020-11-07T00:37:59+05:00 - Adobe Illustrator CC 2015 (Windows) - / - - - - Document - Print - False - False - 1 - - 612.000000 - 350.000000 - Points - - - - Cyan - Magenta - Yellow - Black - - - - - - Default Swatch Group - 0 - - - - White - RGB - PROCESS - 255 - 255 - 255 - - - Black - RGB - PROCESS - 35 - 31 - 32 - - - CMYK Red - RGB - PROCESS - 236 - 28 - 36 - - - CMYK Yellow - RGB - PROCESS - 255 - 241 - 0 - - - CMYK Green - RGB - PROCESS - 0 - 165 - 81 - - - CMYK Cyan - RGB - PROCESS - 0 - 173 - 238 - - - CMYK Blue - RGB - PROCESS - 46 - 49 - 145 - - - CMYK Magenta - RGB - PROCESS - 235 - 0 - 139 - - - C=15 M=100 Y=90 K=10 - RGB - PROCESS - 190 - 30 - 45 - - - C=0 M=90 Y=85 K=0 - RGB - PROCESS - 238 - 64 - 54 - - - C=0 M=80 Y=95 K=0 - RGB - PROCESS - 240 - 90 - 40 - - - C=0 M=50 Y=100 K=0 - RGB - PROCESS - 246 - 146 - 30 - - - C=0 M=35 Y=85 K=0 - RGB - PROCESS - 250 - 175 - 64 - - - C=5 M=0 Y=90 K=0 - RGB - PROCESS - 249 - 236 - 49 - - - C=20 M=0 Y=100 K=0 - RGB - PROCESS - 214 - 222 - 35 - - - C=50 M=0 Y=100 K=0 - RGB - PROCESS - 139 - 197 - 63 - - - C=75 M=0 Y=100 K=0 - RGB - PROCESS - 55 - 179 - 74 - - - C=85 M=10 Y=100 K=10 - RGB - PROCESS - 0 - 147 - 69 - - - C=90 M=30 Y=95 K=30 - RGB - PROCESS - 0 - 104 - 56 - - - C=75 M=0 Y=75 K=0 - RGB - PROCESS - 41 - 180 - 115 - - - C=80 M=10 Y=45 K=0 - RGB - PROCESS - 0 - 166 - 156 - - - C=70 M=15 Y=0 K=0 - RGB - PROCESS - 38 - 169 - 224 - - - C=85 M=50 Y=0 K=0 - RGB - PROCESS - 27 - 117 - 187 - - - C=100 M=95 Y=5 K=0 - RGB - PROCESS - 43 - 56 - 143 - - - C=100 M=100 Y=25 K=25 - RGB - PROCESS - 38 - 34 - 97 - - - C=75 M=100 Y=0 K=0 - RGB - PROCESS - 101 - 45 - 144 - - - C=50 M=100 Y=0 K=0 - RGB - PROCESS - 144 - 39 - 142 - - - C=35 M=100 Y=35 K=10 - RGB - PROCESS - 158 - 31 - 99 - - - C=10 M=100 Y=50 K=0 - RGB - PROCESS - 217 - 28 - 92 - - - C=0 M=95 Y=20 K=0 - RGB - PROCESS - 236 - 41 - 123 - - - C=25 M=25 Y=40 K=0 - RGB - PROCESS - 193 - 180 - 154 - - - C=40 M=45 Y=50 K=5 - RGB - PROCESS - 154 - 132 - 121 - - - C=50 M=50 Y=60 K=25 - RGB - PROCESS - 113 - 101 - 88 - - - C=55 M=60 Y=65 K=40 - RGB - PROCESS - 90 - 74 - 66 - - - C=25 M=40 Y=65 K=0 - RGB - PROCESS - 195 - 153 - 107 - - - C=30 M=50 Y=75 K=10 - RGB - PROCESS - 168 - 124 - 79 - - - C=35 M=60 Y=80 K=25 - RGB - PROCESS - 138 - 93 - 59 - - - C=40 M=65 Y=90 K=35 - RGB - PROCESS - 117 - 76 - 40 - - - C=40 M=70 Y=100 K=50 - RGB - PROCESS - 96 - 56 - 19 - - - C=50 M=70 Y=80 K=70 - RGB - PROCESS - 59 - 35 - 20 - - - - - - Grays - 1 - - - - C=0 M=0 Y=0 K=100 - RGB - PROCESS - 35 - 31 - 32 - - - C=0 M=0 Y=0 K=90 - RGB - PROCESS - 64 - 64 - 65 - - - C=0 M=0 Y=0 K=80 - RGB - PROCESS - 88 - 89 - 91 - - - C=0 M=0 Y=0 K=70 - RGB - PROCESS - 109 - 110 - 112 - - - C=0 M=0 Y=0 K=60 - RGB - PROCESS - 128 - 129 - 132 - - - C=0 M=0 Y=0 K=50 - RGB - PROCESS - 146 - 148 - 151 - - - C=0 M=0 Y=0 K=40 - RGB - PROCESS - 166 - 168 - 171 - - - C=0 M=0 Y=0 K=30 - RGB - PROCESS - 187 - 189 - 191 - - - C=0 M=0 Y=0 K=20 - RGB - PROCESS - 208 - 210 - 211 - - - C=0 M=0 Y=0 K=10 - RGB - PROCESS - 230 - 231 - 232 - - - C=0 M=0 Y=0 K=5 - RGB - PROCESS - 241 - 241 - 242 - - - - - - Brights - 1 - - - - C=0 M=100 Y=100 K=0 - RGB - PROCESS - 236 - 28 - 36 - - - C=0 M=75 Y=100 K=0 - RGB - PROCESS - 241 - 101 - 34 - - - C=0 M=10 Y=95 K=0 - RGB - PROCESS - 255 - 221 - 21 - - - C=85 M=10 Y=100 K=0 - RGB - PROCESS - 0 - 161 - 75 - - - C=100 M=90 Y=0 K=0 - RGB - PROCESS - 34 - 64 - 153 - - - C=60 M=90 Y=0 K=0 - RGB - PROCESS - 127 - 63 - 151 - - - - - - - Adobe PDF library 10.01 - - - - - - - - - - - - - - - - - - - - - - - - - -endstream endobj 3 0 obj <> endobj 7 0 obj <>/Resources<>/ExtGState<>/Properties<>>>/Thumb 140 0 R/TrimBox[0.0 0.0 612.0 350.0]/Type/Page>> endobj 136 0 obj <>stream -HK wn1dAY9#|Wu=X~O+b)C~> Lso~C -)1{̥L5CV^[ET,8qϼN npU pո#b'y`P6WwXH.HL$yVp7Fj͜e~__` k8:ox𜒈1sSa삿UI7ҧ>sL5L^drryC~-mRL9pA d,37ڒc,p{Ƚ[A3x/RJs`` IK')9Xv"qX BjEMTG~q]f{͠`Wd6g|!}_'qMBY_C[:12&+:A]?΁D|$\w)^DHĊwjӉ88u:p n3lc4AE,gT!avĤ*ԗiiv#,=@I":8;Kx=dCOt{^V IP-fޖQ>2\K4)]wxQUa"Ü(ds&g < HbeXeqW1btyrة1iՀf]/KZ3]cZ\ DzpOdN2e*JHq8<%ҺvIK8?:0(ViZJ2I)X~&Fpra#Xgt}UU&S{` 40I,kMM6EmհJ29HT(|\bq,> #c9D[HxGY%UT"lc3.jt[ᗣ0qzJzC:%gd=( Pq -LiI>0kUbx޼AԼ -{JE -<洳xWA(l(!Rt*T0kDZޫR90I$n̰kjS-vź6ꪗ;RAxJOvR+CB%W!*p[[[ \$Lwf9AWPEJ'2ԧKj (w]2%IXHLӋC5:\G%٢܆gӉFU 2=qӇO_(VU9`S+@|*|%X):}6:S#3w I@b-`&d׈ӣ9'7WP&n(r1.ît7fJ֐hYZBU~G7b$(F7 tnlEIK#".v*gZ@ApbMhK*ww65jH"*3L"o2j=}aUϲ.Yw-]XyK.+U ?ڭharmp8m؊遶N,a?A$͋;O|;ƒRe[X5.ch@oעqWtmqe] t݄)`?&4&AYʫ "Jy`F>yuѯi ƖltG~u 5dn l,Hz9]]'jIb=Kw6\*ѰE(Հ|Np]*5xqD4fv%ryu91.>N֡\JE{ofRIVڡPVU=:/qKb{Qx3k15]ŧM׈[[{|X- 7F1qxxG63xQ/x¬/1?. |b(SfgAdʒ.9v&KJ.kKv <2u(η@~w> rehV(}װb\Y>Rd6hlEK%F6Y'6g_Z|Wd.n")/Hvu -] gNN3ݾ #Kz%0@Iп\B.oƯ'yKCLbS)M4g&bO -?e"N}ȎC UMYhDˡ>iR˟> hr;s㷩L!E_ˆ~}\-~(YkY@ѾkKWŌ#x 7IgO!AJȥڥ4iB Gx +A<$wgۭl}dw\^ Pd쯦zD X%Q(Xh˰Cd) ]ծ|?ԑg#s% -IUO]Ů̄z4Mt30o@}kVYöK+T+f7Ę\R>O3'"ߢc6]#P@ڦ3nMK҄g,0^{=#r2k ^ɕLq66Fc)+.=^w'TSAT~xYgervk$,n'N+ Vw0A]Nك-kVLOaɪ&YpgDV"Ƕ3{Z]!1R5$hڏ*v@V'ϰd}յ;処MI% =>xZSZnÓj -"?J/ErWPΛK]ӫ}iLe8&@g"&5g̜,KJ0yY7d"lo%4}&C|$"GskR)_bj?B[tZ~c(N0#jBM-!eL_$Z% Ua#a7XCύ&9,Six{Ǵ)1\Hޟ)dJU&ę`xKtG"N+bqh&!qjN-VХ~1 d:zTJM -W?A-.0JVK6G|a(0 $E46)qgqJ0|K6cr[R,KUmtQ)ʗ9.=$!jbޅPUV1;w\]y=C`E>6T㋬̮O",; W_W~U'+*>{.hYe -ϫilIg,( - ttoۚ1d\Hbׁ*ӿl^ 8pC!"ٍp:yxƁooRVKQWՂd5U\~z xUB-RL?p'W˥;!]","zS)8 '[}Kz6ͧFrK%8Qb`IH<$uK~lvw&e|xU/2Q'N -mFK)y}cMi~3(Ɇ9V]C=iܖj{ fu79kovmrf뽼ըDNsO'Y؁8PM׸Re׋u -g 7d" -w|(oUb1pʩj(4\tuPֻӒ-=dvĤH'zaAfq(6ѻXnJ6{=T+ǚ"2>KDIM?%'*;x=:n(K"TnW׽PѹDHWZܔIKJ5+6œ[NAiKS9zop!Թ&F7{|@ S~z|$j5X’4=tErM%Bj!LYqM# aoo[v \L5Wa:;siIv}ʟ睨ۯPuqqۘrG%=J<Ш_[ZM㐦h#<Vh4iy9']JI^|#4q؀EByHIq-¼Х!HCvrg \C"oӭTjXXLOw -i._ꑢ x2lHh:/4Z}`ν7gbFP pwN~\nm%' X6$7C: [I -FK$[w u|K,޺a~d ܞr2:<0`;r{M7Ox^ۯx܃=.L_v_)=AUTQr9xQok]/p[*AZ}+MU"Qӛ%T]+Z^'vkkib ͹@YX-XG)][yh ;5/UmZslWZ@n.SDr $xu -]Fsman; -Wt$TV%BVUT*f_ ;/Vkv}L~4%]Kl"OKlWy=mias!iZAǁKA,6:6جh ->\x E`U7Jt$SM@=?!oWhRtZ2EH)AФ ye@QJSeԳ4Wx. N2]oNCHw*r#=LlDxf`%C -U{`:% -I=*e'혚XE^ -z0w^P#\Y^T[e}H -A`Y`4VRuuw>"\?Ӄ<ۉ:DSJHV(@tۑ,kpC\u96x -Ȃcʓ/(w'%YC#pcQpFqji kuш67)Pbb<6$zAgn%ɸ$gܲZũ1b#Tq>`IDr.7m -uujk qF9xzVLSǀYo!1lx'}5:VgPeHP颺BXi 0 S:tjSdX3ˠ;M\D/_u6j(x$MeSk՟N{w$uaރn0PbXJp{0W4iw]Q*8u7d"2jsfy'Njɰ|,yuV`e4|o@'h2袲JzrQ{X0jL >yaQu*"zs&)vy&-eɡ.wAɜ8툨]qf@i@PC"UK84ּȖKnò,9Ix?g@ٖ|Ԉi>|yG6e7. gzQ{ctX@1@1HW>BQ^$ftO\i W|EjőK#cy}ױ"I='‡ -Xv7cn/9|#.٩ǯ#߃ w_ݿ6 _ngda}i?94N;X |ӂ.q/(%I@9ϗVePw!DE5;'d5PnM3 I3:S*:7p3MIA 1ȭжj2BR1v: -eaS~<*MK 7K_od}^ ZT}BI>G g{Ix-LeQCtXM1iU!' TA-%120scaw '˘4}9 +[K J,oAaHa ZU۫X!/bgԘR쀠NscoS\&*Av#H1~*Ϡ׹&JL`D鮏Uq Ҡt NOeh"h)咽MCj"pe$}Y"T"(;u&e m_'w\oaBqi W7s ֋HӀ'W $X0_ՁY2jw@~6?K3 ky+O'KJӡ=Lp'|{PW!pUo^~~Y -5Y*It>z=[@Q - )qm_@ r6 +rT$ѧR -lr(^B /;&xc{G5"Po\αrU_⧳Nf$j o%'{rh5R1V=Me]ߎs7 \min&'\~[env`kAwATܹ\a@:~(^þ؊إKZZOX:iBz{~XzG -/\Q,<#Iǹ- x<DCK`>= -lgbRYu7'XN.O? -endstream endobj 9 0 obj <> endobj 140 0 obj <>stream -8;Z\t99Oo]$q-F%7_R5Y`/5Oh9DU[o[DXGN,^+pBR0B=D5Co^)/>om;meH+p$ao%^ -XafV/lp@g)IHa10dO#7\>@rK97%6K5(fGT`N:4RQFYT6`ViUI@l=NRh;4+nk3ig91 -\=)RVW>@:_`#rd3i&CM\W<%&;G4[GORrqJ]X=9s?e;F5[PlN0hj79PWG,oq2#[9Bnf"B0+]j"bb.oO)esqP.a"/hW31A]p;Ij+#^(''H/cp[^E] -4GBjd"K`Ylj6DH!/(49J`]4I&H[!LNN1U+NTESh'~> -endstream endobj 141 0 obj [/Indexed/DeviceRGB 255 142 0 R] endobj 142 0 obj <>stream -8;X]O>EqN@%''O_@%e@?J;%+8(9e>X=MR6S?i^YgA3=].HDXF.R$lIL@"pJ+EP(%0 -b]6ajmNZn*!='OQZeQ^Y*,=]?C.B+\Ulg9dhD*"iC[;*=3`oP1[!S^)?1)IZ4dup` -E1r!/,*0[*9.aFIR2&b-C#soRZ7Dl%MLY\.?d>Mn -6%Q2oYfNRF$$+ON<+]RUJmC0InDZ4OTs0S!saG>GGKUlQ*Q?45:CI&4J'_2j$XKrcYp0n+Xl_nU*O( -l[$6Nn+Z_Nq0]s7hs]`XX1nZ8&94a\~> -endstream endobj 134 0 obj <> endobj 143 0 obj [/View/Design] endobj 144 0 obj <>>> endobj 139 0 obj <> endobj 138 0 obj [/ICCBased 145 0 R] endobj 145 0 obj <>stream -HyTSwoɞc [5laQIBHADED2mtFOE.c}08׎8GNg9w߽'0 ֠Jb  - 2y.-;!KZ ^i"L0- @8(r;q7Ly&Qq4j|9 -V)gB0iW8#8wթ8_٥ʨQQj@&A)/g>'Kt;\ ӥ$պFZUn(4T%)뫔0C&Zi8bxEB;Pӓ̹A om?W= -x-[0}y)7ta>jT7@tܛ`q2ʀ&6ZLĄ?_yxg)˔zçLU*uSkSeO4?׸c. R ߁-25 S>ӣVd`rn~Y&+`;A4 A9=-tl`;~p Gp| [`L`< "A YA+Cb(R,*T2B- -ꇆnQt}MA0alSx k&^>0|>_',G!"F$H:R!zFQd?r 9\A&G rQ hE]a4zBgE#H *B=0HIpp0MxJ$D1D, VĭKĻYdE"EI2EBGt4MzNr!YK ?%_&#(0J:EAiQ(()ӔWT6U@P+!~mD eԴ!hӦh/']B/ҏӿ?a0nhF!X8܌kc&5S6lIa2cKMA!E#ƒdV(kel }}Cq9 -N')].uJr - wG xR^[oƜchg`>b$*~ :Eb~,m,-ݖ,Y¬*6X[ݱF=3뭷Y~dó ti zf6~`{v.Ng#{}}jc1X6fm;'_9 r:8q:˜O:ϸ8uJqnv=MmR 4 -n3ܣkGݯz=[==<=GTB(/S,]6*-W:#7*e^YDY}UjAyT`#D="b{ų+ʯ:!kJ4Gmt}uC%K7YVfFY .=b?SƕƩȺy چ k5%4m7lqlioZlG+Zz͹mzy]?uuw|"űNwW&e֥ﺱ*|j5kyݭǯg^ykEklD_p߶7Dmo꿻1ml{Mś nLl<9O[$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! -zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)Km -endstream endobj 137 0 obj <> endobj 146 0 obj <> endobj 147 0 obj <>stream -%!PS-Adobe-3.0 -%%Creator: Adobe Illustrator(R) 17.0 -%%AI8_CreatorVersion: 19.0.0 -%%For: (DELL) () -%%Title: (_nwodtuhs vector final files.ai) -%%CreationDate: 11/7/2020 12:39 AM -%%Canvassize: 16383 -%%BoundingBox: -184 -984 878 -288 -%%HiResBoundingBox: -183.549012271875 -983.364591902042 877.833221319839 -288.506329113925 -%%DocumentProcessColors: Cyan Magenta Yellow Black -%AI5_FileFormat 13.0 -%AI12_BuildNumber: 44 -%AI3_ColorUsage: Color -%AI7_ImageSettings: 0 -%%RGBProcessColor: 0 0 0 ([Registration]) -%AI3_Cropmarks: 0 -571 612 -221 -%AI3_TemplateBox: 306.5 -396.5 306.5 -396.5 -%AI3_TileBox: -90 -702 702 -90 -%AI3_DocumentPreview: None -%AI5_ArtSize: 14400 14400 -%AI5_RulerUnits: 2 -%AI9_ColorModel: 1 -%AI5_ArtFlags: 0 0 0 1 0 0 1 0 0 -%AI5_TargetResolution: 800 -%AI5_NumLayers: 1 -%AI17_Begin_Content_if_version_gt:17 1 -%AI9_OpenToView: -33 -212.333333333333 1.5 1477 743 26 0 0 78 112 0 0 0 1 1 0 1 1 0 1 -%AI17_Alternate_Content -%AI9_OpenToView: -33 -212.333333333333 1.5 1477 743 26 0 0 78 112 0 0 0 1 1 0 1 1 0 1 -%AI17_End_Versioned_Content -%AI5_OpenViewLayers: 7 -%%PageOrigin:0 -792 -%AI7_GridSettings: 72 8 72 8 1 0 0.800000011920929 0.800000011920929 0.800000011920929 0.899999976158142 0.899999976158142 0.899999976158142 -%AI9_Flatten: 1 -%AI12_CMSettings: 00.MS -%%EndComments - -endstream endobj 148 0 obj <>stream -%%BoundingBox: -184 -984 878 -288 -%%HiResBoundingBox: -183.549012271875 -983.364591902042 877.833221319839 -288.506329113925 -%AI7_Thumbnail: 128 84 8 -%%BeginData: 3230 Hex Bytes -%0000330000660000990000CC0033000033330033660033990033CC0033FF -%0066000066330066660066990066CC0066FF009900009933009966009999 -%0099CC0099FF00CC0000CC3300CC6600CC9900CCCC00CCFF00FF3300FF66 -%00FF9900FFCC3300003300333300663300993300CC3300FF333300333333 -%3333663333993333CC3333FF3366003366333366663366993366CC3366FF -%3399003399333399663399993399CC3399FF33CC0033CC3333CC6633CC99 -%33CCCC33CCFF33FF0033FF3333FF6633FF9933FFCC33FFFF660000660033 -%6600666600996600CC6600FF6633006633336633666633996633CC6633FF -%6666006666336666666666996666CC6666FF669900669933669966669999 -%6699CC6699FF66CC0066CC3366CC6666CC9966CCCC66CCFF66FF0066FF33 -%66FF6666FF9966FFCC66FFFF9900009900339900669900999900CC9900FF -%9933009933339933669933999933CC9933FF996600996633996666996699 -%9966CC9966FF9999009999339999669999999999CC9999FF99CC0099CC33 -%99CC6699CC9999CCCC99CCFF99FF0099FF3399FF6699FF9999FFCC99FFFF -%CC0000CC0033CC0066CC0099CC00CCCC00FFCC3300CC3333CC3366CC3399 -%CC33CCCC33FFCC6600CC6633CC6666CC6699CC66CCCC66FFCC9900CC9933 -%CC9966CC9999CC99CCCC99FFCCCC00CCCC33CCCC66CCCC99CCCCCCCCCCFF -%CCFF00CCFF33CCFF66CCFF99CCFFCCCCFFFFFF0033FF0066FF0099FF00CC -%FF3300FF3333FF3366FF3399FF33CCFF33FFFF6600FF6633FF6666FF6699 -%FF66CCFF66FFFF9900FF9933FF9966FF9999FF99CCFF99FFFFCC00FFCC33 -%FFCC66FFCC99FFCCCCFFCCFFFFFF33FFFF66FFFF99FFFFCC110000001100 -%000011111111220000002200000022222222440000004400000044444444 -%550000005500000055555555770000007700000077777777880000008800 -%000088888888AA000000AA000000AAAAAAAABB000000BB000000BBBBBBBB -%DD000000DD000000DDDDDDDDEE000000EE000000EEEEEEEE0000000000FF -%00FF0000FFFFFF0000FF00FFFFFF00FFFFFF -%524C45FD3BFFA8FD7EFFA884FD7EFFA87DFD7EFF7D7DFD7EFF8453FD7EFF -%5952FD7EFF5227A8FD6EFFA8A8FD09FFA8A8FF53052727A8FFA8FD04FFA8 -%FD66FFA8A8FD05FFA8FD04FF7DFF282E27287DAF7DFFFFFF59FD60FF7EFD -%07FF527DFD04FF527DFFFFFF7D7D2E285205A87DA8FFFF5352FD05FFA853 -%FD06FFA8A8FD51FF8453FD07FF2784FD04FF277DFFFF7D5227522E285253 -%FFFF7D277DFD04FF7D27FD06FF597DFD53FF7D27A8FD05FFA800A8FFFFFF -%7D0052A8A800282852272827A8522727FD04FF7D007DFD04FFA82852FD55 -%FF7D2784FD05FF7D05A8FFFFFF7D272E522E28532E522752282827FFFFFF -%A8530053FD04FF7D2752FD57FF530053A8FD04FF5900527DFF7D2E272827 -%2828522828272828A8A87D2E27057EFD04FF520528FD59FF53002E7EFD04 -%FFA82E2727522728275228522E52282E27595228052852FD04FFA8282728 -%FD5AFFA8520028287D7DA8FFFF7D27052E282E272E282E272E2828052827 -%527DFFA87E5252272700A8FD5CFF52052E2728285259A8282E28522E5228 -%5228522E52285228527D842E280528272827A8FD5DFFA852002827282728 -%2728272E2852282E27282752282E272E2727002827282728277DFD60FF53 -%0528272E272E272E2852285228532E5228522E52272E2728272E272827A8 -%FD61FFA85305282728272E27282853282E28532E52285328270528272827 -%2827A8FD62FFA85259272E28522E2E2859595953595359537E5352285228 -%522852277DFD64FF7D052E272E2752282E28522E5228532E532E52282828 -%5227282752A8FD65FF7D052E282E28522E52285352532E5352532852282E -%272E2852A8FD38FFCAFD2EFF53272E2728052E272828532E522852282827 -%2E0527052E7DFD6CFFA8A87D7D2E522853525928537DA87D7E7DA8A8FD72 -%FFA87D525352A8A8FDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFD -%FCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFD -%FCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFD -%FCFFFDAFFFA8FD7EFFA8A8A8FD7CFFA87D7DA8 -%%EndData - -endstream endobj 149 0 obj <>stream -'R=MZ/9qY8(ߴÍ޵/gbZh:hcZBB|~yq|~r~Ժ`B*='(vĘw/z$Cz?~/vh=ݼww;Z9;۰zMµZIQԧZjdN䴁w=Tt%~su:Rqqt\:)r5)hy mk嫋BtZ:-\l;-ZfDE-O_М{0ls°*cl e;# ^.ԺӫFBLۨI[il'iV! )[ԭcu⎩pLu+77ae=|V*~X8)ΞqZNX8ySx:.\'5M6 ^/Oېxtu,urpP.nT訑T8+ ܟBQf.uZKmc0sevGXEz7u)~d.oRKL=haR.Kw]\R;W]jIR;#i.oRBht:Ph;|E邉 *6צ' u[]V˿NuBxlQJl1d![lqFBePK!S b[cxUŐ)L1d-1^7(&ދQ֐LinHiW"n'ۈحgs,YsKOBmdn}^No+УUg٭2.Jv -)@[dBhnSX*,FQJ]`9 Q5.FuwFD\aÿ?q!11u|Cinsُnw&V˽\x"?R6vほHGX - [݇a#i^f";H_j!czq _u-mu-:At7}WDq|}|ZnCE|'ՋOBw^ O-Ah~Oh~"FhUh~GRM,0ԎGIx4a<~+ -#aUaCvʇ7W6аN>)_"V n}d,5 c:KR467ixkO{U}b;îk1t-~lCbW{еȖWT:6[,_OJApv[Bs._yjn阜WCX|zs}K:RojL<*r]-!c)^&e)T#P:H}v㝽@zғo/P ;COT -=Q'*DzNn)rH^3COԇDuNuttS-k>89{^r.^УvwydiIiL j;ӱg'Rt5pꐡqP(erW\\Y\*ܶ5kS&bE3'>hDž7aOFºݭ{ܗ?>h77])k[DLDo{z^|.Kqe'l[)-ݶ]-ps;g^ -x2-\)a*6{S>h'Q_)Тn6TjmԆAvބe?:o%v_79oڀ(tބΛy [)mBM輹?ΛOռ.wߍBp2w^n<W^hW:9}q{:k2~4uYtVl$ )HΗ[u||Ξ1Rlݧku-,",VmVٽ,UVj3Tvky6yo貇mASp}ksݡ/[ܿ9q|aA<َ[;} =ms`;V`F`/]˩jC{":-=i=wcFx@ ]uZN"> >m\hih~Huۧ>b)kchjhjhjh6} v-5*HFe {-]u-,r5X#RG&,"Da)*k|2 ?hyθO@O/O -W_w8ߝЗw -5 {KxAct7(dg -]&nBݤXMgFy/^HwN]]nqXgoN9nf h }^B; -fMB&wv&&ۅ^t|cll))޴ȭ)Hu/MICɷ90K·xH^kg~ZW^ruQ*ޜ.oZnҺiFV_ußۋ]*h!->~>(haV}K -Yם" -nvNa`ѫ66 TDfO@tKMDV jہ3¸pY>>-ӇΣ?)_/ʷȡL -w܆#2 BCH(L.-B|Er/޹=} sN[7'О4^p{Zz_eN ֋xCٷH˰6ѿHWc=ٱ }mFgM(vKhuω޿9;rṾ {;Q{پ+6+@{5r lmev[?ۣdw_-6KSˮqu_^rH1Z6=u7uMݜz _<#iab&ĮDT7}W. gWmBA;Ľ3~v}~f(}2yr-msG3ztDUqrZ{gz4f.9t=E}`7dn50&bEf#ۻFX1O +"͘ 9**CPKY8V`gu3 iu4L<p+ Q)_lp,;' cE#]wb0 yB::5X8s CD6$t l&sCL2lˢķ"Vp1 !7ȩb0NFpɨAR4q፦&0q4`#ba?, $'f"mdI"H c 3Ҹ2"eé?{cLV»l?];`RN!Z][+D$ѦCEL$XYٖ8xw0{mXvE"*+i5C/Q1W;iҼpWf k:JwuM\st+D)g̸<=zD ^_6L`@% -Ms "P#nc ܄㘃 -1Q4ٲ"yBahILdZE",11D<~* z]Hz I۞#*j_oU(MDD4ѭ\͎8h\wE;Ӷ\Q6xx kаJ,23& -*:K]K2=rѻI v.vm @02Pl,dθ&dPҼ&{3RfqNgߔaK"a`& -bld WA= @,!Bh icLaDVzXv * wbs`^iv!v&PH)!%$k7 .Q)ڸ69x߸L(ryT $.L{\6$7'mB,TpM -pqh h~JG boMɗ3Š)P =}sQ {Yiz-\RˑA6HV6s1A 6?r~ v F$Q(Rt )B[fSe!P75p4im.Z]uAη5`< ׃KI-T=ERVS^`lHҎ.m֞y7d%*AP1aZ~l]X5rm!$Ŝp ij3A4c@ +@j*s`yF<'|CT=>%M -] `@zbg@R 5) , M'T(B(Rk4#w.߃u+. -P%#; Mdٻ`M-ŞD#DzCfc0dn*t9FN6ZlK c=0|fC 4j'k\"\= -d͖Ը\x0qJ3r?N 4b\B<ТˆL zY<\lFr嫃*?"հ i9%@2 U8%^)=.Z"I bk [ftа,=Ј -=. -pL[.3,,"ߖt\IOqK[g'7Lh#&F`l#5&c%[(vۃˡZACFte;⫗x́"w6PH SB]l!{wK`iZ  t5f}r4Cz4CKD \Z*1yށ>C:kL6~L,6"OMYbѥ")Kv֣N'+ɾôO, tXyP6)fNa2 F:LN$xn˜Eل w |4I0 s2]&_E I{2ؼN 'kN?I6Nsm $\7̑Pä\[g 6";1 -b Khm`Ʌ هE qY0ȵ_UY$iaM# &ӡ,^z!b9 Mr5Aiz4L7lZUpg8`ʣCI 9>̓ 4":Bgky1 - o:lDJ -K@0ENFQOAʚV JT[3@ӢrGyXd9TdX1iVcC_ a5뼵9u 9wD3P{->zh ȩX\4gF;mr!P]PSqd8u[I>G3UB"/Hp(KQӽdV  pJA}@֨5 6$cttre͝Vs%E)]@ twXfFhLdȯl did@>LM2x)"|[e -0&h b_#( T\/JDmҽ(詪90cM-G0thej TCk0,(gLg/0@joyDTDq)c 3<ߪuvC';ɠ SJ5WDz# 3:Ӂd+Q7\ʦ:"3-B_y:/¶O)ĥǗ,i!!5[? xQIa/:c1\2rY`*AKxHÊuA6DnV@ҧdKcb"U$j+Kh=P;Q~ &8iL2Ҩe˞}S;-6RRVyEOmHm@rB !4PJ?&|s֌- JF5h` &K6˩l̻ $ 5OӁ>=FzD}̧j̹ -&ikQph)mS*$a`^OcOC"OD8G:11;$98%k™MQE+ -&\#%1FC&QɆeCt>_G-I/ -c7Dk=N0Sr"MD@0:a4 r.f&4:t -t/|Anqp.6q?4%TCfU {Pz-F;ccv,IzS7h -0R-!0l8 IjGdjKOz:+A%^eEd(eӖuG: >[W3`Mf= 57땩"|5fE$y6F010vt$D(g@à,x3zݭ_l:ZDo6;„4tRɣmDIN ; -:asӌQOT`sdDU -V*iŠ.MTF8ލ#  v$Ϯ}Je'i ^ٍqj [Kj0pS<|mS9%W_BVd|Rd<߱>+qͯb'eB/J$cHyk-d&UQ]@ M~ޖJnC8odۄCa'=pYte8] ˃dJtH&3"pA?^ gǔJ -H^҄ -]Ќ Y - (IDqZIZLc;DdPv4Wa %D*mLe@<4~ -*l;Tq"SsU.bKny6lX: Ud.Pu\|R^9%a#XY tϩkc1U|3*S3 1WaL}C&*c+O -U -݀ϜfY+$3ϐy_тf͘U{+U^of&}\JDuϤիpi-m@k͐Uѹ}?\~lTdѧ/!kPu]{|4n|T29ӵ5W|2Acza=f/J]p25RH߷իMJij-nc057WU|?-)N;',|ͅRPԌ>W[|7WWWX㽡u}W{ejsݒY铓Yt,װ%`\a`fJX6& htH$P4xo :G_WP(>3E}\3ls9,KgKyVZSGL`I G@#HE~s ԯkAs(wYyMp]WItu`[nֽtlׂ}#~(׵׋oH1\p4w:?`:4d\`GoI9uXФ^kJٳFAD8qM ACs0%c&o;)cd5Rc+luz"2o{BHG[_COV s 2 *PAx܋e J4r?lA)96h2nªHP3e{bnK岤w Tnx HeV5-z>Rc.n7sdLH(?`p} DZ=(0) 购AnZWNo ) jWE~% j -(ZԝT|lX O{t4| @ȣ#x@j#$^c%) ՈP5GO7(15a67rVSX|Ӗ7 ەQy/,Q.-; (4{#2sԭNaslX5Zi0H' {6/IMpe+I -DWlGV ۱Z\7PH_ F<T*b b V&iᇙ}Xhp k V.=S** pA`Ti->m.g M[`xTcS,#L+ Q_:" $|VXD eQ„ăJĽgs9KjrmpS=+C-HȔ@M\ qS.tN\KSP5]jcig)!`m%uYTG#?EؓFM`U`KG Z:\KQL.Z˖v\ƅp+\Q(rrJiĤ"1H\Kf~}1C|6[ dľe,\}BzSu #ߡ牍$C K'PIh&"#!uS -1TRވALk`m!vt==ց]LIU4XxwԺ9G 4W%Ҋ:-M6f׊&*rJ-HGI|pz3DAM֒q$GL+g:61*qSQ;ϭ =pHN& Rj䏠!s*aYdcI -3hґ_ [G~hܤB3eJ uV*0pQKJ XW7]6RvfFM)tyXE k騻 \?c& .u~ "ӪtǶiXCp7e\jT=XaGE肕|Z6X̥"Dr5EDK:2yۃ ej,1M.61KBk `~FX Tv멘C8S!1P<ͧ 5 ->N]cWxGLx&7]uX:. -t(lȓ⅁!*:Wt]G>ƒ\Zemѣ¢ dĤ:Ԑ iq>-VbY/_6;::#-J$J&*l-]Q)vҮGETC MOt=IV|=p# ]lĬĞߩ5N$] iI=,Ey6lK2Zb!2-.9EO˞. RBd$xl6S -R -GM`Բ]QY8|g9 Ӎm,tUD? HRqR^!P9D(\|tvb>2Ij5Tj>f.5@-Nnʪ,)G0鿊[x\xtR,4iO@k)* -Pݷn ram$*;`'h);,NS(1Sڵ<*B+Դe[AZs1[[ ,C-"Ra~I5j%6GVTx - IU -c+R1v=jǑey/|^S@^ADaZi"ä,b"Z%Z…C]RbO%\q -Ԫ|Z3pp#$p$2WXRG -J~#XK -EɵZm.`PeB:E2ۑUUShmB]2 e,GhKrV)4cv6*<9WtG y8>G_LfER$CQ |?7Wm ҈n -OQ-T 6u8Nvj9Mm_¤(PYPx6h$?- -V] )ӝME’g94yՂRT䗣&\HwlpGP 91D`CsOFz8"1-)K;Ü bFģ.|]hy7+~Rֵ1FT@𻞃ݻ$&cPt"Iqtq@/l^帺$$ ē -OA -ε*i@ ȵl:qg`p$r,Eԉ,0Q&7ɘI?5ӄ+٠+]xA?;A>G&qvx U89ӥ93Q:SESG@,_cKA#k9gF"3>(crhNI3eHcz.+2ix"&(aTB>IÑY't-|NKQz!w[z+958|ztV_.pۀ9.4 @=*W‾$Eq1/DD1&Wha@NMsOUR]2TPGs9@z! SN* gc$&%! GG)@g?T(],wH۪pbqVQŌ9bY9o FnzNKcHNl1pg,Or*TSJIFw 5'\((Z("D.;!kԩ:uQܺ.Uv9Pq%(H*<ھhn@=% 9d_ s.<`F'X́ D ACXpnxbwкF} @k4f5j#XgkXɓrVLb `Aы7Jhw4BQE<wN94do4Xoh$gkMgku8GKf":x腯o16'mLcN P0q''짎991܃9hWpc&[TN%fa5J;zO?݅^ 2QlcGg),$舰D̙ brjm>8t|k,Hܩc|wi2/{4tE9qk@EY0,<O5kk9(pPg/0Ԯ5 G (S4m7K~[BecHYb$Csȭ˪yKR_S6.J9%\l*^ Q;zb\'GZElWyrs_ւtBm\hʷou +ۓ]C DdkۅxM x_ /Dx4?]lt=~om6bsŖ\Q~1 $Y1MofsD"4@3eb @EM&ll>\l(p/ܠ)+\lC鲖x<֚=>qlm($i~L(>d,#)v "m~3ǎe A‚ZE' vILNdaKF$W~d,SZgqYols֖)ELžl0MAhnՠ7* %COن8!AաtQ9)Y^zvisEo$IxiSn)^# ȧ4'4 G(J%!R;:x4C:e̷n8R 2TX A+a!q2Z (g99$L$`I1O7`9VoUQql:ZDtdB؂A8fp2sryqA2N\{1s1P@cH̄!hfEs,- .@ "pj\0%K`lQt,8qM݂_p'T1jW̛1sl >kl\Ǎ y~fnksxbq;w"dIxy uyBg*3;+!+5(AC#4EHY7LpkTaUEɭJķ*PZzb)oX -MCn~E*,y C"em$^BT= -fcV6[ -öso{+ -]wFyZp|խ%̪Yt&`ΟUEA $EVf3ۋHע0C(0QŊ+"z. eEdU#Y#/ς+6{Iq<"SH BɛOQUPezH2؅bk|h^*i0<e9wªTܱ2z` _g -#:BY Hi#-(-c{X@l.[JH3`pƺ*ВUY\*ABKV UAV B]*@b22V 9J*A+ВUigY%sV U|D*m*Qn24ɒV1Vb*, Amvh# N !([%VJ^&V`.[%}XJ\06xyx+[%b(cl<J8oHP9J*AC~)ph8T`+!Evj<44sݿe|JI Q9foQ쮆oV*Z! -<,\X* pH}0D^wPP3Qx -ɡ 'pzNo~λ"mw[Mu /sY،S GĖ.M[Q`q(+ -? -!E89fv"N.p~@4,s }x=haw+) TXgezKM z HD[f<3{n*7ԽE܀h)eYY T{2maDM`PϜ)Jk)j# eX2 μMKv h~!ScEҞ:u={',tʯ.fe 82%4bp[ןzE3*F'rհ⠜'g/7u\t,07,\pP‚ns|P/>n`[q8OlV'_~ypa)0]hh1$ID]q0!yZ+s!i#̷N_[{sTC3;*&ʇ9aպ@`n/#yʑ8WW%, < -T\9M6dG%^$sd!F3LQ d+Wa=ʔ◯)I{pJ㷥tqih] )mz+6 (W^osX `FkŜ(2vP)P慈Pe5^$ Ty)LKbUFbJTyrj8Aާ Alm,y-(X4\V%>`8e{M}˖E/ u=ȡE12HȊH4'9Zтr˞%4p(ZG4VL84q{H0p:6QՌ=n8mEPG=}#^aP`r6@cX(.Ovz "XOF2z2vc !z)4^ -kHiz+UD@7+cEJ)SwR%ʩOqÄqS:7 -*>r='J4cW>tSFs] -pΆG2_S .XKsJe_\x-Y -ͽ H'8.QrMy7;yx:DWW~#f˚MNbP -;j1<[Jf혃/rD%e3 -6%ҋY5Q|K?)Y/]4°'c]ӥ`Bx2$wZ 7Úp%|?|fS\53quLa7SP)"NئJk Q`0BCf-- d߄t>-882ճh[0Z*5L)G 'W~A:&<- 5b62~i%3ЀF dؖxvt'؏ F/N^q0v̘dY7d*ߙ4C!TCO+7C,t4ʐ90=t!WJDqu/4k*7Gh oUW\n𻂦 eVH=Up-_4C1P45*zQdNȃCr"6̐1J{нVՏ_oz'q5~ aW?Χnyw!,.u:0;_FqZmZoS{\d ztfH^cBC!"`LDF \Jg_4꭭z?!Notny=ni>nAk_vp/G^Ѭn>T>O#OK0M6uycꧨg3v9hMctZyҼ2iRi0w}L}L\@xbqŬYqa\e C#~*#dz䌏c,KJf2q1j&B`(ZM\F@LbL\(xF&ԵQU0Orc7X*PG մ$¹$̇1wbPu*Vp>' $Zi%_8X$s%?8YIǪjQ̑Ks#Cw\)f= %4OsأDfVR9Gc:S-!B{*AՑbR,Ӈ ^GP^Qp,bg -r lp3IHXa9'M}/^ ~#WxT8E_$ kFzO0-I@VHᫍZT:t,*AR2UJE `w(6t.8*8~^x)AA%X+n9_BQx"B"kY) hbW'gpJ=6$~mbiS#cX ^asƋ@&ƣIm>p~$~=$#T^G_0)M7TX2=H(ST -iiXb,NapXl) ggph&517Xc$8^%zMj y1|8#8f?g=&‡Y/Ga9Miχ3QhEbǀ[g0O#bpI/ G0@mRiJc$(e.nNK!7yk~_CR)xBE8U,ΘPDNqOD!b5vk" ɨpYyD{ic$F T '|rr[gzqRh40 !ŀxq'ƫ,quLyDT QO|%<)SCMAVTkDXR؈q7FܐJ2}D{,eZQ?5ѳpuo諄iPasSk\1#1Mj4fp^c\ [D&yЮy;HZ4sI26Fbb"q"E^rU$ϸ%H@.UJBW@Ob }7cǜS+&`e/lZ }NW),)l ;ߣ"LN$z!ˊ ,Pm2|or4laqBG, -SKr70Q{}e^#v"Q ]J%N)veY`(@ pu1+Z1!~̾@jƚ\HdBpfkǺfM) -6Oqu.x6#Dy=J/]f+M@+(RJZҲkT퀔X&bǦG3eP &pTR8f s9/  UJ2[ѮnDa[JK H -0 ܋e AP⃄a bNM -ɩcRcpDV.Iq(I&*w7lVם+TPBRߨQL*b.`%FU0f5!lQT]yJT )KƄ <Ō(mBMm3P69ހƥuyO"9dxFYEBdll -8dgHC!^d+.mH>9ּć'|2XP󠠕^6)Y%KؼxبeI0Ñ%[NKˏH S75[A-Ի5A Xh}FF^2_Jኬ2)$zD+WJ*(+rČ`;aA"#g/EY Ays9do* Mra1y.FD/ʠ6/w(R4RS&BtGCF ܀ -ڑD=$Z-(dg#"1eB+C>({cQMRKm؊ӱJTK<M}f -o{D͸.H&դqvXPsf赳 ﱵ9IFO^ĖRlFjxz."z$"hΨJQ.2YNR*93& 6+ZP(A˒nR%fKJn<m_ -W - -d2[ v6\ĹMҔM+g]ԞŹuOOt*¥AjB,ͯ]x-pp+[dYh%H^ր6~8$/ 19P\J$Q6][VRb:vY 踄]& *[[NP1rbdHr#@[%3Mt9Z$9-&NJWQ @LI#Gc#z : @ƫCNб iijؑ"2GfvrsNRG{Lf*#3ҪՔUN3]5Ec?D̼pJH1s -¨')S+px RžINb 8b\xo4O$DH(BV(?%}N~: @#?u1q -Zc:p\DѬ! h%3C;nH83MX" 8w402k[Fds ) Iu|}QES - 4 AhB@B} %J)6rٓۜ -h>4q`&o-CRw -JE;J w1HA.-0⅀+,GytɢEƠ &) Cҗ]pHQ$ ?/zh5TL߭iJ͒E,"6xY&hd?,">kLFv:7?R(Aayԧ-XuHdĘĈRcb!Iٴ<;٦GF#2^H(# -WB%QuVVP(En;4Lw$*A 蕄D!xy)mJ$i+(CFOPBRnH$ihA <+zkanǑ15 Nhɹ r%OF<%PH$d,HR>9q5hg պAc -}I`BCG!*ag< acXCD#9cr)ȕ[!$>tI8W1Ra8:cFAYCYÍ|qHе QwM)l)mK-CPX<$ /1z1_]ʱq26m)#oΛq); A]("șFb%AEG4SԂ<6vnl@{%AJ "bQX$` -g r;ŕ <+/:ew%/ؤEyKQHH1 }Ei{m "B*B%a6k:Y%=4 sv[QSP -0˼)h(40U QA)*Py+]xT9_t.GiQ9XzdX-H(XQh$>g Ym0 `{/?-./?grsШ,u/{z~VGM_V[8mڦ/a'f+rѯU^ V'/U/n;/7>`U71 ?_i>nñ,ֻުTФѽπWy#\6uh7+Tf0,ĕxVŸ`?Qib>fG) J\Yԅjз (w{qig4p9|#TVf+yVfӳ -=}xq -l-zȍ}E&G\؊`WH9)h@K,mWUׁ_w@J1lBG{ {flW XNm -25ANtۯN?Nٿ VfwЮvYFҟZ])+a#+7[[(:401htM"ݩ)FĘDjB<cW@zT_Ryx;THwCvpM -lޤ7Whpgt)_7ǽFre%i:n+x|p>X_6'7ڽ&jxp+ .Zש+ϝXxvDˇjG{A|[iL,[j+ۚ\-kho10Ŏm_|`(%K5ݧ<噬ܿK}i)|. -aLпE4dÿۤ_Mߔzc}oVm^dpA"N!2grd&̟XL2eџ`8"8zg)@)C$Id(@?g'W+d23A(sDHMrC&C!H.^Oٔj؄|2^!߆jsТsߔ򿅝Wc`4 -5d4@/ Mɿ`¸vU꽳D[tnx T|{rboUuImEm9o5ϧ,a`/פsF[I{y\TvOG_~ ic4?7綼R^Б|G\j]vjD{]#52‡I ' d@l!3 Qar6 "#@)jk 3|pT{pQov}eNH=^y;ms;~j3f؅<ZEhRmT^chw*.Q#R11+ \_[" -0?xJ=PSGxrioWH2Sŕ0<3>fAToJH"zf%E=@гRDvJ#D:sFJ0b?Ԉѓڏ_'puZIҁ\niS#>md3`(ejb?T.jl՞ÂPBf<2dld,ZIβ Qbfl H:Kʕ?j/~~BAw׏:_aឝ uWb,br%aqB,<(J"M J#zo``Mb332V;v۫{L/K=MJ e :Moa&$뗭R6/Zp׮Ő `W(=jKN}s_AA7f(XI -Up$RdX<!XG23H [;Dʇ)׿㙅?;gro?GLDQ -1k2)$ 7EH`XIo&bXHed- [Lyqy8OgyʋQ1#ha JzJ -&2_Y,Q4Z/y%&I`$Ұ0DK/llr$sbj%ee`4zh{ǩ6Je\Hs>e;!#d`{C&š<܈L# #,o`p-S2Apde~ޔZG" Je2HdQ(Qp7xi<tň[F_-q7K2bub:]I OdMWO&AmPCýyEwT&2B!iSGXƑ8G`+iy?Sq=H4QIn\s@ Vtqװ9ƣ=J㩤$-f)Ryftb `< ND_, t!X6)]@ՐCbp*xlXkcY"H't`8֖t(m./;Hh 2_*?36ȔhIRD:ىΤ|<"צhr/ l8ӑH0CV+,v)W%NaSVH) ":y2p V$xۂ8+؞ us԰0hrt(̰ID6UXIR쑥CcL=L 8 t -*j1H3Dp:koh6:*Boq2b,ܢ(3]b,Ky"EANLR`!NYi$;>燒90oCs#V% -}R"O~ v`eXA<;#] `)dHv&gQL  !9AIsB3A*WBT" jθ! R{2Bm1?iĴu> qSâ@RB 6D(,4ǙbI JN$ ,JOv99""ލkpp"bFX":rX.pCG ĩY84{A -P0,a!.6Xs8`΅QD*Ԕ)ܘw'W J#',_4Сȭ5C:J$D(K5fTc+榀c0L -Op t0J`}oe@SYMEۤLI͐xZٸxP-S$@<] 98t jy -Χf#P-Jq;B ԣ Lc$52~!'!-%9OP案I {YdEC`p!)0^Q<0S%܁ sIGT h :@`R1`oCR>e34sӸMڸ3ޝK%%xZS+XC2#D6wr9kt'A -*}|爆QH@@BDy8VTwB,^Jq0iJR~+5e %d9nrx1M/Ld]@;:5tb dJLZA?ٳ8 P+E#1O1P~"%x]A) ._sd)#Q *Q GcLJ -i'&pI cHF& (DXNJ+&YX") j{'}4Ҁ1%@uvx4 e=4k>cƠnvJ҇,T\JU.glɁP89@<`(hI.'(̉ՠ"0k(GRp0t%KGPP2(( $"pfam!g6 DM>9:%S -I=Kan}ț*}tV?(gݢ#qщJۗ).%W'm4ߢᮍ.o,kdn7r|v6p'd xL WBÐ$K4:tW,>08LZ %D(}#&їhh%˓AkUD"(Om1ou,^1EAGX:A!UU[#dj |N| 'zO+4E4&wF@&6E b "7L(\̀ hemȼb^N` 3Qu三%E x^"-s/)8]"^h8`+3N3ܤ=1&Å&ڦKa>­Ha J75W>h<`ėɠ^FE,%YvpoTV uHeY#)x*:hf(f( Ki3"R^iI:`@ Ԟņ(?d&SIl9 ()Itplj~`Z7Ѓ@z6 -rB!L'ݑ Pu $?@wAn<Snqo6}X(ԃ> DHnjH {FK!˴YUHUD4pp׆pH2&b׀  '#Zk\b!@+{1 ` %6b\ -4PՅAPPaE+JŰ# yvS-A 2]66=?hFmQ4 d^bDC S1IA[ Cs#"/1@8 QKCgTD1fk~ -oU|'SP'8|Zfɲ"?v~iaW6z=a -ғ{ |QY6w l`4hZTX`ݎX}'˟^NdqV;v.%|rb~`2=#kUy R\.nQ3 H]^T6IӹpX}x6#qh7~jcWnWrA/ 0Xj5Gxչ-w;!?"&5 ct#=cz`,ܪrcSoA7.V`^zzoNNktnT^6~WVA;$|8j^W^4/.FQZѯx)F7 '* ->پ_q^h.5%-uhb7E訌;T!E_nWo5=kqxsΏ [/UDeD3?@qit{ p>!]6ɣ`od,ۋaK~M oӆ rsTk1@9%tKLָl _o} qcҍ[%WnS=0t7-5[K -VfxS•\6OwfhI\1V] -3߉_̄vsl_ $uqJ==|;+k8_B^}Ǩ%z ]Wi2- CYT9).pVݨq>cz߬E;6)t-E( -۵vj9F`k_"%gz\3/zrUkأFNh/ġpa֣ n㾖b_ *4l:JYM,W~zn1ik Tv//V(j8촏qo%g "Xfnyy''}08ZGƷ:=+9ƥ[xp]}j)ĕ2 pÝ⽱2ήfmHR@n.6[gtjNc䨠pI嶠7ܪ ,k4745/`Ag)#2To9FZ aԡ[}ދt6ǝJ(dz] Xe!n>hHCE6~*&[qes h?l/{ }Rrhu "V5h7|{V툻46]ß[sBɰC9ʶ(gqv%ٕpVsp۵w.n!7z_3On`$ܷo.gxG%iӷiX1%ƒ\{[;4ޡM@,4a\='rhQ 4,=-A 8t/zC]X{AԮGFEjy{e{7wx:,[){ע54|X%Y~q [Ffl?ވԞ)wYn܂>uIs%.FP]ûojt)mPjtS,qєuP;P nj[NLn77g2f ]t;k!rV[ظ'=[QԽ{vthu8`! !ls+pdzuPgjѐ҆1Rd7} -TYw@# ڰ'Ôa -lζhf ~T4#9 Zv.8ԢwSk$!hѳ_А_۹=K] ɀ -޻ߡfǗY^d70nj65Q%9<ŲWZeqPY#;*?s}r9A#;Fδyx5[Os-3 ,uMa ih4ǍŽ໸AZܨ"y_毰W*mx06 NaF4dGqEh )'j1!z\Fȿ,mf7pDW5<5\g7o. ]j:{FjVxju2yf~^n?t.onϪ~T׏_,m/7k{:yZ;1RN>nS{0LU.toa\L>;៑t}i3?fa)ab~]|O.#u|{8үsu?L`ӝ/C% >Q[V#/=Sӽgrrڋ0#kˍW:y$P2$O+&h|te4`r6UK3;/.ݕߓVޭOX{2^3Q`Ց_Օ} ]V=LGM0Rzk\vO;]Lkz7ufɫՑs{+Ϫcrz'[};|x{dhKh=oyAG[##vFar -:80rn0Wnwlt\?:jƏGzq5={>?]xʳ'ۣw;ї_Ό]w 3~|:_<~t<6qodlXt1S}u>ulEulyEL=V3c[fŽñٽ軱㭧cg{cڝˇ0̝6L_N#w,EǻwOzpnR[f;G_/>ܹ8><ŸNFw If|={:=rQS4̻~mrfjb?31Ә}=>&?~biGOllM켟4ߜxy5q84?[xpbauvxnᗴ?vɗ뇓GO.6'[KQ<_z:258]ޙJ67}զֿvjgGS,O}TN5_0S_[{gѻ񇕯w=gw7ǻg;MOM|i#+gVZ[ޝ/[im?"aM~]'6{0ywoּ}ÎwY;?8۟i<3?=,,>?uܙ3[3g3'oһZ<~Ъ-^0{cWk'`vŋh._>8=Wo_=8 hf|<&'DYע'hde?:xLԆŝMFgSԩبG[U'@,wDΞ(Éi9YmɧwkD~PS+mj|~v'C6lzd;alyZ?|'oGc}x3=53gw&OFjv{ΜD뽻I|ң8kKd+OqM![u7/ϒnn;Bf>x"}ӷͧ _ӝli|"{z >7wHף7Ӌˇ+0}veewʇGO&hr$1ӽw_DuokUSn}Y_}6>[W=7Ϟ?x]Z1F.m]=ؑѝG/w>?W?_>O:#Ϸ;0xNKg8lc싃ݏS/#_/=x37|諥wO^]xٞPmo~ٟZ0靑/'>9:|3y,ydZo;|役թwwSuǃS4߾p16|lë绛:/[G]G?nWl&w_}zicR$_Nwۅ/vvvw^{0nO;<ݨN=?G{Id;.5Z____/%^z̞κݦ~?uܻf& -_Í/Ͽ\l<<[Gg{+YE`yzs)#잟kOD{uBoF;Z?ky|ߨt.>u?M{Sw7_X}gasTe^}ύV b)$o6~qQ=lVYׯzq^>`a,Y9fέʚ5%3sg?4<TOj ٰg'{νwNܯDo,-tON'k{z7z-Zҏ6Ol-t/UZFQoɽhl݅.z rYYVOK'o.<Ѝ]PWj6ڝzˇ%v腛=|,<8[0׫Oܻs6~t ~}}ra?A}i4y+5?>9Zjy41ӝ~s],=A s@E21`BP̂sח9:T7MxϽEY3|lmBټ{_4o6[]>9u^S歘n&d[T\qwkeGK7rV-[O7|GVaIYecFTNzl#$ xsA)ZDF:KVO[}ھ(?ބ |ųrB(l]nom>ޓݴf dshUسpgOnbDɑBEIV{)+s~U+ox DDz\=]v,(Qu`ݛMkKg'Rg7/.a0L/ -^%7KK6P`7B_wCӹt&bW>Ʒ'_ ro6K(4]ɀAoPIݠ;ջw^;F;$8L(D,pԫOpn+PAOvնjg?_Aq~R|jN§}iwA5]@ot=*U?V0q>qϙ|St\|)u&on^f74}C$;o]Oj}zʟ=o -yEc])k'W0V+Z.'BeM\Ǐ5sB(mʦn+lv XẤn3,e8٠kkGOws~!N+V,J Ғ;& -`a~b/'ȓK xv[[Mv򄋋`FilyKVѣ Uv6E'Ny^\}9L緹n''*mѦ~- ,_Y]8E|V]巒UNNwl!dUVvGtGΚ~&i9&s"@Gy:\)]3N g7{҇J8iQWhG,ddž&mlX@8# bWc`6pCok'`f!B&벿$]Ьn 4dj50=B6[ōj|MJ(Ȅȶjl|W0]+qN-yqlmF^ MkjB`I nfHC(:zqC8F'CF'ж,OOt EhB=˟>¹~t%V[90VmrǑxfʶ -c0یb!B@qxu0h :脱_sKݼWK~=N-'RiGb)ywηm1<#4~G1l 0SQ;s@ӼzwZl -'9XMp5W'gR|a|S?:\}m[np{S|dje] -1_8lo2a;b\Cr"hz> %I|cPs%01_#Ώgէw؛큐;d&lG."3y%Iڌ%RW4[)}3AMvCcvҶN/eB(b͡J?}:,7gF؇,hs\Uخ(&A?4JDSyn4`>^oGuc(ui =zYoY)]QBq9?˹M3Ң opW}I/zQON+$i.v=î_n0ZOi-k=~`U~:/)v06XIV}=zw껂݇%rq҇ Hqd3GΏ.hGI÷iyz6N8zR*F>e?o'4ٌnl?^(,o\Vvjxc)oԭǛqA~Gv~9„;Dvzk(FseNR3ߩ"(IovWTޞ}Ľj |I_;r:7rVi- -Gi)l`L .evv~S:e[,-W;s r3r#/Pe8&(hKŒDRNk\|䶲ߗ$ǭy-|ymVZVCsMݒa>v<)YTr}{$'(Y\ ZZk3SKO8"0(0Sxbg}x[JD|.A`氘-o'%+e9ZO] hJ>[PVnsu}:wXS%tt(i+wܬl|Sl$xsG$>=hLF4F Pޛܪ+ga믷˕Ye[>s}ɉk&JC;OEylr[T{lVE'-*ĶrtعC» dMa!_{Bz?=`M %o`oHK(ϪH4Wr+D?!NC+RuAެW6b #i,'Ynv #읳ke};Be3dƊJt;MPv_|:Ԡג(PE!\[mu8w. -yPz+|?eU^]Ծ, ,˕Ti/,C;'p)p[m9|wjn>oXO`|?߭سfnv|N@g.m m RˤNuJES{Edkxl/En0sx)q+ryU^t6)yάF ,p*W#8*\fq8blkm=(hv^EfS$ dLx_ӷl_l!v~[oF^ ^)_Be7iNo{">>=Yǚ@̀㫃j#>wjw,lNYq30EO)B16s+ėݙ&+gܿ19b~~Vǧ`_NFV!'nhngq3<|~xBŸ$$frո>O5{Bh`*H4C/%~@>ER$N0=eE5u0ٲ@fƛ&&vVdMo[$d\0Ȼ.E'ͥ믈i$#Z/NOŦ-Gmt]zY>U^#1IKg?"k=x}wϩH/sI\"I@(_c'PJCV,h\+_פ WoZA U?/;|>ѯ˗ťt-);JcGʥ/p\F='kb+j Hq^*K$AQ°_G"O6}RE$%9X{#,4%|sq-'_S|-q ĔT;mM3VJTɍSM] -XWF7ubKKgQm0pXwp s/F]JZU~6ɴ͒=*ٛ <2jU3)QW뾣*oU -,Lr<lE!:̆רAkT_fko /k]KߟuQJa?GF%(^Ķ}Fms3Q5~pÐ5 d:x NىPۿlGk)|17R\x}5,Fm ^{ ר81psSQk+bt{ԭpKR={ReV^7?3YQ׍ܑkT2Ms.U^ԕ/kTrwWUY^Mf3\檉 Q\~U]N6Q2*Ρm|Qqz$nZvRQoZ7(]U?*~;{ݟL}pxj -0mwDgԛ$w֊-y_ÂÛXsQ^O:~V-{Ro \W+mQ|GhU~FEq;%d˭;Q>v}G}oO{Tn5nHDQ[ɞ(V6Ϲמar)KȁxZj#"tquAFֳњsua#QQSl\jmcߝkMZhN ϳ55ʞvZx_-)t~?⋉oJq%Sw2;=sJT|o^-!yv2')݇vKqΩvvX*G uWPV|.2a-^\5wU.)2g>o{KWoax7s@6N߾}慵Gh ގzycz7k!m~~35g~)~;a.JoN:}zX@h{]DžP8}Q޻޲N6e RcsV{v AvOY#J,4ƕ7̅gpx[Lm6y85x nv6Z{Z)atu]iɔ C4 ޤ$I3kD鴈.&eƀӂKq.]׉L ݁ڥ5yp9݉Z*RIeG%vרԌR̎*5}GJ .WYF17;tŒΘQ֖ɨEk hXk~:F5}Go N=X.>Ϩ;QaCkhzIQm= J}wThFñ]ݴo{3b/WSv_ /_m*RU?˦BvTY;˹h?Iѧa#{B&hj՛1e]t<;h8#,n6qyAnsjN/0Uv{;Ϗ:6LPdnל0dɫ9}軦Vo0 !p$ -P'(_Sdt+$^ Ƴ%moZ -Q=lmCa,8OVCᵙ~Uo\:,Q]µ7%l.D]QFt_v8-*ʂњk ylAg:2 ݧQ5_&MāM̋w.{wuExBqj{802 sџyIh]9E,?`W%J|8<4c˛pߦ tGu34',\ôsFv=C:2,"{nIjm+lcDZL0VLX~`Sũu7\cG`}cy`hx] -wNç]Dr3=T0XćPv"cdQ09U `"ߜ@7惼Z!&D/_V{>t1 - -^P1Kx9]\?Nb߳׌]c=K;iptF/{Fm=rLȅŭO8oAc GgKjٌx< ÏvIވ=kMX6㼃~{.oskڀ ajA7nM{ -eNYH7Fq\]nM7n8b\ -T8e% Н]ݲp%E  d;r<$YCc`Tsa3Fͥ%<Nx:b 4@ E P{48m@zdZ!“Ȍ$ *#t1$B7 0LjsbLaԥLg1{&lŔX8rf+_Š}30ׁAs2|dZi=?zK$;iEH2/c_ٷ/ϡr*:|| X=r>QZũkHFk,_|| 03j-x.N^g]Ǡl||t9i3WI*Gb8;J$wMi\M99 vTC*VB'/ -PrcA )95ArHy@o=ض;QWEgK߻SbHWÏ+Sgh6EzNdN BXGWдl't+*ޖ'/2 -`}5l~k n.0{ר%C(Wtewnb,ijW[-1ba_b ֳ+tt9s ^hЧ#C] a;Aҳ 0>W@`9C/ f;y/y?IZSv |hWY 12Aܺ@ƕ8&qvD@W32 ڸUSj&yT5wFx}ү** 0u{ %X>dYxy` -i?:$uX0Lh{Я?sRs%owP޸BXD0̘b_pLq s.i,;/Ҷ=2ÑhwSԿۉ|A-D,_ZO۝ڄﯧ/ȅyu"D+L[IiNzoLZ P97Q)#f_^XM`h+Ir%9 N` yxo`=7f`ezɽ7f~z,fj@:x, W'];_ΩH+u67s_#G2S Lt1?ebc&( W7ͱgV.sMut,;s{4ɕ%he#M*ܘf̈́iySxLZ[1ʼ[U8seӜy\gft]0)Ufo<*iÌ @^0f.Gy狑LuH7'6qgoR/!^R#9ӕʓԸi5܈𩟣wcpWlpXٌp W612vw2/=Bo3B"4('TՋ:t42^2 -Q|yOlNķ%5|XbE&%N7\G(O tQ`A'o3}Ly%~߬W%`x:V?/ڭ_+q9]fl˃\4cXH gLsFYvpVƷ j'cɜewGl^)3]fwT7\<}G*A;!دԙQa}tZdm)Tvǧ|Gom~)?߭_MPWP_`zonPaɕר f_ 䕞dd_n'"Mfvm m;M aZW߬9qVN]%N*$g+ⳣՙ L*-yi йyy! WaWUWՌ}S'-S9>p~@ϫϑ54>yyu`dBγϋ < l[aW Wa1Sȶ6>/p,x3caWlf+sΉG=b﻾rI Ytoq7G_pr|WFB"7xΌU ?6^뚓Es")#UV0zL[];''!4΃PvH=&),V3]箊oGkqnf3U$ҍ)7Cbݸo&'$&3%19:\n4-={gt;|pTXɾWqNOn]Mێ\i3dwuM 5}3W{I`sOh&;:4(Y$y5/Q3}T+-TxT+-Lyp5Ⴓcb7)): ıMsw}ͳF}z`W)#S~[0cca MDMuemoZX8U ŨƹԗUܹӗBo`eq[r/F~[B0MKT%.Gv41?#{Fb L@3}`q,A)i^7{̔8ݽ,Ooa7>ɽ /ǽ -JclF ?g^S%o` ->-OHY@eT- :v$#ख''f v#܌=b]mQeiwVډ5q>UimIX.LKziQsʎ._4Yϖ|+)4ItWy ;*W6U Ehz+D [|}8u5n'w5],FXvW1}â*Ewn>. r:%[>*˫a2YE+ՓkQ=*MP!yŹ+6a}2JB6#(T,r!qW;ЎLl NXxSrVC+;~c MrN*fgz姍l]_5ƙ=Ai-9f__u1͈x:л,o&<4#z,P mՌٌw4K 3wС+s92OK] C8:: yÜtH?$ehzJc&n>Gẅ́ K4ɮ(t_M0&̅f+\tdqS_x膡C:drCu!Wm;Hb/ݝh痢r=0ry"FnuFv3dIiqvIs"%JaUpo`GCrw|trتKlķ˔Xח`xeټ72ѳo^ns=/xq%W&^/_\7+A&H/˟O',o3U#ozB24J r{\dl/-8`q^*ſu{E-UOR.K6+˜xeW@G?fQk+zd@ׇ֕V|qUO'ퟕӟƥ|9-O|,jx7|N n2VIWֈ[JU]>U~ѹtVYS7fvy^)n/IP>1_"1+&lc?|Զřԣ"ɾp,mɇV:}5.Wv޹_:?&o9+z6\')Q)b/'f#7Y>DxHBL<6Rt.qj9A/8`oHbdt.c/.9K><܊otWH!v}1y#X lm=TZ}!AN˄oB}P*](Wl|<O7Dgʱv$؁L;h]Rtg?o?Į,[/$<;j.#E<0 &>>S/zi7rf+Tksdbqokz& ׄsLYۼJ7h4ʓ19*6*ϥivI.Qzot9 ~+" ' -ĚZ,n&;G˗kORPj2j2QM4ٻ1B>t_ WC."cKkqQ`$xi#|6_3qdIb[rZh{ӓ2Ȓ+QKxj -(f `n%jzF3SsepD>O.[8ϳ̱rA'~7j1A'<ңK[! K -_KVxs|d#be`fm -ra-jb@*|{pCTYGۯ=jLE~C>jJ忸^i0oZ|+i][Mp_M~ZX)}s̘ Ӹ^,i}㉱Xv0jivOlCt@Q0m$8#֦ZRӼv"I|g^6`!\z"4Tv!4D#]0F@KLbMV57u8M$t^qI0`Ck&WLNBfQ)!@vY;ʱ_OzVRkRd*-ЄNnmPdٯ'ixg~ ?GGLG*XjȣTډJjx'UfOCb-QsdQ`J>eGݞH -SKԙp7|MϩkJ9_"^^'cĉ@1}CK #k[f(B_,S?j9h4c j-Xk\Գ*)}DlQ't yX>E\)b"ä6d{HU 6$E/ 98ZFUHA7:uİ˓eA=^V﮵[R "֬ pw3vy/:\wT˃~4'Edi3p wľm|IBs}$Z$GyKFGiYwYx*[kJ+y~ji<c5.e*ŎwyOI`HLIᢉʥT~d(X\FVm+IfT6Oن ȳo+V>\X#+ʳN|h4"%׸J34vK7E}oLxĕWq9x_0`$DWmdllx"E??; 2lw(]0H!2i[f%K[VfsD( #^9O߹N}7nx;,׹[i'a)2I*YqÙm!'u(pj9bM6R9*|j!\` -ڙa}yӓ]h8~ߥȿXFH.TVuZ%^5U>w▉M;e9ݨ -EtǪ -E -E OOLq1,*ؐ(<^Gg߿oDn/oz`?"ÿ ڢ EƧuL^c<[,fȳni1Hӂl.Faf\ ëɶp-[?s)^T]eEXR7Qui I(jSQPUE$W5xʂ.H*'kUgA!wx?-Ӆ$yMLɒ*/&%MKj$j&,~$D$NW`p^$IEF]A5^SUh`2/7ipxYeHFR$ -,IJGSAਚӮxQWh"8jpƌ,{ i5!NT8%]t'A4X&' Q"H˺&b)A^MR+*(2m%2t\"vMT`T>ų>I+|!2 -*yHs'/j2y9;SkzJb[}Vq:D]U% I#@RܫPɎ>|xAM,UYtzH@4 Odc]pGPxD+ Hx_d 8 $.{UE]e2`!  +27iJJ@o<04`qfyy`deE8QEfᡉsiS@BhB)h Tm%"P ` -41pJG -H+QLm N{r8J4,rjP`;29VT*PƢiUJS5 -M@'Wtx -' @**,d Jh-P".27?("$KdD)YxrebCh8` -"␽ -ث&2GaaV)Nr)>| keJEF"A$V恉+ Dv3~(2uh( p^ -ۆ3";c[A+S:H7SDl=0a`B.P⁹(I?:9 =Dc灀@*אlxY9Yh+(T)1)Ɯ ̩`4`@dI ނLYpVBz -ra@LERPR vW𛔹@6Ym -8+^(= TMƪ - -;1@& 6I/YHq,d`?tD!%zph[fn 8@^O"N -`R6sUTX{Pp^^:Ps)R9D]@dTuD_n)QCv\C >8(ƆOD>bG48tJ"[fV}a+QI+ #@(T(`im{5AG%5}KR88@Eh0O-ow$j"LR Q`AD{HNPot`a%ȈGHY` HƎT:v2 Z@Hu98ylH 9C{V -5'P25*dݨxqI,^heQ7t\oabdi2:*!%V<*`%h"H( bys1(FZyS@`NWSh+ X>gF -* ;KXnsŭ' r y""l6ԐLJF>lz @ -*5"Z*>oA;l##8).d Ti? -A=xdkA@ uV&EJ@]Z8!]`jȀ%-~lGBDA͗P}N hjD8ҕ)]{[Mnב(0 ?TDk -hJmŠh@+ -H U) XFdb`Qu1"dbbYQ?leɀJ% )诳F6lYJussTE* P -# @^ PA2忓QeEۖ`ީ*)jSFAmh -4$ \D @߲lUvQ& -tKi>)ϢC'6n,P:ZGM TMjIDDGvLP,u1L#_20?C+Qi+ΜzQs d1Y t)A-OP.`Dd<ԮB`h`+~⦭OYT# 7-r[$CT)"%2/$t`>?=*D yC6dG_ 0 C 0)`& )sgDG#aP;1!n! #ɴdCoCiwKhCxxrP0mߡ TZ ` 9< -v0EQdzLȶ -0yI`SmO[ɖQԊ-L `WBs )1ACx"(Xm *ɶ'ej`0 -endstream endobj 150 0 obj <>stream -7%T61/#@ 6`2",ƫ_Mbsa!u]bqtCZV?dP)PoN7gO~{޲t!>!CtH&QK]adlH!TaŨΡ/ʬjxuL1,ReSK$n_Jƶ8'ȑPJ?^#rؖ(%ڊ8h-dtBo[$Nq\ wS#i/gG) vYBh6]>N`ñLf # wK&8 \sB$3Fþ*m ygMwl{DByeہf -AgPQ yT< -:,g:80c0SV6YRV2§U(X'?ELkL6ivpGѭl4*AG>'|Ϡ$Pi+3S& ֒Ӑh!c=0gk(QbD$7qNe H a<$0Ir$f2g:ѡEyI2gX(jA`.2C-cя;ĂȝY.&  `241J]c֌I%I0ŠK>e%x.q\&7$LE -D8B")ez e$n+R xj{F4jZЪU bm\Q06ő+}j+(&,b@yy@N͠}/=Т0WrS'i%H#u0Kl񳅷V~ЗN[Kys^eP~$ kSU$Mɠ .fѰ(=gu[ &)SݪP 'qF&2G B2 Wm2Jj ~Hgu#dCTLHPvDo^ژ'_) ڢg Kt8&8yq4>"({D7Ev57Ҍt"oĎ"Vh&=pRޤA;^H -f+zG38 R#dl oN[_xő JPaFԱ}戤nJNihɃ!Xsh#raujrRҕC_ t)wLGt$ؑMDo G])(~gz$70V_cdcx":(`t,&2N %BBlȀ8Lil -NjXJ (D;93 4+U4o$QCJ4hbl%GCؼzxw2GUFKhZ0wF&~`qIdQv*(> Tج*{ZO -döu PȞA>^*xRٍ4x[!PVWja=Zh!*a[hÕ"y>:@I0潔tV~k5 H1ZpU>;&Rp#cFKZ'id{a=H-Ϝݑ33&. E׸aO'&v(^"* ]TWO21*TGP4zZI+@CwɶSc]xpH:M/},CWd 츬+drrփH> ^`e3p8'.aigRU-Mۥ -Rtrsڇ*u dAxkX>leE9QH\6! ⭚;(n"Q"S$^0Bdy݅ͣHBL`?tZy"5cSSlES(l6Ye2(@LYYH[I'1IJ}\@u蝰~G1TfO Eq^ r(p3HT3e60F|pzAZV#v\' d)"ɍnB`@ (dAeX ƓCg*b"3NQ4P1gM4 Og[ .8T -`"?p[8IvM,y*23)QD. 'o"HӁ>r -x$3G<hb M3fZn8nZEKTw\t8h1%/y -+ufZ`?ԧaYLs5K/@U -RnBO((M/n"xVZ9bx]6^]p~9kETČ`AbR,μ bh,<ٳ# k+y<gr~e@86"ZIA S˄_n"'MVq,IJ$819nF&  -4S-8s(ql 17L2ZU8/C孪Q _ĂpF2+1b㋈Ȭުe18:+/PA)c}u-ώmꓘ=45H5(̘ÒGv7VI$;Gp84 cd 2h31.خ-ir_6ڲaxq.jbDN&0P& !n`3!\%H" M0w!dPI3Vb*WYt-<$hU\2Hgq@DLF]ȕ{qP/Q-iJi7 8P>(]6׊cf$7q1S~<:&i5#(),=ck[jQ$n ⾚3f:(H˂(WZUWC ht6KR!Q>qRUpX!WR!Tm- Ŷ?}20RDxݨ% /("%yW8 -Zqáo*Rwj' `%ݣ㚬 Qxd(ydA8 -n;F3f+RN7/M(|xp -PMvBFpDɺlhc#d ǑR?.OtS߈7J>a*AxގDQ2 \*֚r*MȠҶ2d4)wn$jG`AoGR QhFfiygňcޕ2₣eE*? -Pqh 7ZZryqnb̉.Z -*5I ^sP]]Xmqc{9n_ß)͈ЙNp̣ßihB!n \!VJGxtAO?K%y@yiT.cEeO|mm#zQ4z]\rrY2kVuqM>JPs<Ǽb&/Y -Qȩ;~;d9]D87`/ͣ -0_egǨwr:'>Xkw(*Q.׮ٗ⻸Ȳ*2|(+4 .΂ղv ZjKV}<7MZ{@W<-<º]…=!Ⱥm@*,q2Ep{áYQ5)I˴xǁ[,x4K/ݮJ+)1i #vg^pZM+j[ [eX4Mn+akŪM{}o}2 &$k&AvSoe=]U;JSi@oՑ-QOK*YfA_Oq}v܊ -L&w{B7-/@6gµΙ=G}2`,f86H2&;$%=ڱ~˜(!E~KNdoqgj'2 -o/7t?< ;*:(>$L)l=FKjWK]!V܏ꁣhl$7I-ʓ@?6Zc*76`23_([Tv6= Y֔hGJ<_JdתCEp1wa49'E?O$G0֩,S(8>*_נi>FzotΓҡY]2gMr'aD2]MGF43da#uuhrPeLt -4EzyޟuЫB0@E8ΪZx#=[Fs|Vrl=սq+dǝD6 VZ싅`\xlkyigғi'goJ4khU'08;|Ь#X/ /ޓn؝|T쑦\< 41~Gj5hw~1xi;u7<0~š'5c^8/A5>Ty6\Ȣdy(Чg"p??:Fj -F7ۻ':!Yjt5츬Cy* R -ފVLjրt*4Ϣ|f(S}IATԢ4e;k~WVRQAձ LbDfZT'֑s4̵$WXiQG:XM/`BszL솎[䏫sK}7HӔ>#uf??r*iO -]bIcns; -a>Y7:t_8tk/ՄY\OA&#P{Vrˋ)Ly=br#.J>k#{BUۅW]'Qiy$t|4 =qΝdszH~kTǎ08$)P0Ԍ10nE!Zfks0]!N' Ǎspe}or]z>(%h*($!E.4}nBX .Xo_8"~trvIYU9=7 ?H;64KB òmW&)JmV{TA{(U>hO]7 -un`. g j:j@Soɻ 867ЏJ>gm', _)WnEa .֡U3ZRGn5XDY]7)37(M7qx77]]{`Oj7tV+w*N4a'T~i҃F,@=czABi4D}C_W@vSP zc݃Jd=W߂z"ƳTEcE /]8^8%5xU S66ÌFDN~_|RJB8ҢC@mB.%h,#Do"0>87̢gQl uf(~^K520]iqUE# ](*3P* j1]@~XA .jZ_{*Ul<< -yf&Ȣp:ihIO$3 ;P0^Ouѭ~$gU`ZJzG2aQ[*6bny?SA+CIsGa6]@zSGdP ć{S^ 0 -rL ­4:E`4h#vđx;yXۇE[֣TqSj5;x5[F+ h[+ЛJ{K>$"A6vW,(%$Ge -FE?rkY[7F|M%x5;!dN5 {v|XDv"Q :-iԧQ 6ZUdW@5v|E'X9$ &e&UF۲d̚bTɇѨSlMNAPEnϔT\? 5j?11nX,{hC^ꋽguSZ4@өJ ZSU4OCf06٘&H{B0>Ѷe :p=^ړ/ Fޮ!=Bg,Ҹ^2rό?رRO~[m=S`|k?Wj)Z5gj}ku2 0͢XJz<73G7-KRp:M&O#4ttusAEIbMќyrbf*]-\pa0m(&)Xwel:5p%G6KYp:Slm/SnʿUkqͲ9rsÕ>c0*%QtZʼnp Ϣ&fg^_eL'Scɻ᭞ c,28T7l4VZd>TVId[`5kA[n3 Q+˝Lq)vfCAnnq&OyЁȤ/n<M+A=6eR0^UDAo1q:p} :9CcO%BG{I8lnL=:eTmH"BOt8G>.l #'5:=lrvve?o2\i6z|n3|(Nv|B V,ӸuFtX%ږɅm* -h'l]j)sZʖD7\T{uL#?}7BGSLϦPw5u7I9)m@6Yue`z4`e[ wcXԺ6Z7ZOR 6o"VDnG,Q}"D0C(OXY4[ot>kS1 JIJ(-1]>Vr$?מ6 7v۴Rq7ljL-!FjDI,zDiE?۳FLng0'i4 -P$aZMi\|Ģ+H "҄xXVfpXC$l;^KF2(ꌀCQے`gRr3ro&=;Y^zY  TOv?gLx7ЂƬyRsuZvރN' Oӣ\gנcJ8#*N.KᠡQٰhAv_[]ϊZ[3)޸G+i -7Fysaf,$-bpzOiEx:3C+jV^MvX{g,Ǔ䃠bۧℿ B@4jVC7@OL/L4  wy+f5:10dnWmr3҆5+/>t<b&InrNnOA})^FL|&Qy'ÛXLf^`„`9B^Yj6m5ʔn擷3#G^do}rbF@ }p hZUww^gWW88_KC>i%RWMu`ըΐS^=y(Kl0'H?zorg#6_'U(o0W|2Gq[Oc ٝd;lnEG6YYtVJD `3,M<NcEՒ/o-DmWཹ}k1\pC5`t;9D/&Τ bA_ )1-<[S͍}rwg*2m ,~ -[?:+~LZ72G &WDc֓Tᷱ%PotjҌê_'͢ aw'OpQn:\c'uY@c-p.骡w&%IA騥&ng5cj,t`)O\|2RaYhr_Z=D(ZŴ8(8[y!t3Z'1Z ۉ ڠM1o~tWX={4vPK{WE-*qv)drŸKcyGk#UN73qZn{ )p+X!BEMMAkk¥[JgllߓYmzjחix]lwAy:htܰQ)s}nwպ%FRmumu̼a:M^$O7\SG璯&G5*}#XΣ=^@\قA@cv歍deFhonWIxV( 5*Pq_"Z»º*_& -Ї2o^)ZhP" `@kZUeb ey,!Xqom=o"jF[(bYBĤ@;;r= -pmN;ňuf H`J\Z.P6?Ggp$/7vշ֖袊[効+І$,>|5U 7٨_,<*i,)R|so -x9ej7=:!QfHfRjuF{r81tx8E+V, :ɵ.UkG5`+pva4*ufJl,li>Rg('pA\ -?@ȵӗB3y.f/h!hleׂ $濥| f(t۬0ߞWP9L=NAdI֟-(BIچ렞 71?w  VDYawIÜRox셕_U&JYwM[8(,k -зYs6՞/nWݵ?>}?}ᗿ?O_?|_ǟO?/~5' -endstream endobj 151 0 obj <>stream -%AI12_CompressedDataxkɑ%T+<\b|լ.Z3`APݥWlfKG#lR"GSbUf=O_vOtz}ͫ?˻xwo^;:ly=;S|x>=}W_|%>^Ϟ=GS&k{,/_}/>??=Q= eD/ /s];&Wwٛٺk5zQx3Hw{7FLЎ}_}7//ūtw볗_<</^ew|?3wxvL7씑;L{̥y*w wy?7x7oXoXJѿ粦W~nVU|K"fy2Pqzz׹tW/ӄ^".~Rk!N/^}uX{LfBZ+~o@ ^|Fw)w_xC1g/qo0ϑ~ʧ_}{M1?)L5;=@ -Ǫ֟o_!wyӴj䞼c#Ob5Wc~:濼~J{)cTSW|YEa{J.ޯ^.o? ߭|jNx?]\zNn{+/ 4翿7wߔW~_77/mQV;.\6H_/~ݛ?>^f(_ڥ3:؏cSO-Ǿ>``XS̟LΘ{,_ s1w'Fk|w;aaܝZ -țB5XTdeP HS9>ciBiKj4dž *F#q8r up 6;vV `{? @a[OF1aX+MrWq:M2ݩI)EsUN+ -ꠎ@JkmNE}G}g{w$] 183 - 1i>n7t+6qͦ{ LP;yO曳}628d4,s=i~abB/uQE\Hl65W5;֥nv+GAGf Z~ 2Kܕ)ĸн솸3'ؖ:Tشe>~Cz_iHo;|_GiBjK@x6orPZ@3ւh6 ?F=Xk0*'87dll527F4pw*~Mlڹ4`u;n퉢<% -/-0B[=F/&yxv󪲵Z1BG,xꍂ tam`pnlM28Bzjԃp0X\X,{ϧ24G -s avMs"%?T;+pdh8 ÃUfD:hMh}En9 n -Ѱ1wu[FROGEc4+!gp=Dotq}wo¥-Dߞ͛{ڏD - 0h*6MdX5@ŲgfeY}2!+PT̔]OOj0[FƲF3>=m9 ~zc#k43j̓N>>Oc>Q#ח/}sNCn -H官#$wb='1PDA#PaŔ - bFS 0hbƠ! +V- uQ -矉bqA4pD,fbG§'|ꄫ ?m'BbiKwވ"ֽ0{FkDx nCVb>vgcRmZ uC} -5j)Ph&L)4h$^thabqbŰĨ0EDuO&,>_L- ?gnNoW2'ğ)ބ'Tp{l-v =^vw% 6[q` %;O4xwW嵘<]2z1{hwih9zeiBc$~#1G,P1pG,xrg]e܉ު,S/Av1up'ZJ}Y<Uza-b48[-:&10h17b;&X{f:e/.Y6abYR M6R-/eͽAuski!)S` ]s{ٷG !Z'AH~ SA6kzuFF8@g}3*=δ:Z?(ȁP'Qvf#V1)Lތ:*mϑ[J][Q{83 QF #Mk jYL>EdA=R{L|:J H0ɘeR,MJQrQsVq@?eFgǝL$ޢ-{N)l-'ߔ/UnMTʴ6S5-/ۿp.Ԇ<|']jte*>7FCn (jZh4_R~G̖ V|򭏵 -I &1ۉCI21.I>O;o:5Ak8NgA "^;Di%@ u,DP_q}Q^StxH !$HLVtG)A@q11O͈SOYAAVT+=%OX]"p(B1~k.мYeNГ8$QtEJt)q#TV!_)QzZGuTQ+eOuS먨A> --jI'3QA3' -}D.҆5.B.IHȉBEI?3UY?+r 5ڞӪYMVS%~qu<$o);&PV|&D;|=ؾ2UM5MWEEYҴt=jx߹iWnY. - )UV6 Ԙ76@ho%~&-}SMZD[?ɹwLGz{.2)iZL_V asunON-Kӣ~ZzLEOZ:xy-=颥'8)Pչ@tLxDBe*+ DH[(|*n+*m$UY q2 gb ng<.UodhoAH,5b%g݁$ A級q%Ha; ذ$#%).qYPS$=vG]Э#z.b.˨9ET{@>G  Yzɶ%_ED72WYnqݑvwec@z>`,mI-TPcNU;֯hps2& |Lh.ӋPO_OsK?O5iz][gϩtYfmQAmlFЗ~e&~I:&Hz9 -Ж F* [!:%`[R%ubjCC%M 'd`feճ-5vJںT[V=w_ g ;Mj389opB\ -L -5E(WbfиaĶ,V!}V+H_œa;&A*`|Wjp| _EUb>(fTR4UD(f) ʌnIb"$(B=,z㝈^J!bY mALoG -N"EӄtNJD\-b{/ќ|H-:%HĹպ]ۖoWڣ411)a"Ey^y6[|_绘1k2% |4 e*M`m =@tHB(.g9jUIN"v٦(Z CGuKSp/=Fba~x%,r-8m*TIҞ1Bo._L}H)Wڸo=uP^QrMNrbƿGqȫcU¹6䰆$݊lúuigfcG| ^8hŞĢ)hE YNp&2w9WPSHڧπ&"ު}-wɰw`F3b,Ta..b+.A.A2Lnt\Җ噛FC4ѮFHW+{YB6blb%%Zǀ.ȷ P_-[e4VKZGXk}kͯSU ԗ:mvl LF[%=',}i-2&#Ll>yl&Y)W;e(6dJ]pc=Z…P$rЌDW:)B|-gA^A)|b<<>gb A3=^D`w}E8K({"{¿/p%&_Fdwr`QV{e ]SyWPA@ N6 #.9CW9]O[q(,t*X<$?yFV2MD ܒ -ցnI⑼'Iʱ -Zz}
H{=vܐVIo.)]ũB, 1'NV9'IV06FVR2m.5JqKCIL̴!5sr[Qb%ڎRx©jɨjǤɭ ̃H*c^vmJQ@ a.:E,Bq/ bxCP")eL%)>yaAg oAօg>ENz|c57zڶ߅ĸr(4x1qr)h1^$wƱ?InxY ~vW-F"O*0vΆWyrcO̔KRODcwDy$ )"֏w̹&F j"K"BW8d@1)Vӂ&d@M1n&=?]Z>2U³c'a+p'G5'P< eox.$îK^*}ph Mߒ&AJV멐z/߃xCxSG71mvNOqvܢ&HA ^<̄s#WmurkaU;Q oq '\-8K\b`OZ-Qa21bJpBnw\%8/Y (ɵ -rIK_11i' SԾrMF76{{mLinJNIF% Ғm9m:!ţzNGY2i2kE S6SWZ5xdرb(^A`>SXLK1u:95,/hqSA^=ۊrw_`Eu}|QTu|GŀFhWtJ.{ڧMҮʽ2zwJꮩ_3׼s;g춷]~1n9$')Ҕ~c!ʞz.2YRzZTԗצHEZ)NIl(1RThO %>8 JtImvZOVJВXlPu)`wVv'(M婎y-'i2MB:Yu,='CMl9Z>kK[tՒ=Fvח'{c!*,EZ@dQ{\O8-m -L}H|}7O5@SDIsSٷ۵u\bW^9Vk5N> m=xI>,q'>~~5vyϵ;ku2OZ#6ȅ \ђ •&32[b+ϭ>7q#S/}oڄ6EnW[-uK77:A?j OhIOtEڂ"b\S>5Z[&d7 3B0{Tk=[|ų]aGim2O;cN(d$SAn2XI$B PR9W-1 Nu ۶ʵW =]g׶jCwmq yM;|cUz u8FOQsʓY.[V;Q1YvQ|[Thd^hɸՌnXi89E; J eJ!>d!iFd6<&Y.i1VJ0pHs*qQ1i=8/&1v7mX@Re#nkmU@ٖ71y]D~;fR,5'w(K 2$,0C`xi0B`u{zo`,U6mWqo?[`Wro лwv}h^ ਺@ZQkH<PInx'caBJ&X-upJRS4+{UHҷE!6BDK=Ve4D* rsij8y fC9U'AIUO3T$|=%tS11gx{DĬ4l*N)) -Ɍ30k~6l{]B{E$-GJ -zV} -\p D -B2dog VpLkQFcHDA*[clWdm]=*Ÿ \cUD;ӎ-2 W =fzO}keD*c;oF; -P+R\iV;K<#A-vN$d1gRGC;Ic)5>CjtcR -JuRЋ`"Hcrźh1W*fD6I@y\R0bTsIl8JN眪?:ʙ%[Cvf7cC -esEu.Sfh嶙*ۊlCCgs-8 N/iR!"˘Q.GNYSSyrAvJ^U+}Ĵ -!> 3;[6E8:VE˘ID+]!29>G'r)#k~kWq$묜 aJ6j}wnsPOQ}XR/*!EU:qCxLz1rC"DG)!ciù`ɪ[7tG=Z~ҏ( -A,8'@|wMȞ҂{W̻`Or*sPVo݈"ѭ#{hf9m1lz(L,h8tFC -AK t"+ 2HI W kx7ǺqΘ׆d6MH56 4yEK$w"g4|N%цDH9#R_jo1?}i^tq>huOe^KbN&.K{Ʃ5\|}H Bb"ĝb#:n.K2*#c p$9p7 pj9!t<;@/kt_g:g҆'qz&vRVO%Ϭ -ϺDw p%I -V*l&Ьֻ+"*\Wjmp.;YE ]Lr9@& Ђ'%Yt҂lU+_L#^&*MZ$ܹfj&32AaDY_!Po_~o6fW~V;&^,oei+JZN̡p#ْh#٫Cnco"ނ֭C]05՝ZoĞ?_b@N1s%)X ](d_ (gtvfN$ M3jZ*l)05\ -~w=o*N`3R!b@195'L ٪)N]cbjV$Sea75xx]BPRJk_#ǜfaMS, kz!U)ב*0Ә& g}X6eLedm{^+pΒfNRpح .%5A,(Y#1 " .90#p2zN ;ڗ ?uD=S}[Cڿb!/stJ䟇bh~voj,-T /[Wovo}kx|Ŏ.O;ۮ9bZq`ll\5!,My$t̫!-M R"JDț_]ί bܯ"|$9Xkm}+H nóWNi. n@._s:]Com.hqR6$/ojC%v]ht]p1ɳBg]Cj o餦48BJPq2ϹqJ/qF'RFvj9˃huZS -|9d<9#1< 븮9pZS OJ8>፾eNurмMCl,"B}$(-*@/-0Sir\w}!7M$k@Ŵ:ЅKz'VgZ:%XI*6*dͶQ,SP_ -!7rK([QC[YuxW7ZQm RW8x, MA)V#%EV<%iMnh$&0A- &,1$ݍ%t"wyx46bV [Di )sB%Bk* #̚‘}kTHc(`4y_3'^bZH(kSTĶG=f}n;=f}n1cv춏m>f}n1mcvۦ춏m>f}n1cvۍxm>f8F7=.Z}xԵ_4[go&Rz\?YKN sNl>e-M&TNtIɏh3Rң5ݑ\3΢㝈?9ȥ57E-ȩNNԩ77K9"ymu&Tv{H=Ԅ4SE?+tRRR(Pe\)@V0 qi#e rB֔X3YK"(NRP4a[a>&z\fJ SHX{1}G{&͚GՎ_ѷnx%g¾3~*HTAnJҞǺ)͙9"K(lښ*5֚h&osZ݌I+hT(=>1i5?m3vryZsSDݺPd,Pş?m] "[ Ae^K|RM, -ܶ -W8(o)UD F%y*k,mst7p2Dc]([aAs#\Ė8Ьg%}5cB5umoojc{o׃o:$a;l8C -c]]QgKo~Ou/ֵ5Ìfg̏ ]/hTh<;Am -FM6EC`#^Q9Cfr[YY_4sE1kxNVώc]Uh2-C1Q;~278VS\wST;%['ud?b7^F(s]Vr /1FU8+تr[Q]I&()P#U7bk _e=M*xx'%+'HSRVk }]fBtgZYUJᆒRKtB1IF>zSPJʮB甪<*:)ޙR⽤l,3t?Yճe<~+I&R;YǪѠ7k8z̪]G/I{aU%Q}5wV~5Xל }i͍K|WkY#yЎCmTު}߇QP~FxMOFq}Kfoֺoc>B}Jdpo".F -16K`ʢ;+l =VuǼv;׌̐>Y6 AY`ٴ -,4 -1{qkUU\,&[mWqov [5 k0{|O6MInj8wj6osƄ4s:psꙌY 'Tċq.u}x՚%an5CZˤdwj]o5bBS\+rRK0m5ddIYpCbަ$KpLg#k,dUF&^Ɋw -b% MJ}C)eߪy[MIvPF[fuͻZ֕u*u{*{]=v|G,p}BvܝdWd7zم؁{w#%k͝u-o|TT#Vj[ބI -9 -S(52`Q.%1\0Thјw)OyO%.FڪYses 9eJ[Cu<@ڥm% b߶BS+amp$n6wit{l<'SOf)fs30h/ ׹,4ook$E? *&nQH?ռAISl-V~vxgV{vglK<:vziot[==x_ovUe(Zy(W!Rִ~N߈q vr<~M)%em:l:1\RhLUnd 1MI%?ݘǽD..R4#\4G (TJl&XP76= rXKCRhcfk];pP ÍmʹTŞʇ185T,BLf3 #m{ahl°T:$(j9ھ%T,Z$H3:9|`uh_cRس:/9qSbTSJZە/_O+xUz|=\q]7,*װźDU_ʹ^/MˍBU+bu ->ݲPV~ i bi ?4@M= 5=N}ҼmR׻͢XtkűIyΫ[C -7 ϊuNyuW:u^iseU_ -/OdNĿ`%*{-b*ʬaīQ -ǂO}GItIxS\3z=Ϡ#%_' }0oӋG,\7)qP$o6~YNTA(5J|]KNCcoJe*!$5U솄m:umHbZqb54cXӛ2OͪbMoݥ7*٣eUl{H2 -N u-RI,|N̳^2ὀIrjlI+}FՖ -4${|W_~_?yR;o=7o_zg_SiͿ}֘DkwJ-{WTl pg Ƿ{O'W^~tYyٗ=Oscc - ă<=F)@jt v ݺu^Yѽ̞f?H{3Հya{"Ĕ.z;I4H;^R`)c\'%Ƹٝb>v-Qӝ|oI(i<-Wz:`T3Jǩx`r^H;ZTp@lKI coimǝgoeF'jv{&Ř^C"cQqhxc{y%WD=l>x:P Ʋe{bP3('whd 0^~⁘~es]1i8txW\ĉGEM×)dz:n> ˷'H -YY$_|pa -Z" -3ZWhwt_" -x?8QN>?_䗯@~+?(D?{go^??zgY3^&x_S 7`!pһFS3~Gbr9ف@Q6Ԙu~U4` NT(pA(KQahz<"=.=}̯:hf>a46pHZ2pA4KJop?WLN9wcp*f^]Ecѐ ]0eyqP&⏸,@L\bq&Ͻ\C&;0=Y ubgV {_z'OCYLߴTҋ3O02KJ'@T !6^XnsHg8S4@lb`KӒdQю!.b: `0ӎ0:L zY(I̙)zԃإ A@ -ZJ.nC뮼\R[?I_Y7׿' -ݨ:CS@eE ̰̃N {. -7w^+nS#)8i(k ٌo|q5Z>9ttd) 1 5F -R6(Nĥ;Sy^ͬFݙfRDiO(ejb'CHQ܀^G $ʸHD֠iA3+:79ڊ Z\,>쐫-G 492xTo, .C/~dcR%gk9h hE9S>N ̀B~C_bP'b :=b@9Tf/Z+9+ޘ)IC7|֡x -B5*BH$Z5T;]\J%RaP&/ Ѳ V2P-sbY:9Nc%}p,EȐ֝0m-aHF *3 -`f?,B0a_%2&7pN6:nvhIg#)Ǔ F)؂Xsddqhh.=>n& $1-؄`a c!)]Oc$'0}`A6z䣐$<4e4%e"7$PրBG -=8I~=pjZ8"1;ڣ8ЈQ+Y]<|:Wܧl^CA'%cga) oCcb($dT~t=\lӅBCCn~Gk7a;ZXAqpZqSƒ4XvjEh[f)7 P".uF@+" -]"ؐ! :/{^Iiv6Ċ3"MDj-c"hD@rek@AHýN tV4<'lWqCpb,;=5˶ &Y%f"Vfx h?i!NU4HZ2x.;O03;Ņfq=rH`s媸Þữq&%ce]fڎOHߤGaGPYT*$' -ovRy>pC$ PL|{ā7ٔSB-\s>cZ5=OUGUj-193\mqxP(UܔtDr>i +IT"[Q N8V ce3D #7Aj/d IghcԉViW*d_M^e9fȇx&"#v6/ڝخ?bB;˺]}OI?.(wSj0xq3_ -| vep|2pt~F~FzFNHo|mHG?]U<'8Q 97  -d}bdr G==Ttq ,9˪)4&Q7Gzz)sp$gCw*R\ JhG;Il6= = r'x077qymćwu۔Y&kO΃vsS naoa{kOg613÷YOxfror?p00`$ 4BY6"$6a#6?hGs^$L1Q2H9,-W XA@`:I=ےD 'B>&v) iA<~fm*kP4Pؠ mg ӀgTM]n 3o&{޶V"v -rŖ~qYA_9vC3sňܴ{D`h6 2O 6~u zTiF;ؽl]<F5p9Fzӈ9 tq 6Qwoڑh{BX~=@kvmS;0xL{(1xF@m1h`޻3Flf - ٮ7sSts}ˊҖ,3l-LӃiމfOL]~8O$Gb8瞉6/(%-/=%Yryzuz'eZ(!q{` rvK`3O"&1ɍW/8MN4֭~[9rMrո{ǏֽyxuL>qJ{gzk]26H3a 0l}Wx8KF.AurVh Xn kf`IO(@Q7{ -ѐj!P™|Y“)҂MQB?c:0ɫ4C7mua -]|fLd]f^6R3܈!,%0)Ov6"mчȬؠP|te!*:Z0)G(3@ed V͕ˬakYI?1> ٰҒ$a(_[\,΅iDX/w|Ye1a a8ʜ+I   r$F  ~Y[F #+x~:<._>Mm˒4wlK1p)aI/W` pZAсQ#Fm~L,:r+>N4ZkT xZ$s4NmӒىf$Ѭb8UzXhPQE"` ɽhdG6*fQD -P2c%"ӋrZѶwIT:vkͬ+vىgfq@m]bɳ[u -<' -RٙArDi=:vhFI1,K%#q2l5AEP]D[t,psOD;3_f| ja! >0Q7-)̓L@A Lf7ÙBkPZqļ8EfCx9Ӝɨɠ'nJ! C^^6 'o.LLQp !%+;e2{2uKʡ^ŴvW)hW֍Vǭ))E[}n~A.*T1@ul" 0ʁ -d׈ᎊNvSg&@?yyy'H/aTX-gv(N7QiXD -p̢~Nf0Ԡf g>ϭO<=Lu7D-AY?dxZ08ZG&-g`OT9x o[M(p77(sM>`nUG/e /'/A Blm3p&pERiQ\'Y_NKyͺ21)DxHfe@_-* VtLIcV̎L`c[C,/>FƩI,Ȝe&0zxD"<7dOYaӭt KfNb[ɞ$2 U5`)iz'_LDO-լR>Ad a#t"I^bb^8ј%SXx%u-)O4 AI2oo$9eT[D&{`i^ -A:'x*Si!/$O︮{F29if*" 7]oȄ0iFH 4yt~Q0؛_~#B#R`D&o#ܓV9H(C;"[{Dfdh1*`:!8+,*v̨T@x̺&/)AF y BeATvcQ3T@bNXŀIH 9mҍEm.}$-5a9eTaTk fQfH|haVn6BJ(RƎ:Wggom@47ޤdq t[?GVUsϾ{op1gFw=߬A>JDW%0$QB2K?letBŋ cP^A%B}a |NX?Km=LAXUkp7K!۱0IbG+108}#10vn̈,2|RGVNpm+*} M4ۀ:RCN(mlGM:̤֔W28r_Cj1豺5^㷮Կ RFGaU\j,K& -sv"~XC -ӈfk {FꊱXːTCK[.N)&diN%4Kn4>h LZvISdL IhfZ.84[409*QRCUjR-b{hŁy,hk#-Rm؞BVG$hZq-OM(ϳ*,Rz P``B50֣$J)Fhjw0.5| (YF;+Y zܒVL8lZtCE=)g;V{pz YӶӇ7zH1e,tJc~`-y+pC-"zc FBOTkI&ֽ+>0/47GdF Q_:;p+Q + #Yt.@׎"=>S(P oz|Tw{|bMaiU"FZ V+ [dy:FM.ItBZ&mpj5A2{|>2WGwzܧx|xZ-<-v0  њ6x|")p'z&gb'f\_ - IŬTyI,fVsQVt;%P"`&-,yC8tߤ;7ªvyK;)x0ӎW؉d$c7&ւ0`bl9ElÀ.dslJ}LY}Iͳ2ԕ>{S،,TIN6'p\@/j8 -^$m%KB" 7`j H,D,JHlwehdFLB`KW:6k (/XQן BhXZ|D旄11Is1Tߍz)0e 6Tc"&z6m}Y4-`n\#T /"lOasj$Ό4 ߛ"&ЬuLD:;H#Y>p0UT]bESSG"nY - WJЧ:J2^$m%R&IEd13\rU'nQM (0k:TҺ3bSbKpS*wTyܹ O/k ;x7 -Zℑ-hzr-:FՒbG%E\)`~+aGo1wbj)'-evjLuĘJEZ8UcE F;A*Z& 4$ -ՕD-*B.bj˯)xVmS@c,y$IpMM8r1Փu #TY+;')։~\"E%rAr;0p"==S0,ݜ8C-ftG¼ѳ$\+IO4h)Ӭ'IgL"E_&a B9D5C9pjޘQZ)-z%eJkLTbŲ_XxB >e1E(E]Eٕ̦h8 eӜС1,&sf#DT0(fD5Vt_q`\@l s,H{y"EJڔN"EB!3(O빭;3_ H)&3|Or -uOL:tǿcAUM[u홏;k^#rge|\UYN䓘Am]ҙ֋Z' ԋS ĶK"`W DF;qˍN4V -'!G͒P'oWHkI]c5Zb - dыb<[^V- JCdx8W uL2Vd'W=4l_}}wLk0 ̈́ hnEsmÄHմ#vY@ߕ ^Qm/?Lr 43ѫWeeri ]E8J6 f5\ݢKD'L7q8Ì0r癃?zTiioC+"Yy [Re%TQtlfX gHBlݪ3N-^dK$p{IsR -CŐM{"X<@ؠ"}kk\lVW -' Dm&I\,,O;O6@m5C&$ϱf*|„ulRڹkEh'Y8:k֒i V*j-FF3#؟k)aSѕK1xG`YciZcqc&+&3: P`2m17eHWr[m7sH6vV3s1g#Cf4$.Mvݘ#51ŒT5q^\3? x%}nWC|(lO7B}Lě!o:"[. ϡ`35SvR;PM}zNe3יkT f> ebˆk+9"JwFzb&={w=D.LW@*Lwkl]a_Sm?n`?oāg䕣[GPvt#ktnt[?)Glh. Ń 0E_=H ;,|[샨4l;0s a`(h{.d5&F9\ "ؔ XQ&W2j% 21m=(۫Q=fzGaMtWt;tӨ++Jw;qY`xmzX@xCҮXAzHhNpEG5@ho%%߶ j&[8ؾFl86vr7@2pq&mAsiJ!v@;(`OJ<r6m҃~@Yo(޽ao(xX{I9;q)5q$"pN W,Z3VZ&iGӒ=@{$ai`FȘX1gUgYo8((n&M*Zed N),o4IUU}zafixr͊TD hT()(*#hWף&.'4 _ 8bʣksRyRb%U'hTX(:&'CܑN -Qb\v6G SUO0OJp9%aԘE_o*@qj(@ݩ%k\iBy*|Di8oގP텎K7 -N/^Lӧ/qrXII.N[6K6AfSdetpf/Ew?EZmnn\] - F=>pMxM59E*Tyz-^pqϿ*w\aYV='*I6ǃ\ۖt[ &g'. 'gb.'gjE9 wj5uqߧ_+8侭sr5⼥[jEzy"w5wu]Lh >? PM{ *4i?DNGJW}Ь /QhzЈ?1 zs(L#ԾpCP-%x |,".20o48U' fvH3mu/Ȧŭ)CQ[ rxXL}>&Wwy0Wd%%$ -alisZFdm 泉Ə6umxF5Ug-;P1'ob2|^N $WހYa+~Ū^*VE¯U\¯J_܅_d#[ yeOj -RY߫RsY9}tKYZs&-ZoׅYV^ fGhf_Qw?.j,?=y; ' -jĴODulf!n%t'Ȁ͚di:PHG)rN[AE(k\)*rbV5&1^r(*wTTA<L,g̜^7@s!*}r䛀V`^PQXps i fZE˪e?|Ad˗#c`N]!"B?Cފ8]24ܚ%Aw/?i?liy4TFd'1ӧZ64/)L1CR& Jtt&>RС:?uD)L4m[ -q`a:8``C4Svi!L;C)Zrayӄ1!}tl*R% ԍ0+ʭ81d; ǽ&_5JdȤ٭vVUfkS6?/gȻ-B `-ɗj fƯ0_xVz*`IdeN!柃"iDKR aewe<Qt7j-<\RXy sQʑ^q!FO@8|y_k|7QppʐH_K;}Y%SCŭUX+8;E)H1Q "ĥBr8"ʐQ$$BhG@40\G$Anm wG5`5]u#`7 Ā;1qYYѕqE6yH/7BsF&yu\ "EbqEμ-Ep88IGjbpDBzBVM@NL&JURB+.ht4 cA'`)1+j'NKZv~Es~]@} q \݀|&(t4hY6\[[CJJVE#~@n}^#( 2h{aې) -Z6ϟA_nB0Wa]ٷM8tQi>bXՃGSy;jW:glah m|2 1۹: -'϶lk5/.2oUC쬱 ߖ]ȍ%tsA VUy8i> ٫2W٥pρ;;Ȧ,"  =ړ6WeqzJkL`/u\Y Б: 4lAF̐TArYni Ji ґ 4a̪5י-} X 2#|'}nY"c:Pp5'e4S)Ίv.iY~IGr}0s99lil]Z6m]YG02dmle4PL$&,<|>ʀl2a|2O`kQ IDzҼ9B0FRqڑ0۸r*#|dȌk;Lem+=D,.iڜGVC" -01:4_guY8v4B>kq-0ꢲf~Q_[87W_-Z(o5-/QX;ɐ'?QA -'R,B6K#9";EbX6ǃՃf^2hLZ¤u!#:Bx,`mE-SȻ6n5z }V(pE+NpsBI-O{5,yAJ7M"!i4BaVQinT5cf#ů h)=<ϙpCE :KUP!4jw&NGrBu$U9c/:{b茼Jvq|! ,vD專}9 -Q#`c -)J,$5 -,BԢJ+Cu|>_DN]=v)0L6VA5d-HE41Dr,‹yC'!QδXU-HR\SHSؙRCn x[ ٚ 4,a}];,gɇBԂq -QUEZrK&Ϣԉ9!D®STZmX B^%G ٷ2- /='FD۸0Wt?r rQfCv}A(X]TR뀰2KJ``f$:jnTt"Ul&BSKY8`Q7<;ÀhqP'Es<̶/{L2YH؞41#[.hHc/Xvܽ#[ߎIL-5 g_pAܔnPdS]ͩ0^ -"]#~bn+t*aF :xE؞ ](9& FJc}a_Z~wHR :QD)23!a{bJ\<2itRHCzVO 3$EY/Pt{f,z(zdV$kIņ7n 6|vCu${o/WT-fc A-n/D;X$=WCpt ] S#Z>j>"jʂ#=$UQy 'Q'>`%K>+$*-vBtYF}IۮO+]%h-WRoo^RCZSCk<]HT;u5/ N؇EElW5j)|^1;g:\kd!oZ"K>'HXU{)Nq yhjЧN3O+)*5|5 K\qO5{yb:Fǚ=T{|c $A[W4#OX>coNgS,%560 ^LC**N`Ciꞻ ym SPBaAg_Ye䴯29ZR_F{ᓂ@ hRRj+Ļ{Vhƶ9&-WLljCsSDLzTYf/i5sꎦ> 8[fn9=A @_K䟳Q EЮ -7ai>t\?M!̙ᆊ)_!3ĪVa/H)OѲ!(R\EhS0.E8c!48݈!Κ|p= z+3l[!4o7тwp Y 51s׸!aA98m5oܖ}i&vaMFK1!n4:=zD]X/:,.p櫡=㯑q$Tm؝[LBG藐z;4bHX!<;2Q`>";QcSt@K,884YH}t`#Lo-0CA5 9mRZuv) !mm34@i@ -,"Trjd2 0c,fC8)%>KH3*sJpb׷r#鴘txoz-x+5WDEz07'1[ B{SגYE :~}"*2`dd1t>6Ը`>\֝󠏲(-NMhh5+_.b;䥝DPMQfӞ 3qw5e؈.APƄfXG'VLݍH{hf!KԲX!;o?;=D3jf \^*pQ*K)fq?bͱmM^# 1OcT'Lp  asEGp>o;`&ژzQsp"KfC{'xk5cMT^\E#d!J؈|a'Ñۙ :r\Z+D&E-&Fg&%>)!ܕСךktZ&#ZFw>@[OnmDn#bfzN^ۇ򇹷^AHH:dµ.@~M[6VC]wo@ܖtHg{l8;1[{P6s@g9'goxLYp0lC(I9V{`[΍:Bwbg[ -ۇ'` B${a9h yхVEkB߯MC; 3nuB^yu кaqّYDakxa]ֹ"##y%wsWXJӬ zWh]yd@]m&zTtFlVnb~ W?sCq<7q⊁~te[Ut/:gֺG<+QB{Mm, -_JkM9nZׁ+Ww[sz7;vپIf\Ϳ~7>f 𹞋7oDkĥmzP$[< x~=A-Ԏ{TG^61|Ds!ˤһ/qR*70Iҹ9̂|n -fxܱTR截~s8[|9k(E ܹ8L[uvMewi v+qZT,e=y|?c~by&A`/b БbPXM=ў*lYAuD!NtY)FA^>&W| ޺ -8b?hk  -y@R --A#Nto7_?;u?Qq,=`j4-Re/zK0hzzԠcC1C8XBf>qzBsPW<Ȥ=kgP-8'2+wߛJÍw*rS^ ̰ -DO.7}d^.)jhU,S=ttp]Z/>>st4,jPyq0kV،tuN ۠o>>`z.N`ET$ ,-'&HzY%ct- >IUgCyݏnwԥy@rCecZ`l{y3 1!| ND(&ô2"{ìBh` @m>¶%Ž ! @حzU jԝ$s`܂r:.th P٪;I71@זQ0 iT38 h'1r3El^o9bu(87.ޯ,ѻux]GW eM{/:?w=v}AFSsd"X$j'mhԜk|Q(P{4C^f5GF|!^ZF-#K#s9Bl+h6(^ \K0uJ 5f-Ur^2IŅiw^DC.вerqSWsYVr@$mg Q'Ytb|>B :[$䧹꣘ߦ%%QRIS#0ou ?ЭIz"+Yt9ǀzoapڠ+5h<&?04hI|H - (p"HQ`(  v6Y!dug< TR(9++9/BRS50dV. (-m2|س񧣶' '84-qʔh9exʤ8 -_P x8*{[t 1LTWh4KQSI>i: $hV(?h AQ)[ED,xҽfK1 .͹A۴pBÏc\IR\ )EN&PhY2 #MVr4VIc!p| Ж7tTC!iLKHInK-t_Uˁ-a$(0Y+VFcJQ?8%|"bTNg84 zr9̟QlfS7%ZDu,eZ[Gg$N[gyGx6۬"gDGPfU6לA<]܄mP g;g<}>:f'&H՟ճ ҉Xa|Yd]L G(0zhpBH1G\GUVi$x=kUV]Zۣ %5Op7,gj޷͟Z G8 Rz(JҬR}1pl-<1=sl?r G[%,8&IӍG~85NKo ̷UuʔY(QFP@C:knGj1O`A*Tioww -Ū@vZ;nZ|vB!V9 R]MBPB"·@!ٓ,n -J=&.]q U(-N$f]r=f&B_}˯2RCҡKI|={ۢG*) H)Tc"۠h7:+1q4cV ǫ!Ё #م!)-uJ*|(syq@K;"ppBn.Jh CG،P_WhC~VſXJ$Wn͟9 'R2lO -]D -]4eh?E np@j#LiLQI7iʡ U(ɘ`V𻆡t[VU`9\)>6ZڦgDrh!ېU(OaQ.P՗]`dbS0"1b⛪j8QxE|P#o}gi{DYT:"6F ,"%a#Ft¤f_IAg>/; R/!]3M($ୡQdE!Vpyt5>S1$"Ǚ} C!'tA*.hjڀg 1tqiO/֑"F(%mʉEԟd A - f>ke 3{U%0Uﳆ@?Fz5DaDJRL!+5*7sw:b|b7w K \ v5 -!2yJaɩG67~`߻ 2^0[~0 -Js_08^SOPȼ?1Z`vQ2\n3sd$G_P]+uEcOBb;uhHsvtv=z0W܁!#j?(O9!Re3[lE=M7_5sj]yḿMB,6$s 8<jAْ8+{SY.oY`N| `u""I`SU%`v}ǯyC f~V6zSM2pv6f s xmŨZ!\z`ԁwR| B=$b ԫ ^M,ZU!'Z`Vlj #@ Vt}1@pCdD"\=Y̠0,F@ꎯ}vpve@uLx& ֣yI|}A.SÀQl|1@Йi9¤'  S3M,%p o׼۷ӅasmkvB%?ӅI};u< ]t;'^dTssk~lk1oM(:4A`&bT ͓F٢p~mx,F/gEsBֻFNtc"C@7lLU5j=j,'}T{| 1+@t6-4ۓp8JTPth7Y54T" -pvyZ ;}W@I5S]!i{` -@Hut)Gi3/?X!B?G  -vןNk+? `+׋5 -sx!"{JK`<(Y+s} BĬj1oW } 6W8'm@RJɷ &S xK ݓ_N-y[#hJ^,[x>Dì%1{Y"l_;yDa/QfYg:AhsypmV<Ę f9؎Aq}Nr{%b_ k=IGIf"u0 2d:!l -pl_\ys8w>uz̄呰#mf:/' ]3Vy}&ὢhCGl\;4!NVz{(>!U2,TQ<"",; %!@@3mAOTm6V, =FFK9$^'mLՁ?fŹݖ}6$!>JL4g QA *ʿ}~E@$'0 ie*+q֍| Ӌ*q.eOP"(2[Z<}9 G!\@-?2pUCRaG:Kk8(^cQ^Ya~HJ-pm1 N"eGhֱre{m{0;i{Wpsrd -*IԎ:Ì2I0 1rp Pg"2L~AbNoq[} S4rsQYJs/ -w?`#"ߍʏ3cR/RC8h <Uψ"Ri 5MhPl?Pdk=O"H^Vi2UaZZyBIAa$lE#VK0b{$ -G5Fl;p4atc>3v]ʶm9C,%:ӦxA`/Svׅľ."'PJOKATFnJH8NTXuvpK2aQGǕ@aTP 6,To17hK -;g9cvT}/!rỊ(6>DKO >W!`4u(/u#҅U2go]=\F"FLJ\-&ɨAm=(fT4Bc(ڥu*)R%T}6BThI^ -B@̆_É0lJagOFejNM61b'N~t^|)$DddHjnq -h1kCFMBB$S1k%҅QV,Dr7#{[ C*y}hbu6gz|<4tŧʸ>nc(p"3fU- y0Ou "D]9 QX( ȯ)00oi;`G1(fNنWB+(mCrŠ8&"0#|c,9* s)A/d ޟ)~8KNa0Rۡt Ivr^?.]7ޫeA۴̓޳pVŊY'JG!VVc^2;g tl旟]:Wt),fٷP]7/Rͥ[wGD^b30)&ː-_f ]%T?cg)6 ؟[ϰsa -7FRioEXBBIb["ȝhϲ&sxfFSe ֓F9w Z2n'd`de''eOq7!zSkL-ϲ:諟E+s[kLC;sZ(F_~s,~a:}hJ#9#̢'."o}c3c8I)cv $bZp]9ۛx2I ЫGLmE; i)m)kXB,7zرH7N! L '~bNxu glS}R,&p8&Si7pUMz# B}!& L;J gH(|Br>N3\.Hu0l\ΊYl%9br\a u8OP;,Tĝ-ܙmw"ǥq.i]:>r4B] nu~zX -Ŀ('h;!0BQiK+#O@,2|]d -+km WjnbT=h٭`,ZVpr&e4/D_ LB 2w7|0U9|(bu/ׇ9Ce؈ = * v^ -R֔qJЏxR)wQI-?>̾@>b6b%[O*LEWP}Nw}\|F #fo0pA0ңHR}B}Y&ĮI -[ a臨rMBrۛF@춘>nIm(6%ߕ!,3v,Wc{zdN MxV Ҵ(#4q8ą=V B $o[;oP@CFh5I؞inP[e쑗Hu2g{3gtda@O|Ӑ{a7I2]d|E j{-@&z?)4) VӅf́12 {= ,2߉YlJf1Xd[fJ1}z*Et*}ȊlC al8|'ЄW˴oғc!y/E׶2$)!CY cLr,/Ҕp/Y %4˷ҁn"3p\ɃfHQltmuUyр )/~ #Bls 684KZ9-ոaO$lߕ30݂i"= c2Tm -Ju2OܑkZh#]t#!Y"_b Izf{HXz - ߎQU(f,>|ƒSE\> 3"7 H'v^R -3T`(zM8)JQhY%~IȶCo)=Qu!F ͨԈؐF>*!:˛‡0jdadd蚊~Hh -B>h-r`@!CM|(ċ]ǗpG[1beԖ+"|)!t,>fY&#`3/٬ qS .1!aox\ -ӏp8m"L :F#vKF4iGň%K$]1ت 3\͉<q ՅDQvG4g¸LohK|i?bMh-BJ|/,W`?:J$媾9@s`rE|I){!K}Azq MO×SI^xMI27-Kcv8B$T"b&x&APg(r̕4,X ߋ^q<|ݍ+iΖ٧݈ ƿSRk\ -smkkfP00)Yk}1t0 ۯ~J'Q5LKWriJ@[nfrsw2P!N,:['WeNs "i/WnBTŶfTΥ!EEZ]*X3и1OҒ2 M ?]]9}hKp&31h^ +1;  K-qDKC[I&C˶kfjҗPH%V}D?4v˅y"d*1qxב!==(lӠOg|>M@t^_pjhވueikp̂;R>QlZJLs`$_c8mX1Ms~:: #gmԫٰ9¶c;UAZ̮q|O~sDež=8ѳa_wwǚ -W“[~Њ'`hݴR(XPpjCu%? -QW -rWM3lP~,_)f ce~cɐvGLޖZ:c.kэ˴+yWRu?%Y78Jn*_3KұyZK~lj-cm=܏ou7jnl_w3i9v*֖[&~oӃk#O ?ʸ**QL=^G 3},}-|KFпvNIzv. uCtWpfA,+{+9Bv$Q;ڿc8vH>hPZL$:FljxZ|c6f Hhm#x]؟f5[YY;]c8} -L׊Jkt6EHMB-[#4_=_DxNLg2#_]IVx떐[ܖqSAY0r8 ,&:#!̉1YDy q0p,7[?5* QN, Y669ZQP ؂糚az-J=?P|U?ʆ<ؼxΖ U}<*h9yaײ^8SM`~&%u~P7|}u,-d~Zig"Xt.%BE%j"L{5NTM-mݘu<ؘ !">5ےi1 p>w;YZߌ; |}1[acLKE -TL`%r3Br`M:Gýb6W\Xo0?V 7пTA}~}]2Xfn-޿_;mT3Fd蟄֖PJo`*K3"G -(Z}%|JhPH0&fd!F[VZm`ĄT5c755SQs7B=z[氩mHcL4@b]t3Brq/"EԿ>p 芜KcTlc8[İ.M!=M&n-kR/vazaO4#`',GEP[*Jހf`ʨ7&BeztGivFĦ0$7? hVI߸G-HY*#iƮ[6e>4QDQ>?;OGs[ťWťWĥ~щK;xK;w8ťNЩK;'ԥ/'ENV^.|S@.휡יKo}^}^|WB.B.z:/3^oz^oz^xz  ߑ?;Û.Ԗc<*Pw_%U'-Cw6%xjK+tB3VCW{#?7x$*nϿџ|=ېZ"X8nif!Pv{: }Z`[TqdEN[(#8||JL?n4R05^$5[ - vn|ܣᓔimT3Iuoh,TYԢ6&ADb{^=8*:z06*.fލ4*-=d^U:raC;i";( -cDMETiPn45tX$M([4fKK&@)]lLyH1k6g Pƕи { }(+,n{X{Ry?b)6-aydU rs zk)3 -  2Ge 6rv ɹsTsv{"lhqXaH:7 -7#6` -_*;?cE=L_Oȵ#TΗBF[!Be@TO>ɛ$;G|K)u==4ٺMfǰ'b+1{a7”gZ74\`6wſV >2c# X~٢ʶrfG$i󋫦AV -z}o{C>~z@gJDȂƚp7/JE.ۗ{K~ӗя}s̛>^kܭ?T{ATDs*;م <0jYz+3kTSeP('"|(}[zFa) 菫gmpɊ晇 Na̙~Х7t2D.{p\+cJx*Tqҍfp|HyWX̃l%\\n\0 WU=z(rYAAWh-ba2IJE Qic^lNy`a#k0۞ |Bxx?A|<-34sEEF1G -!mbDlD -#C:VB>,"巷Py˅|D1lk2 $O#=*Yɂ󶙜BMY0;P:D  ! S1AreDs(Smr~UXWJ,`[kԿA"AU5!tuM|fFpd:*m#\5 w^2ʰqJ-ApR9SrpOy.pL{ޢHEFE|8T;z@gEѨ&4-"pž>y敏:FCMqbhIO0($eȐ+];ZVd+ŀ!8cWK)YR-W8,Qj.,V?bXe3AisD%znFšԣB:(TC$rZmLo<,[0,CQqPhY?k +U`aMc)7QNf똭N<ÌÄR,iF4˸SX$wu*s_/7C8*5k"MESOѯGQ61þi)k~ VpRy톒)(2~UlF|~<+Г>421C[MUѡ`=[Sn_$#lcP- ul-GPaS(з 1[vGUFۋ9P̲-x/3KG-@#ml l9:8%3Ҩ];÷EĦ SN.N zSo9C[0x Wz,3_㰶xJu+Z|/)yB)kkξ%UD 4< 2S!H~8<7$'Q%&8U?}hf$;+ygĖ  oI SE3nfݷ"|_nqwM'k`FqZHES.g0`[͵Y57%/!ug=ls ;bp\f,zЫRiA+uE p_b:K}Q.FC y@:ČOc:"͉%^ѫ(v'_Φ6'`S'*E("ZmS(@K/Q=U\0A&\FTn8Au,MM)B%ơNX/FWfؕTHZf$)pL^*8}nd.:wkY3'ƖmBm)YҤY&Zh)|_ -t] VdE}Vnmu]z/ڿ'Z)oOː]> JW=a*xCMݗ{Qj߿}|EU`N"G@!zom`DM];!c%, 1NGDL]7`y!r*Z/9p;Yfm􅋶#lGrkT2A6fHM+fӭk4}(!5CI>_+,n/|]Ha{bo׈dvAioyÛ?SlG"`sߙKZv# q?~UPWzg' ipMV ߆"^:Ҿf|=ps#|s0EOyycBZ/#]`iHByZmu/p;Qn3HD(lsLJ^{aL {- 6P,h!14)&,-^v]-MDlr3h}6I1 EhrEӎ!qBw;4,?)δ5Ex VZ eBOpn6!hfwnKpY|&#"DY"zxOGdit/Ľk} 0(vnɌ=Ҹ*Ofj(+`E|r͕`{/͊6WXс|b:{{ۧ,n!"/Cؚdc jBJ)|ܠ`Bȼuh|)ЕV_8Dt^è/+b#Ti-#E%PWy[s5vջ JP_DYAK@="͉ XnobX̾>KPH!e ?,MFE2c/B'atF!Shk0ov8$mA=WJVHal hXRHAC`QK}9\[+oF)wWXmؕêBpFmMQ;^Vqj !} $`DKjtj +5E#daˬsdAOi`2NGߋ__ع8#i"ðcwn4CR聱,`JC쥈ϫĿinYRSEj C2ٮZY<+2TbHб㋿\%l!'T-w%04N2 x0 wdQ*oJ0/EgP p%DL[*Ux,1+\rf|MAc.ʯ"JkXS]밺^=U_X깒A ?XQdV˕&н9ǫ-jD(ooab@"_8~W VXF4GXj8W Ę`e/2# .ZKL$5ߡ^)k#k4)ծc"H18 *up& C D!۲4ֆwam:~Zڅ.}{am' kwL"_Ovn61-gmj_M;#{Ά;e/ƒXqLMbm|{8p#{|N3w5 pЗ}04.q88@۠\0E.ZI a\pR.:t+f~Enxu7ZKvEͶ,Zs$X!~.y@\gK_]}ƶ!~++0GXؚ/`SS'~'ZR࠸ۊ -+Id*2:JΊW&z-(9IM] ַ58{w<_ˀ":0B9nl0,) X7L9} %Jne_v,Pa\MkDڷ8kAyGʰЫY(zHl_%5oxО~R‰e5By$?ד桓oY)(о-X]Db#!R^{ewȨFaC)\&OƋJЯ=m޿_;k㵷AזOkKG%? vh%un=?4vZ[I}Pߤ,Pt;g {lN4_'oUUmtV\PX -k5XPg+L\m%z)ݼ|}ů<}7_,-bAj_Oh HMRխ8ӽi~+>[ {!JDhc5kL"rӝƽ=w#O듒rtWm|AK(+Zg`pbCDKM1exMg!Ѣy.1DU&!/)SiZ5KgJKQ(ٹI4NJ i!x\;B橲VbRid!C?'P PX(m9kʺ'HOEܜTčtGC{*!Ӈds5&}&rh VfP(^Bվ(OËJW09HljQ/ I~5i~!ň4BkEK+AuJpW_QuZNFZ&.ؤZ!#i'b+8Ԃpչy*.*# ' >}Tf-e{9NZ'K+7 3۩[{a.)pfszIP~JcRD?\l{iT hv6"S4 -r r揸gh;$AsG"N7p;{^*Ќ&2+pm0i4Z@Ɨ%`5:ʸ)i3I}[5(r]nPEAw uDۢ3vx-3( ዩ`BHC\`"ٚ$$8I)RB4~"݋grfz'w/quO@WuṊ yULg^Årۙ![܅6T= >?0FAn4),"AEF biBu`'iL4լ8 C\* Q7z{,{aH 8+c0| ,@4 -͒ i扏@% $aoW,:hJMڅdHGn4V_D#%-'sn(xEJw*BLw -@:eK^܂=hF@*!I+W PWEpe_ Qbl6YW=7n @Mdpg(cd4!>YRDq %K,K8s(J__K.0A9ITW iybvCfq fq@1ʜ,N `i`2xY<85*2s΁zؓrUt$rlVAey`lS ]U)݉X$R,%#C&ҎN'2 ;iwܐ Iy 1a(m7+tD֬2Igƍ9˸ф,!IH dzs sj8B;E B]ܔ1 rs?F;C$'C9Kj5)< _?l/9PPRAa1cӠ[iȂfc~qٌV}os1b0ہh= CrS~@D6G&RP] MWᘧEࠉCu('FR@$,`-} ^n`Jr -+aS,+FwTX@Tݠ &2p1S -~Xtux:lE|a,A~Mhwu2!mo%0,JR/4c/ޅ.d?m3Kvu@Nm/-GMƋ.kɂKLHІ)WhJBԯ0Œ /˭l@c!,0{XBi{( -Xcư kPcU{A - )JBDr _Wy?֠i-m[dXFW~/l l VMWNFm=va]5=k m5Po~;Fr_ -0 C@,3& `(Y+3_|uΓwIJPe 1*[_=ǡhSUGoi7凝:5Pa!&$WT"r63_ʹ<̪1&@kK -ALQ - @Aq>TZkvT`:49Z܏knϛE&{\l7{{S~$wpnu?_џ<´8^Uq:=utK›r-QoexMО_?}w۟W_FY_7'?ٯ׏O_o1WϿӫpw_~{oo囿_i; t$ O??|EmuwgwxǏ+ٷ__>\VpjO~`aώw/~x98w۟o:}??/?ohcF @?X!I#((/8"<"̿__hO~ww]=WDL߹oa0I{ǟ֠'6-/?BX˦S$F9]TGFLB^oF9Š {(J g^m<~F@U_yI _ʭ ny7D*bxjR}B6q`"I9a Dc4R$Oa )7ъ9 $(|R`DH[\DRP%rUh!5lnӠevY3WYj]ylmF2l/ܺ"J6XV ;ƈkϹH BeaVeeFF|Bpux6fRy (cP;`eܱ&$E9O*K҇3V҉[Ntz0sJE#ur[&%c /!D1zF|"PM!{ ʒ2\!8 dlUN &ljs>6-蓭3{UȻыBp~Nޱ!ߦI)+`qR^Hl B7McZK}/wxGΝ+yh|\=#b[|[+:.R*<) ̃*8J5>2~ѓ(LްݷkmˁN_2X=5T N7/ͼ5_pa3q|z ƥsߢe~13R=#n -7hz٩v9>W7Dͩ)5rһ09\qN$ -B;ӛB4tgm8+(PXh l}T<,Yϼ󋀔+A_J(|+AɱG<f5ԫ{6@?MLMB4P:g;:MZ#"S e ,6鍅?B 4@ęu}Q:_ɿM?'AH(&}L2FyЧ<_ݐ)$*2!@ xj_A/hEܪx@0hzQjRȤ 99,m}JBKf{dZQ@*ؠ3u$>~'m[|=J񀘈@1u$@oC9lO,PFC[1_'ڈDE!-'uhP[*_6,b'{M=8.:(L:A.ci$T7n踜) kϧs`3*acl -4U mEZ,_G*nUCbjne%2HQ=@D'=b)9<2?P;`&ijFs#Kf(C]h< -'rȯ!cS2G<3I3s Ӯ 4/1⅓*бR©曫>Vlŵ C6\BOe""&Y -"t4}5UZO>P(%+$ lPe2 ҿpyj\#{O@kd?|"44,diq @7htyFOTGfʓSC y\S {}+x0 m13 'gXWc@qc4AsdceBpXqn|$cǦm ;yD|h~R?_糂B)>cS4Ԇ >Lry|*c*fX` Tź[p.FVݰWEz DC h *-ms !.1o`O%wC -l;:l"TT)dhwtiF܎  xɇ*-y'"llӹ!N/|Yh {{_Z>1S3k[[. -xv@WQc!~6ymk"#F֒OJKɯ Pnf$04Pvd@tF\[agTQ@((E+%Gl4]sW,󟘮.ý*o )2%O E4\>oCrcĴ@D$_hɩQ,RP}[71S$ȁ*rE@)AGk':a[$ְn-Gz -/'kܐjȎz}\ jjS"\2nj8@L<nE<2uBU'F ;]vy:M#]rtใq}XU5 Rԗ]z*~dE̚7MA JEy eP=É  ;V DK{D,<AVV4n<#A՟Ҡy#vg<}Mͼ?TtVzU4ٻMGAǏc6AZ}LT), ~t惻AlN Ԣ)gt"_fƎ*}k,#q.8pfP{?9Jzg$b*~K n~э-ρ¯_IT+&M%#Y5bZo|I5ŎN3Oˣ~U -GSr55RfˣXɵLZIJ%?U&I: K,T3Ȏ "%vB*BWKn"t֧eNoJ*%&N#G!aIpԓc߲K6X [19I^L/14,}?zq`~R'~eQúQ Ad2O=88{BN%M<೙ :AȤ 5uRHp~ĩVr.w*!SOQ=fpȣlO/OB{?zi`Wt 0b\P$*VF %Rw~+t1:0S!a%\"*JϱfpJ3zKiRgCɰ$N67}t-wi}.-I^ʘ]:57h9)a^i;9i6 i$%_G@ox}ADvu&=a 20ǽD%hˬJic_ ?moNΏ.ߝ MlIIPRR>{\QqZHc,@O/5si XTdn(kBeİ qܭb"h[C">¾剰: -#7 Pl9 -:!1>W1h -䶘L3L yEڠ:jD豨>U۫F:q>/gRǧ7Ï=vn.Q/o#< e`WhZ1?hnE>stream -3=2n0@/ȽkGU s|v$)_)A -Il[o,F\z=`]9y~ cbhKm-XAߤXL3-x =v҅KljMYpZZ"C{/;}6zHyیX39L񚕤k{U&Ԃt!`'aFSڴQBtƼ@.O(zfO9ˀOY X%i)d]XMqD:?~ĥo`gZ,dQ`2]G+0Ͼ=-SrrA"!Rt 8eBl^(T7|Υx}/0XĸiҐ[i >tԞr0׾P3|Ւ}7g У gr?%įB=ؾ:r -Aw6\WǥT@ i 9xݎP;vL1)4h)ҼgHUqY%2]Te=ʎ)4TQ09~8:M? -wQ4Pq=X#d @)*;M7yf97(޲^Ft =3{4C`}`_ʀen.CNP>vVD -%{:fe.]]oEɚ$S[Hڑzҿ"0W^A 85o!O-\"*ALH߈wgkk!}AE~`ttb7,%ccusӄώ\kܧ[9bo1.{ŋ?Q@,}_?WGw1L_1P~A[OwPJAGmIৎiv56F|iM4_Ivo~m5j\ mHDÚoFۑz9_ROm$ؘkbcR8,bM?oT1[A av, IP.i zK7'm!%{dAi?iSgӾ< ˙M.!bg< P~)jD)*K$󏌯_#x~]%n./â7-n$xUUz"O3񋏑yr_L0YEn1/Nn-7v<&L $W6jn I5*zLhJLe` HPo<5xlRD5dԹ8lR2S`;= 4X%Y3dBt+G7ٍtYR05,KL7^Iҵ zĝ&3i-=ؙ<O%TKv;I/jL>,ύJ=5g'!pUIg{}_8; p&9Uﯾ+M,Z5 Z"UFNZQbQv$jkBQD#D bye4PI{ND9Pel5ɎȌIQIJ$RP-\[Q}S#/9 A0Da1B"@{fŶ 0ys*X {JD=^'Z+KriiiG -.x$6Fb;?L tNpj>6i@; u.36LnGnºnQb5 QxgHv4FΘ5yy)]pbr+3!Ojzt*-tLT~iŏVuC.`y&9xN^ F1o[jf o'&6CmՈm%?WusC k6Vl偐)|7SaAO2[v<('YwRd ŀ/Lٙ D -C d)&":T9=` @LXύgCDn,/^PKRSJkPfx! x2q !"f9cL ;(FSkߘXb_m"vUT);:"e/S'[֤{+[Ă,HLdM+sPnFyP/&<ƙ|̙$GP)e=R:[2(*G"f=k6~^5o 5|ܲ b e=`~flEE<)X𖷕v.#u;ApMD_#zpD믯hHȮrlLZ(}$O `TJi3ۘދ6M5E -mr;107PTw$wLZ%Ar2F)6cvǏEJ ]wT@IYmUO'D!*ORuɍH21Oh[k_ y㏙K V~pb%B]fIY t8P^&RBymORF6"]Ӝ2|. ndfҞ6 hO00?&l;a Zx&OdyhH Uw! n\Q'5bjkXZ⻤]6(C +=Wt4l@$cj*vPS'.pnJi^7Xdؑ(^1 -j@>.24|]FZQ1'~4DS%x01\@Cw qJƼҾQx2hA-^\(ĸ)l)A0ha]1W)ԐnsbR%Perq)jH΃J$x͡Af(pCđ~ dKO0K[,WK:8ZdɃ!FG8ò{OQOa{ \G܊$`shh^~n'eN2! #tf%8ʕMnOae3C?]c9n2=(HvjoWbhnpg&nǠ^$2#TaĩP . $VLK {8eF0=lj=ה+fD|{L5 f㧧5H誘67^ɥDLZ)Jn qo*v]_ktE%R+جZ26(64a$&@zX#ZKێ'rlHcBz"タ !;'J\" "*alTw$(ۛ}pV:po'-K,ٱ\id f7)?(TTF+&d$J[ߒGIa\CCMbJfu}' u h1g y.6JX` (9wH]SztAV09=r~H -v9=U{`ݩgk02q%D<ٙd$zTNjr*6L(g>?Ѡ [ibj -2ڣV2%܈,6n]=# `R<gNxCt;Rƹ0 c >?cx3EkX#an2=q$qW z]?_ X>kJoǹIsDKyKIGAK9Ajs4nIͳ(`4]0D[Lt,ٝF h cu=[L?kjbCoM -,1ܼ@Y>6žvu|O%Nl s:ouFFʨ)xՕp[75jfWfZBQgJ< 0Rf5A+O֏",:J"$ RF-7=R_cuv[,AZ+/YB襻ݺe1S4E -SfA6?>4lQpGD㫈En#s=؃Ŕ =}ԕ8-xp#˗B1Jk*%xL(Q5TtJEސ`ADڇr -_n±KMn%Ei>&Iٵ^CKyqKb=cf"@*9R@:jXƜ. ýI$5YciVuzRf+=LSJa`*|BBo.az.d$O2.Q, ?Tp@;Z%zDLqźXpK' xm/LV`:mKu~ $0ӢŬV뙦69-,'C]ۥD@գ$L -[6JM.%JIy^2tlKŔ9#UQzˀ -.UV;L9pɰb -AD&IJ]L@MSȽ@hS^,♋ALW *?+B b7pB1SR qĞge74^1ZQ sR0pkH,a(Mr27o{ד.Eo}rG( /BYj,wi1d yV - 28f5eJRtvĩ½#3R\G"BET_#c}(\P~5BHDWKkᄝ2ܻrf6uG jeU{DMw}x,`X b;l?Nk/jT')AHcyEP fh+C}a]:E[nםY܎(RWzA͈h6E򇪗Q,_vQ?gCc?in)g^jc.aǶopVg1KR3kmpE{@.;= eDYg5Ftm]nڞ4Ch3©4%& (k/>܅^yXWʲ{<N 0D(tՁP}m%QFPS5rFK0oH`31jX6vh^HC;+P\a -5یS ؀dV.l['Цww*5IAN?zrLg7B.Y78@r`e6><o7 -鸓t5 z"y^#sѣGTQX' rg=$ϳ)LWϦ_0,M]E啀#kN#$-p@|lIDL)xi&K3TK)&+J0!gD Sf|;4a;"PMu=9ƮǰK@8U10Ҙ SIz;Q?hc&vɛ1# 3V'Sé膬FT]|Iѓfc8֨!v#o:Hvl -x -0E3a~=#]Nr>Y=Z -[QT{7&~3VŜ0cҠH=෿I6ϋw>N}ք2|]?4PT7|}twQZ)e_4MCAnH+ܕpB~}A >JrjǙ9b%\>fU[60%/OMi d# x{ñ$CUzBt8%NUGZ7aј.CZI '5БW%E)7&PBG#sfqauv(jW]řt>v@cl: #zld)H&h$P1Vy$p,ǟ{"X-A.<7{1y-y;ӯhרlv+o-Kd@0,4鑒)詽N'sKęP)l:@_[maXjmy_hC)=oīV&{PI찡*1Uam9\^pۜCU耴^WV@a( uAԳ&`G!b[DFFto(mvS(\LZTPK?=9JIT5v NAY&ֻ ~e.;rB"I%CGz)t9 4ܱޢ6ceDD -GQ~FPn -$#{TkR*̤_(_9q;T8:.}VĦɚ^!.vf=HQ#zު7i~I_UR9iCu#tnn{<2* 1߳W?-ӑgh}31{4qױ T%-}Jҹ2M̭) j1vj͒SKb_Pe )1$d:\;pxFk ݡwRi' M"dE (XJlRG# -w?{!ɓE Kr"%"f!քR(9Ӫi +vظB+$JDhƠ"bYvŗ#u"9ݚi"̾Rk:/3 -Xa/K[fɬ=t{ -r;!M[d.Azn2:&w&zQc}TUv3WM?fee?[Ak-zBVΡz;KyXMCيblMp< iCTGHF_`sysxhXzVz{b.E6qϫ{/MHB?I/(l7LMnJ%ӵl# e]{PX*Z|#$0`%*~YsM@m_RLM({ve>eNFGNwowBY8MXxPC6.-5ƪ*ܸI{݋7Ny̞6v=`AlG\jU/-Y&Z->PYo&BZ){ u674Ui+Un!$ilH.Nj_`vT hߺx;&4@2anaUw;t4b(DSqQ~m cC٬1NV( -4ݺ0Rʊ󮸶\%TapQ&ڤ@A8jou:5摠'{oC>p"F +Rr#b?fX*&աȠ/(h*ǜѬ&pY~}=mFC!܋q myX+;5ˠa(Dhre1A*r8[I-eZ]Oh!E*>OL}<(-(^j"qxE 'H,a:r^WtfdaxyW`N< -ƨES[8Z+-ZM9Q+iL5lƂ@V(`g{jiQ|݊d\?`Q W<Ғ.lBj {3tN} ֊%olU͉UJy_1O )!#uĺCJ \kGnlۑfmkkGS{#֘QBBD3) P2^H=S'n9藋F0 tqIOyL'~`kMu{z,%]$iRz0@ՌlkaKuB1ȷaAhsF8 ZBԏJX7v\17EmU,*ܾ8ڿ%Cֹ{(,ODAʄֲ䥽n[= O01/bVd!䣈'wDJ!/G,~Iӣ>tK ʚX{jU7+|3PtjvawUcy}WXौі$-0Qu(s(2-Lǀjdkzvu7-ŹH*;=3e)_JvLpG3jB/g#av *}BHzBsQ`ڱ18a4|:EQpC&*iͰ- v*C٪밾-bz"A7M{om(. qqǵjwX#oC?ufz)WB⪂)lߗ{A+E6D@jtpҁGwF-܎%QSX9=7*}6؇|L;nDk|ա@ȍa檯QjÎ͍抒t;I8O-s:Zmp9%€-'c1|>PA}l [ a9cCə'j"h~"K)+LlS`IvO䙒Th4zJ$ @+%q};gL*2쮧nH3%a%~mU vF%'|h7;5j=$1&Yʔ -0~ -F-rQ %E iix YE -+^݊ HD[i#WF_}ɼD~$)1_|9tTƿ9,>PCۑ]7T2gjVbgࡶC=ɋSm0o_'/Z__ݿ???~ÿ?_/?_wq^7HT!;KzǮlPfD0;lkb"4P[xi;n=4Ԛm6'ȢUTL Asi `$X X %VC(reFhOadS#b5CA9֨p`B ӴhB%/yS] nGD)W""A/A5^$b%@ i=ǣb3{8FOd"b[Yqd)EQq,@22z|+yU4L׭lqT"&=s#%3< $2%=d3Ăp;+5j?Ftiv-v|N 1Ez?nȨ}<=3*9rQbQk۲B"oh[=[YgsHD#%+W^ȃ+"Ȏ8R&k΄,KY$ - -\T%-b1D=%] %۾2~ ̾kΨ$Lcc',*`*OPl{C^!"(]"^U+LLg.cN_ȟ}޶+߳[x -@3Oxgx"[hVr6Ԕ\Yjd0NOCHORX $OIePݗbl$¤MjGcVbÞ@sKjq]a/ \/PU7( YVyMR#.:{ (cN=T h)zIM Z 4>E~":пWvP_KK@UlXն?,6NjAlz̮Ѫ,l^YOVhyFh#F-m=MQܭ6-N}WZ~j=Aut) čXPU XG ">:\s׋oJ?+l>{Z 9:Qm3aXh;.>Pb#c2Iw62Hg]de`IP7AjYGXG?FJ:Z,D4 -|Y&aOPL"ya-jU{\" jq|V#Χt,-b2:5),bb[4tiaS}^YFIB#ZN|PLU/("][dyz4PxiHxb7nv+Z% -L䕠l([o!aJ#&xwi}Vψgm?hӥA7V_!tŞY1X4XN>>2_{ D^)pڠVe#2֣+̏+„ ^[o,>Ǹݸ6)l0O -qA&DJ@,bX,By7kZ+*L<5-B,ht r4< ``mgg1IZ=ĩciR{Ic &{^|S:IUP48ÝgXj`ݵէi-=]u̼zXw-DԖJn-@יzt6AS ;;]:mmGΤ^z΃c>!). &StfsN=DH8V4K{"!$"qӿ -մ{9҈ E+R@p",j(' H]1GvČd|Ol -k<8c⊪LQC&X;%i ~Q./拊pMlj2VkXp1V$p3CFǺXy}En-ZrF "JٔD~4#[D42W>rVTrQ~{!0%uH`gGn7ә>6V|ٲO؂m6zr8l]q6K$c/y5HE``'II>>V =ވ*TS77h:=F) %ջ+(zT6P?Z7ƥ)SLO'\ TbI$Z30 -L2y| a?&ސ֊r{ -5{'1_> m?2y_?yda6"VϿdZUs`z_-UZRV= }IrSw K X_i98ƆRU*kVTm80 ʂCR6 2y 7#e * '8C|'r:AxԈr6˥{ -w^4A^+D Giuq;\q\Cs} i鮈wK+YAx='A돳CIgzn?t8}W -&$fLdgCI_!oZ0g -l(A\~N 8DU^-1?6$- k<wa2$3 u-^764L0|}_N[4ʧB,* ZT,Ih=GaȜ bx6;ez [ѼX6"NT+uU]RڽjǺ\p -0t?!/ODלl\1N5[ \띥Q &>Q -Re&fp[+h}.&ZC8OLZ"h0#_H@\xjRG^ qߙeL_L\ -ǖK4PD'L-E -JfOܖg#يZUCHWDC$^ PGz] )?oiF[Ď"`mu:<|fp2#ִ ˒dM[oDqU}ؠTC r_nmMETxd$zJB]-G1[O*EYP^Z^ -l:B=p7G*]ss>ˑu3QBe:>'Mhpj3߭;~TC -RI.eEt%SK8KˉG!;Eei%L$dDRZ[.W K?0ԦiF^!m[n%cѝVC*U(3_bHDkD5Td;B莡M%jvH8a+WV)w`9,8|/@~ja* -G6xL;T4n<+-0%^ϾSO~ osK*K,|}֫@ ލZP+է P?YQڢt7? (lr],ۚE /3 i,eP!V{v(ƖL6VI;+VmS7!* 8%M3X*jy$2qj\[W6I$IzǷKa&EB=0wY@3{-Km3qP4ҐhYE1vaGEjV=Uаi ZFN -_7Iv|;QN4M>[ ,:Pqnn" -Է=;A -%mwGus)a=2d Nگ -1 RD0?OР صs*='/uD-M/ѩZ"㵁# CU>z)q6/lȑm+C[J-EPy>:-–Pj8evLC0IQBfnK4.̳% -ڂ%b70fK(4|) B7UDwO|W -; ߓil%@IX^ڱѻ6.D#2_kCk"Dwg0 /P9gB::U6`٣M&ٽ· \,(Jr7aKP8HBו~U;]O|Jٕ{!P]HC-|CxCWs1RioRNHO mz) -q:J}Ѓ$:E[~>{ĕWXwCY@6z~LcDΛ%2./87r>}G+|!an@f9AqW.sg2̺d+ xgbdR,k9(Fal#B?t&TKj:zēBA{/; FUȱ ˖VLu5ZF:wf&`I~ S-z -t %tVɔUA k∩m|ѡ" HZ^V:$]SDR;;5XI޸Ra;4K̽ ^"@cD!~ -Fl蕞@TH:2<;ֺRDE xdZ=Wr/b}ǖ BDan2{nEf)&)?׶2 pdM-7l84 1%PHMzM Bm5ϡ,J>vŝ_Kg506kV|߬{xϝ[^NZӉ?Eٔ6XU~G4O''XN"3/#C2s&AN3# Pb* A d<a?{>IrafƊ6Dw5h2KVh[,Ygʥxu\daŁ;j} -p`y?Optb@\ LF L>J{_o|)aytꁂ/+o$@$Ć!qI‐ -pBXɽ ar=|vn-d6HxI!=j"6/3}P*uXen2Э)؃PH}RHC{LV{Ew6@ݒ&v)@^8 -Dc4YP{n5pl0!,"Q~gJ ֿÈ1X\lpu2#"Mn>.zHCM,{8Cwϊ@וы:ݚl|FZqݗTˑ\+=.HQ{Q-A,:]#8P:)=AEQ& b_)B(-P^Tz'9=5(J@4Q)R0#KGÁa8*(zIdi'j+N溱o1P* 0]YuW.4Ef#5V7q03 &[z%PbYNw6-B TH'EMP04~hL'ОIqnCDp}U 7}t A#}mGI1t9@8JVS -BiȐv8ѣ;WIjB~[fb~]E6;Ɠö^S/ k'̇n(@cr"a/08y d:ob#ei -^rY{+0 i&wI+vE61 us 5k4]*M/+ tcr1L@@fnZFkcy]V'Z_b*Zt'1Qx}Βէ5ԜIO$pNO0OpպuK>4 $_24}0VS#׀ ,R]THUAIv% ^|P;xN -_JH{bX} ЁDBaj3!BeA)M:8CLh *&`|_wjNO ]8|F -dw&AvGx 4RiW]k -`:k6CgULǙn<[ 'AOggUtJeF0 ȡhPWZ_1^ʸЮrfԳf͛S-cbšԘHchv Brik\MBKxץ b NDQ^>!-n:"na0|i tnk'Rb -2EVP3G'GV7bR8ݦ%|oV߿>R:o_wS1rfD@7QLgȫkz H5j"Ը"#[.>HuԽ+p -ǪYrSӂ%ߑ!*!9@O.]Pewf p:PV@x?Ҍ=3p|7I)|Dd= Qמ - SK%̎] eV#%a]@ځʃ#F9XpH2p6˳Vkbъ詭$aiP0f< C6؆ΗV)41C _Nܣ;[RBRq%\[Q25b,۟DhtYJ|XNՃڠ )«!u{~yu%NYe?#'E7PClP_|sѡ" YLQrSH$NǼLmjޖHQ@'B)ڐVX:)_#oTXr.fHuA&qn"X뉽ZqHg#I+PW&pr<`D끏d >FGM1G48(XYNyc΁#%$<[9c8J  ٙDtvxB&HN!rI)~}I"ꢪuJc۫'{I@[j/\y>༴0w-HI[`>6ckyjKw(T@0A;.L)߲_Kq#I Ė(_^bUޒ,@`4ɮbk]ު(”oݻ~nȇ3RB(ʞVG܄`s:#k -!^J4UӃE^X`]aݎi+V} v,֐ۗ -L"uxPB6Z)s`3#O5fHp7T_i`D|.U7EȽ{B[,!l$zt8Wdtp~3RM¥&ISxF(`Hfޯ:{/$%ED5r6dPC'y@,ઙ#Q -uߜʲ0vLPq͐"KBUE-1KgTh:9Kȯ,a*f:@(ةQۯ8F$$*G[1~ LmX5i)SFSB W SG3N;ݚ50 ͯ [t(xZQe{^)-IUB X0^tӥt` a"$RQ5+J{ErO -q{ pSJSWRS]A:(ȃB])'5(ב$$]jmu>9B - -mTC#ZW Týc;AL}8 -DQi)uBXu{= f''ðB5/8])S;_ϕѣA6 -d^ -UJ(Od*M^AئbUg"4"U4a^@-V >^0#K4=QJ%g?Xy^ugZN`npVJX)6{K9!,d+?)6\4lo0ݐIJtcL nlHg - ]!\*vv"g285ł,"W@[*/;:W+C_2NSTsrhfJh).?4$íNUG_u0Vlv㿔5ӹ H\#wҽ T=Ff;eT:o.H~0O1E-EŽ8t~-5r9\)Pg@^d ^OGOQV?+O5g4?8Zf؝RY;먬svָO\ӻ]P{G!{VW` 6ssT/?ڿS2󽹣lrkjE#m|.38-hvX3h*.|Ж/ sk> =^@u*2D hAgKC'BRݨ5,Z#+:}"ltj;-l0Z8"DGAz\c 9Gj|\aM<3jL -sPȧs;@DnD6iqŸ,e1ݺ- x ,FNJ'˭fe% -_ƥ֐u=%n9QJԸXrD TedųVẖд< .x[+7Pb\YjKȹcHVm --ezQfy6q@pOÞMlxh%y5vڋ]:Є(ϟڣ H%r]E) &I|~JT_C) e-5n˒2kh𚄋糆}|q5A #M\}IN$qӇhrpZ o814(lʦV*OUaK켆U I'0N3Pغ.3BKX]8 -R Ph+yK%2 JF H8Hܳ7j{ -֥]QQ2:U ܔUB/~tt-aSLEPiB)nٯQ)竺3W:pVeUJh -B䪒j%1˔w?zs9Ŕ|d_$zЛߧ&q7]H3\Ȝ[, BȦ[d2]En?eT&c]/OTPA 3F;")j= E($wW #ˍB2S@hr6$;dpw#K#r(b#_{"ދS᥇roftpP 3tcvAI p+7*c/ -M֧3 M3LxX7iu"D (:|~xﵯE`7z 3}+z]Қ 8AVu|)X!;_·9:@oFJٜj{kvչ5q M&Tɝ#E"z$>RoD (q`2̄PPqSWV"^ڡ[[h\j*G!zNmC7˶ ݴt f?Qewl̩.Gܞqc/6ҳ(/MU6qYū*`6J)6L4YrC5PYGr#T2 P -X!VHtxU#h2FS R%3YpT.> Ң7HE#pP v܊Bb# u*XKt+犜넏iЃ64"Py*P4D󸋩Nvs]Hj%BVf$GC y030vӭ"|XMT5;Cȵ:"۴#zB&6 -X'z/G>H9Nf lG HM L: -U[jiVў"-oYFQSTH8=q({NQ]-@YY GO?ww8Q{8=>L$QݔcaBi U<~ޡQ0ڨggt #])P)mƒTTp)|xT]7"++ʓUT`N6A2zbptI q0üN5~m#-2PV8?,?S}t#.5Er1i6 %#z}SDC(8CsJ*4FHF 0=S)Vr;)?ܟǹMyc3k \b/B;J֔?5A{4=ʚOq -)0\r2 4^ -v0 !Gi#PJX%. *'Y3+ s&I3<`c~>zWr&>X8ew;dfFP 3u7*uqO5R"WϜ^cD -:=f1Or xNuܤwnG.eK'ƥXIA!̏)QxQ -Ȇ -q{.u$f,)xpfL`*qEy򉷖)U{פ+ ƺ(=-w6轇xgY҉pItGzό )}-!x 聟9ɯ9Z%ci:N3‹@ F7PdPÁPv,|MK;r4`5s`3U -uXymOJ1[_gSqsUcoz@uLǦb/A+ -*G} ȩ-M?o :7Xvd,HQ<#tHiN~Z 6zP&. -cM!*9(,ͨ.:'5"kK7# 0))g-|V%jb!L*"- _"#L=T&2c( @-yy ]So+xvDf3Ry=xb(\\XKi-0|=;pCB7LA*ЇH&Gn$ ~u#{y4P )C#0܆,up^U }^|C$4zh@`xoO5[-g1dl?̛#ҍ92%ф }W{OQej|<bEzPx?Fދk{Vb.{6;FKSػR,6 } ל5_1ٞOŃͫQ喩z<͢! u~ n|T_.O?>kαz<^T°~?}2Uw R*M.kc)D*LA'M##ޜqdTZ;~f>Dvnkޱ`?l@q)RP@1a١ a<8e-xԽ}s KPHᧂeQŁ. ݪ4RˁΤAƮvuـ0e^ Z =>k @}Ieߗ^z3!RAJz>>eָBhހVDé+T%AI '$Y!°w5)t2o`$Ha 5k1h]>Td ^sk>޽f‚s։X bl8g:3^d!I0oԀ-<`cK*ڑ޽rc}9'Y%4ny9*6a_C8fPNA8" `E"lJ aXr7; -o_pZ>I+%4 *TpQlr@!^,Jix Q$kdxի)7m<, -L8tR  8jiIg4dhGMH oP+Y.{ktek(_l|L>'2ai~~O4??_?ӯ~?_?_ɿ?oO~B- YyzZ7Hf6I -j`\Cp/ľ^.vԬ ktѹaXQYeÊ!\ij8Fa7wVl;:+96ZMpuDg_{v{#eLl^Z?"[e4+Ը6DoJ=;^!CB0$o8">Qѹ TW q#ּP '.A1s {!^0FhP꼁?thhGV)cV@6+K2Sh]a)&@r>҃Khl7)!t>P Pʜq{X]eРOJ\۽@;}ѧ#8#e3v/癰cPWT /Amh;DA^3|˜F?^)s%{l8P ^oZ1I-qo^ pDӫY̗r; ed,p$QxO$,ʀdb9|+Ox%|}lMNYkQ{sPNY -{G#o蕄:~3PI{CRlMbèuɽF -RV &#;4NQd&|>Tղ3C eI0˂`bp3*d[8^XlMٸܳut'N#D-€å h$i+H컁pWV2_|2+aɾ" ;vh=M+X}2qo.SYnfڡ{8حX۠^/p'VbZ-R^$)82 h QMą߻̦+[rD_7vJOnw-^\t tfsdx.h4-B qoi32g,)+ -ގs9'\Bv[Zt(to_3F;EǾ(\:IE?xd5ϵ61\-.L9Ď@jI+X!WPe=$|jCvw)vEdЬgpCt8x-A=*K!kYǗYWA]( ͼp_41LF3]+G7kNzłA-1+w72;^_o[m/H' 5n8C 5x0ji^h%} Ǻ KhNwQ),2ba B:aH0E. E!܉E M5C0{sp#'6w6yIvR 7"H1)ӘJ*jC2!TLToI$k s,pJUCR -`I6%)FCu[ JL„#qu|?Yya?#G0Ԥ`"?&6ccOok_vJdm?V@0~b}ZQ,sXn@l6?:?0G;7cZp"Ȅbv~E8Xf+$Kp(te]VtNMf.95܂ښvd`nng^ H^r pcKc76b 3CJ~s2#&Oh<+-*+ D {X$&cZ W? HzTX/EqWpK{OK4=q6сMI "]Bl8W ?٢-$"VJqM|I]a֑3sT?ir^ AEN!Ik~bEH+ -La(@I~cL._ B%uH1WȪk'R)\(ص,5~rUwaB'lL?L'<‰3@;x_6m"{KP){j ^dgSx$#H@G^ -~ \ -&x"vYL 0U7^ٌg -l\bl]98\~3 X1%=T>~9龷BSȕSnEkm|æ]H>/0zd{W%Y<—0zk{ -lJ0/wQn_3(*`@C J$AwBK$1wqnY m^z[a0{!`™}}@`Ef|5(2qբF[`U+]ݩȥ&!꺰myXcQZDeVkT2uJ{uf赧B~)KYS(Xp=FzPˍ3]VH7Wn'd.c9G:S* 9A_:`C$BAVU,$DZH6UI.2Y kǁcPdx5gDS[8nÔ*ˀfnIpd;`TZ 5ۭjgk3]&Ue5 N?`rU [WCzXgk#U>PGIy}xx@[b΢ yuna[/ѫnJOp)SZ{}-h! 9G:c$p(>UjXsKl*gF.D)OHSj8Ԟ.x'q& dn*03(A6J>A]8Njg1xPk^TÄ"nukc`0G##o -6=jѓ/`"|$#sӅz4ۏ]oFSX2,`a'&(GQF{]f86ĤgrN =FU3Kx ֿ;'w̤WSy-EW,%^6B~iYDʍ[W ݒ- γqV`{l}N&3@o܌oz/,'k %'yW2͈Jx޳x"jjhJwk7ЕB'ACg -PޅIzrX@~ R.8.<.x QHwfd9tׂ[a -E@-U`Cʆ?gNf6ŖzO;:ai$C Cϰ*TGxZg֕"c;'_&5jp\◷V2BO| (JN03V\`:Q RoY 2~Aȡt%JꩊZT#v 0,mQ!Km34&F)<A})"Gx'KfBwߐ,1%nRf(>竒hbw+w1E pQm" ++trrz ~ B%T\52,}3~`ӽh797AE:}kٔ &VDnA 8)!;L>d)ދ9JAf˩/VgZG -ʆ(_\Z"ro -{"qJCРѣ ]\pdOfb*b.Yao6>[UJkQTUmz49& J\)Oc9&kr(=hݑe;Y`$4grFgIv2vցl(0HZJ+<WQ?R&@ -*N a,+޵$+uT!/J -$-ЮGCoL#jg4{yqE8d\I?>fD; N -&2R*"3@)8 הgBZDeE`¢n@D>akx'$r4h*P/z(lx -Z7H ଐrw</s2nyd H=po~jI7PuQX`'r]dEiFÕ"$px$V}&ZW(Mk!}vQo`Pɢ^60η5ó(prr P#CazQҚF%kaL!BtJ+|aK -~1{'KgAi~JQ%W/Y *r;TY^&PQ#d\,l{cQ}bC'| ȝP^hD@>7\56*[EFO&ݵuY  -os2MJcA dDt(28M&܉a] F`f4tN9"$=8bj tIwt)`z Mv3y$H!ֈRDYQ-uFZ!F: и5lE>?4^,54`AW?9A. ܡпmG( YSAM܁v\Q_Rdf# -{[O*'/6G$Bq!46-Hn&}O҈peI)Ì(ґ!Y.f!n-f -?,d!ݑY=(s!`<H4jh1 A_(XdWkϣ,"oz;LTcYV/jӗfДOJV=њg $/Ώ;$ߦgEO|J;ɊbNv~ATC¸#ߖJ 8L@YS2Yl, ~U!ސAzJTab}"=Mdh=2a,gz\i -dElؕA:qGѡ&Pdp -m#[&?"TИҗ3 ~H:vNj;_xD+z*A_dtϴ^ȼ!)= -&Qm䱄.wJEWCcou-EgXx[T)ʒ'A-u vl!]hyʽ%#E&/laU"TN3!:~ Y}Wul=Rdۡ4Oe]MCԨ{ ;٭}m{lY 3F5<op$d5am"q\/4$)O0bi}9)^ܽ+^ck\s"o9j0ư֬Ιx[F=+cq*I-txg5C5~_H_"0(V7Q+m_py37L0#\Rw$J(aNiS@OL_J$bWYiМL7\Dc{-%5=(TDyTbH{MbޮV"4F Y3W%u۽ -?Lb6֕-RZv`RCT3guZ $吳" ]zlՙ3 b\6ӕ+Iz~ , ~L>Xngͪ` -Oݙg-d\ -]yPS~&эN`.?Ԙ|&+0jքQxxl _3[|xM -({q1*-XfH2% 1*ͼ`;AoDeh>¯_?#!p7~T*,_)zc!D},6G'70kY9uO !ҲD G>0Vk>#c}]S:4~E?t?;7rs_YnA=3`zQCeu7TnϷt,+ɷ > yS7:b#vq Kw9%DC&  !n9Ӏ̰ld,Dο@2QLS0h$kʏN&alG#{CP {vO`XNv @+*I:%8 *)tZ+R=x/L#2Sv=KDsf1|zYSAb.䫌CEÅ1WUk!CO+ ໋ 8n&h\"Nh!ȿ^rFU 5 _]$x%c2&Ig[Íp%?j5x&[q H~o V:ˤ :Ť@8UB3cUrP@Dxv:$Vȕ -uhlCzp(A#qhGW&HXu]蘂- !*i }F%D}71שDiP)Yj$2˼@,]oQؿb70 -FT,hvi9mW^D,NcB,LH`&t_fx!u/W݋2qM!p> gOlj]c*#liG5nP r u1m5dv軭7l!'Yn^MW:2s{AT̘%r `|177փV1=jM!2ȑX-ԝc*A^!μu%^!WgqDц#/ߠ\æa@ kԞnh5_"?:"B. 5C[u@:peRn30P߁W+nR:>:fQ\KTƁ{q+[LۡG$~-qY+,21ݎ,5!Cu觞42шĕB nd'VM&)@Mt ewg0 ?a/<2=^ wAޗ'n`FXP!4Hi1Ë6*gjz)fN{I0K*9 |;~%γ{tښ=R1?K`5̦ m?L>0%?P󑈡oUC`ZMsPaQUu!CjIkeT땷h)DMGCX.CCQ}QV]FE(-r -K#ϬQ+j$,.#x|a\MEG?.bd5G@8«{ H-ɻ2IMķ8Dfb #3 }PlNRi{[Tl5,CS^bսz -h̨!d2Jt+ipx#6_VWbE(aiJM, oG>;`ެKlo@rKf nP= upd̶6 GKly,̗=fd)8r2x: I9cBU@Az*?u}7VWGC5$32?^;EV@L%2^ - %Q j-f{ 0Zs+F7{OœRQɎoGg*6Zl`O L/NfL#H[do6+w~h5['S7@J&ElhDS0Tr -x~=ä;׏z\n}<`]G|Vb*[T_0>Ep#9[E׊}k1(c:sh",gpW1k|m -@m t('\ -Gg4)asZ%@%(VX:&Pc( &B"Gzxi8{i~ZJgۏ(||[P$e,=luB:IT$u̽PÕt?$/*::=ks #> &\֧]Fw~F&E;8L51l6`ך8BqpVS'9^#{E!mvAXB&b+݇-l5[߃HM8XiSHTjܨS3מNGED! /QXVbJi列#U׸p}SQE:$=X-)7r[ 17mxc0~bd-4Xa׳cfg7>5ԓLДQ]HրB>\ BWclRT\Op@9P._5ð%͎ -џ -B%P49FR?OmG u4Ȓht6jKu4(t\!nkB'nR[7ݲ$% ÕCX*w„EU[Faj8>=|g-YFTA]{֠UzI]]#%U^(rpk#fˌ*-BK#f@V/߂)ᰂ}d͕ OB^xhAE1 W5 +Yұ85YTdt#GpdW%^iO^cg^NW[ܹYyMe -+b##ܒ$0[1hЕj[MA.Ae,!( ;@u@)e )E0UuHa6n\[޼}h_0Yi΄V݆`==A'@@Lq ټ6>MAz!~ m˔u# -pj!]{Ը݀Vsaq۪<*#*mzk>:i8 w.Z8StrڅH %CDG7͡HK &0Y!D-wf#pG -,];QEy%O¢(T= qTl=f>j`w"^F}1BqA";`4 -VȟF+ aCRy o>3NHsS ˯d|puz/=Hx`8ܖl2!=.z ߙ8SVo|)}z/ ARQ&58bGihۺu2E* >e'DxCU@\a5 @toAML~zv( Y1ʧR6(8μCny%]/GC8z<7CYؗt2l)GءgC9 ^^42;|)^ -`I{5zO#s9:Kd -ܐoYX&R]3d&ZbG -ί -E"P@]Hz#x_=%)3@b$j{U尐wVJ{18# |(YDqцkb#_ /$+nݪ.L]LJaS -\VX¸EP2uJ!; <"njppyyus;IzIjan +\fospgN -$\~/<P;K7sng%(.kqtmZv4C랤C5:wIɛ胻puw!|#@;޿ -gg0v`;>ҫO\[3e'b@VGdE'Pl&"Wl:E<'N -uRd8d}8=ОX;쐳 {7<f.9نnC@.&Kkrk>N̕3"l^'̙gXJ/7 < c9@4'ֺ43yVyhƱ5DgX2,t§!S6b{=گ3$,~r3/@DZ @$nXK/P6x{Kn&Յ%Į[+hԉ\w;q NA750߄+11r{)sTӌ8lWQGp}hggsN}]BƹVm.BgUbZ\=ݲHPyYIRABi<MЯmOh'* %YE:D9iKt I=Bkr~ACdvD󸉓\3_@F)oSBt6F׏',C#i؋C}EERt\hCa0%kQ`e :p9$E?<@捜+w7s@x̸\$wZȜ%><~ZC5>cDmVF\Fv"<V+V[ȌVG!ix ׷(OIbpE2!ܟ'5eʺ*CX\qO$aኯ;VX seC~RQr8Q9^9V)kqsCdJ?〈!{>3B]fGZM=lT Q ~{PDdgXᮖPbfOF|K n -xq} OL-gG߽g&1PHR/gBͨ[@ST_G?U@#s[~6C8arxd)aa] d|mW?0ktYB SJtp՚o3hy@;y#B#&9rh'C룁K*u>a!wl FaYXhkV,0{[PGqt"ok`b+w -I,kaDV'̒H71 = b>VxLym!/6Jɭ &+*+3qu =T"`|ԟ EL8S_0ߚ7?I~o___?ׯo_~~W$Wy.oߎ,4:L_PI0P#ke=I }G:)oǫO/Mcdu\L{{(!XW$d*:axlyPf\UZ=^ȵ7ǽIm6ϗQJC-JH@q-z&}(>qtkazKHb{y$C*[ 37_C Ab2!z) {2D7n5`E&H#}q R[lC$أJ3G]7nȅMd3.Q.G;w2ͦb`PH1as囖~`HD^="JXͦk.%=AkeZ],kw/K j ?g1sBO+6 Wp 17{0c"{,@:jc!}35)v\/Q=tA6P%ͰbI>?] -ekiS -2Axwk p"_P<+zn90]h@4#sUYb zSѡ5I[G -Sa/\JTf`Zx>Gj*@Nl}=30^nϥ3I{ u0,(oPAP7pEx>:hɆ.⻪M7Daš-A;뉈= HC[=j_;ЌEOt=v ':Ea:pq uBܿc7X - - -m  -#Ų#<`ޒ#3dž⪿vh1[n$;v7]BպF@z/kY-*M+FNy(M1We~<{٥[%Wt0cM].qGBV4jm40iZE"*(Baq_bT=2XpϏպaIFssQAN! `>P=Oq;SŘyqQ Lخ]2PjGFgnj P -.,aUʤ$grɫc3DuL}JrĹL=g(=XfgAXRB#UCkJQkq|e6t#X"{9QJT?uFmɯCkp q pɐd^rz$qdQG"ȜQKn+|Czll=j?m2;Bkѱ`q"POy(£ aCr]S"6`r+"6#māQ JlCnW%}R`Ͷ/)vI -\+"hY$Gʀڑ1xh8@c, -&z,wk^_!n8;li1^ITuPrZJsA4~o >ޓ#lj-ZBbC(ZMhsG7j*њ* -:ݦxHTLK~ M -a`C -dޑeeKv щuaX:ykN-p9ba I i^Jo?1vН)ѣ@[Xãe^("&*xztS ='t^Q%|!yS~ᜈ MDl$-SJ]c 0ųrw0 Kt&N/&8 V1(.fZF\js%9Q4ѭ}$˽\~v=$.ܑ=h+;:4{EwOؙDoBk|̶k?nZ}Rݰ`ڇsCpZkEAVM~ցZJ"{qnZjqJ3pq"~"4nZbg fJ7G?ɤq#-v-~j֏RMlPHAM9עsI9Nѱ0юA)A|8²\{<޶]L-=YG{%G@KF[t⦦ $=YՖe$z}{U٭_R6|jcU ۷nHcզ& v ˟;0k}.RӍ8ck07P$GScԶ!]{*zׁc(līHؕI%Sfd{qކF3Zۋ2sK~Lu=|Z"boMުT[C>1=>g` pix1 ת8?$\o5 baS䁩y-(,ҥhrCL nx&I 2m)nURu|SD:ayj{ כ32nd }1J1rNa ۄ>~ lgA=_FI$%~u!mvȀ - n>?:[[gA^=2  f}08Y{]kUNS3nM`hpR J4 "w1#sg-(D̵]t:O ʟ? Auu-P!TR4aEh"`cS5>UOÎm\"hAܞ5l~{"z"lq(biCCxv;je%3ft]7v]#4XdԷ->E Ai@2&8syqJ}Dzƿ "1Euqi"x0FƒJytuK/1֍, - m,EZsDC._b$=T^bj͖EE+.#^G$g(Q<3sf.OAήCLS +ϴuGx+%%݁*e!H(Js:}„AbB{" -;"^83]g ulW=Q-~!YH0Fu܁<OaGu~'͜1]:;؊N)aqkRӬ" k> u4OawfA[G7+0;L;5AT!7ʝ3a̙ Fl}0IA5Kw}sȋe7v$Ը6/zZ4ۍ|a5͛CSp1εYgB UbEl'ca Co¾#:8[,"U6-@V3¥M˩"^ve+X#Xo/<'bYd`TT|8#1ú|\-b3 HH%+*=3Ӏ څi@Xa;Q%6^>zWl`;0uye醐ѯJDɦ=VZΣK Z@trÇ%_|!A. @3f2 􏀯-@=z)5iuUۈEc*rwnso|۩@Z#/.Fx3<\fY-3e;ЩKReG@tA ,-bF\?>Bu8V.b_ õ]\!V G3h*< -0@;!ޯ -lRX`)'6Dp ̤דL$hgFgw]H1n0Mf -p]C a\zy[ȗ"WdO`|맇şs SG :63[SxN[l 6N_k=}lhUw)}xWG{K00Ȧ9gu%YgX^bY}f5<,$FI%|!AⱹxE\< n:i$0pB64}6 @|R/!nX[Vc(3/0>]uT/PoVa'j?D`}xm4cUȍm0vHKψ}" i.?LY -*ʾW)x:^|86N7 ®ۃ2&ThGAehsтpZ(l_ZV CZ4)'];&Ao ;V+#tmf@Do -a$>";ԊKn7)W #`k,zܒvۂYL=tF~EDCr\EkNDKʈ|zbv9PzCpZV*PgJ~Nޠ XZ&a0i?N8 -%A|i%cٿ4?4ەd,d_ OH6c(/Pqڻ3"!w|v!n Y{& -C\0fAW_2A4KzǕ -6;XBl\}+KْE`Mh< ҥ_NnChi!@ |?`0qwjDBfMS>/zQv'imQ[آlͣ?fnV"xc`6 6 zhߣǸ?R@ -{^e L:t7%"'-l3Q6icU1 *Ӥ4ޗ8 -dU~HfAq,]\>Xl/i|ʜ_E"lU{#Dױ#3s7:nk}/OYs"VD54U Pp׫5 -1< ]ym#} w -:uq0~(cf%L7g6x٩ă.rE:qYZOx =O|U$/fP^m|g_ Uk+3RI_xXû΢{H| -]lld?@zLW!dW΃c"`A'.؄+ߖ3Qu!oTaəM`bv9aYɊt Ke# & M+'sM,wȉ BL^6~;۪<EˁBè_/7N=ӲHe֓?#;\MǩMCCYumNљFwfw.c_Pyϧmuq;\!H%] HnƉ U5d7c[Uik,"X2c4MG04XDo! L*«Q4牢;j~;C}P%bL?^M|8Kd.{赿⁂jJI8A[O5g+1)Np ;Вѱ_|&m=#Ix.O`Rp܂ -0pB8cpU͝׉gJ -gLыLqD-*RߙAmwLʭ\Q_NşY[ޣ7b*S!r=54{H*QH*lB"sZf#2"BiF?m4Mj>NF'R%b)Lך9d5{N71{ّuTdhB!Kͩtx HqoaSdOa7#N?-)Vp@"t^-2oz뎌1$5^HbVx.9l.0eU~'clvV7bcGa&sk !?RA+'.Gak RSBq :PbO@bN&\͋>j#O"=m;5,zٮ-.I {jkJk 7!J?k)o^όHE !P_|lIM4YQ=u$/f.,~OicVbjy 0X&*{ws( -\w[TSB. 5 AX@zVe`I{G@> U2 ~\rzDHrtO1w -r*I*C `mƙbEbBjJ 7ӊ+zo12J,{u8r`sǙB&Ħf"xYdp#2; A q\ 51e=9S%n@Ne"U}U" PIi77X$"qI:Nҿ5:J4ɜ{K9^0G5#rLunK_'Y; t r뿟MYrس]ռ\P2~1Uf3,[\6۬xE ©5ؙ`e\w ~KM*MҜ-~_Y7e JT!e<%? 0ah迿._JB i y ϒs 'ȁq#˿_&V}M>7Zswձq"ֶ(f_)@{J:W2 -︁CZhdž;4;S}D  -)1Ʉ;MFV_ښ+ <|", Qx숙@!,+NOyEz:Ue7GWe" Rvzܛ|^(޶ff})яgidrWuGfRNp7Ph yf(:ͩԬ7~s-Oj]vՏUi¸>LʤEIAfH:"yB)q3:v}e"DlA6"궇aM>ÿڝW. j*T="4VD-)ݡ0) -omv8$v44a&A=cBBb$ GHW@hL\PS'^g"_[8CAT7o" H97Mv]к]pVYǙ-X]H 80&AqVx==!"C @ X!u+epx9B EAB+0ZZaSF6uݍӾQE`j>nzڙ/^ eR%yyo2_V3MpˆhimV5( pJnW%i?4uCB'Lwy%mPrYc@qJ1jD=~vQ@%|"i˾C /@  Ȋ3ia䎶# r[.6RgaX;V&,ʮ&3XVі~Fv$A2M8HX^DB/7IwXvğ:G)O7ѕ܋ccp] -djgE1pMh}EGo|[i%>2 Ag>F<<_l0I̍I9Oacl( ?ƩF~O -és_3}Obq7\" X)UfXd!0a)@弨fvo+ m¿NZEXR$0POLEжg0(m -cbh1;U.uW ۤ#\_q as @zB8l"yP#$7>]iR5V|Jkv:PE)!mi" i +-`|^?QBPZ(gF,"lk"/nqD(q/Թ:VPh9ӑo{>by6̀$%Ý*t\ݫ8&|ċ-k[N7([)4ceV -c ؟վ6Lp5%g p:bȦעRWԠQةO7 _w{wHФ>gQ`"bYQ -)ʕd?@n߬Bi@hLz(V*IB{ `˾5U8xoB[GDHKj!CIuT0#[_G#]ˌVӒN?8?V|Mdch}?g6EwSt[twӃe=d ZN-AJ"?G09v фp'*1]e -M<e4'ڕAd{}vkCN-=UEj  -]*vZh Vd^צU8{XU;u߉#($PFKGs`0 -&67}t%vj&PLJiQdB̻XIq4n dCHˉS(# Ji?*Ї4s(n<붔鶲YS"QfwtćR'?'0@g"IkEꎐIe"hpqܿ DS=#[0a+Y)MN2R'̷e:nSҡW#x ZnX3K mևjzPV EѦ"coD6 jK]՚wDd I7Zj7;"JJ +<#0h,1ŌøW;S4_6jξ5LI+$3XYd;U$ Wl2za ̂M2Nh .c-t˺stmaזL1xTqˮf,/whicMclW"X: " 댩l݈6ؓAϦazH1<mcwٶ{`0e蝶\x)dhxվx#O7~Ŗ*}&=4;=gb+vQ=|hOh#g!N*ݟEzxABX 3p\^~\kO׊R,ЏHIWX1V#C2%xh -ˈ>Y8bsTFŽxm UР|e+@=Dd~\o:t:&<ˍetXSt{B -WgfwD:1CP1BfL=310ܬo%6_igRPTU|Ȝ&;Ú?s=>g܋ntS̈ze7]#9"PRqU(1LZWF@ŷW+닽ZWpV0ݹ+Bkl+8^zU71aޞ3D-G^PL\b-*%ճ[l.P2ځ 8.V\t#"bM]xW 0rZ3y(Kb,8e$PX)lhDd\_SXl2HJSՅ3@:Tc_3!<#JXSš,M~2,'5h*$ ̓xuN(۪KƀάlUAa ݔuP r[9+hN/9o;?aHwY;uZo~a@ gf{Ć.4\:yB - qh'/&W@G8f(#3ڼ!pD^FB˽ViB2'g0JΛ?Ŝh6/> zƎaV%IR" -oŤTکi XxENfDR{"*;COCYZ;9^%Bf=v6 -c\#ρJl%!> uG=_~'%pl˿߉ HFS9>֍:-&%#zx}FI5t>2 6Mw cŢd6+X5T;xV f.uǢq.6QlCbpؑDBvz &jL( Nqxhxcd&]Xשar[YW0o駊S7p>&\t p}z鲭3h40~`MNMxKE+L’|zO&{<q \w*%;w,+pV-(2~N5k:0ąMwA* - -Ssb!  d -3iEiT -l0*'y̬̆D "ND a&u8s1' BL,W ,L:=_F:$zWd:%&\;8&V>1 kqꊽd=|~ rp$̀QȞ@@ XOrrBx- -A SI\Axh_5>9 -3U YMuPO)z kŧ( `<\8-q J L)p+A;(;(E+ :ЙY* -B1–ʐ3ALp'83J=bO4@n}%jgmG /hU}u>x&ize*ga% "}Ab;->4D~_+>Egq/y-ߐ{x( [Y=m!ึ _fFJd:7  -r]HEqf - fn,'5pn@=Ga:sE=((1R0<+z{IF\_ -ml)ߊ|} Vq'wsݚ9a ؉Po$$!{OޘY%79M~!Ĕ6N3c@TInv{L.y`«q _?[2WEzOR'R$D6MTbF^T FJabj֯Pm{PV./$ʥW{ <=j8푭eObH^rh߀ A,F ܷjwtWl]tϞ~Q9ueJ3&v,8~n{ܤy0%iS qr_S.t!&3_ˁuO]?"6vX'=o0ⓠv?lɯb]EK٧*c}1/GZ^?7SⳈbt 4A %~a<莓<37py>s\K^nUqj@8+wdB'7S jw$aO =-w>u#~7UBxl6`*ڏ.Vam&`= `|uhr/HWuD^ht"//WHYWч8Ss>A42&Z!|U/j9f&@ >(EWSЭѭvrYxpdGw-\"[S0&nQG{R|`P^ᔼWke>DQlmnϙBRאZ`F 'gR>.!mKj},΢y^-ݙAzM^_σM´rE@eqS(OԡC4שн"o2FXuF(!=7y{KcA4!tZIc=g?ug'|@+izϧE. ޗ.U**b8石m ];SP: 帞ybt?.Vϼcv&7~h9G"6oh/pCdW&\9)%$8 -endstream endobj 153 0 obj <>stream -ͨ^uS&'D"NiYH1zhIxΟoY<4#.J@TZ(a19s|38(#z05+~ˌ\]MV3úΕ太4NҒ OaLҧt)3ϋ3շ|tPr^Zu++HyN*@q|0,yMXsߡ0 - %B :FAVD@<4%*Urr]EK+fHa7o>#mq5kE #WAKϯĊ|L3>"jbx^0G!Rk ZKg$/3M ,wM)E5>?#6? ?~dėׇmJ՞:,PnW?m0e5]Gk\7%ϴ /w>Y<}N{ -Vb$RsWƖUL*z"ڜx*_ê.m], [GF\luG"#"*?:ijp[H !]w=Чp95Noz>#y t uB^Kvڟ%qdi[ tm¯-w~_HMv b=/TPSp\~?9qojZ$ ~0E4,5N t~޹;+8]OCUH>O)GGuH}GZoCi+n9Gfzj'-8 < ##v[Y$pQ bnS9Э:^5BxW:.ħ?TŃCn$ - ~=(dw_ԲR.yWUJ -GhSڧ?,@AyDfjcgЈo-B %+7/wPWo@X E5Wuc79"4:Ivuz㊋m5 -5Dd밁rh6h 9 M9Gƙ뮆\r"UDq ɰc-_Np=p@F5&`ո%2$ܨ0ˠņ] R4v7ءD~:JZ|IFG *BT2pLlNÇ5in~GUZ<¨|аS"~[ӟZuz!;h POvCŠ9ձๆsPI-g P8"$"W|e\u35)Ma6 N%J\AV?/*P׍Dk*LڈծG9`ʙ>,Μ^Rg~c;&O8bM<^\h~҈M};'Q%y$žkcHul+J?xc0 "iXC0z3@4C%7&4IT>%հV -!)E{~p᤯{v*|Ä }ns/Z D^!Ԋy6i -F]U b~8PZPA -Ұ!<]6;vDyoxTئɘeB0WC -: ׭jYޞc ?.ÄCO99` uqWm F.XT!{qr (<.MHvwz -wKx+Qg˪02&Q>E)+S-llvH{\nrnW ^#pB}FS#@&L2UEP컔͓EXXc˯G <= -1J\yFowjπAE1&:PK8LY -j]؅x: - ¬ l,jVl!8Ƃr//UD3C1MΞC PHaT{wW{X)1k(yë*ޖ}F櫪eZ5]JD@ڍ J_$v3@`_SDGE4pzZ 0 FjԶ{ }ݩz!~{eka$U]|)Q TE\/]h]"^T0"?d|O*K`a1:%?]El՝]mA4՟Dp[`:5~];jһT:%O<Uo -*/H yFw:_=o=Ƥ XZrpK]l&g<}ԒQWa/Q͜U@sDYWR="ĖM /1VsS6`nPX ̴~]zI`<}2D20J#~LÙU@8<8HE.7!L|Oѩ;0eȃ5BmqI3e-:R~Vvf~3V;5XOP{ĮbJTWAZ3^~cs@}(k3jtZD#:9o޼v#@I`'mjY%=uݏOӲ\JN}1M E\"WJ"q*ն -8^aSo`_C젾6nz]Kmw}q#?7B1UI\nx92 5gv`I=?( Wݏu2flBTgUe}, (C.@ձT %`} .?" -nnRÁC9[[GtH< 2ih|#b]x 8;i~N O"ga=< XMl2v0d9sdKjvdFljQ9fX<];.ܰ -WF9`Mݐ/{Pn+%Бi7Ui㺨1|WWZ@*;V=m>WF.Z^u|:=^4@.Bfl$}W >4RkլNVzmZ^~9 -Ļ6{@(D\<"z̯'+Ryi݅t~]HZa<`8N09.8)[ Z"r~IIPGk?2 T]#"o9L!܋]7,/[?QJY5 G\ Pք`/=ӥ+PT՛@(cxDat߇'m/;csDjQ,=[Jߎpo2}./R=ʏL2j̣tsjV7mR Zˠ|32Ju6v:g)g̝6_ќx@1<ctT6S:~Vh%yƊ$%D|XjMwx#LUwkò{&E+aR^BaAɄoz""Ny#aJ[JBբaOUdjڙ# -e>Xg"\~[Q]=Pϒ=ݑq -.>ߣ!m$;cP'C;Y?c%W\CS>rgrx]zK1bf*IQ0t>}on+Fw)uY$hψMS5:~8:2LUeaPG -9bϯp#Zi#$ /7#W%\-vfl}iciX]mo7ߨ2(OamH kca!fu*6,ILebc}}+ 3&vtЂ}'KJ!q_VUOnЛO1@JZG\S"$~4Iiv!ZhD{U"]k_́4> 0A~ x~^ێl[s'έ 1PI<Krhae -0M<m_vshZ"eB̟"{$ s;'̊#{o;ە;Oo;$^'BSE a4>gXLlDhR9Q{,.g(-V!A/f=`<uJjӘ] F1CchWIf<n*lͲgķ\im [_ީ*8ΪwSv (jTqB$D۲YJ"|%NaADmhL&d62;3(-Y , w -r^S5}D,b%/> SŪ}aãrjYYׇ$0.k:S/$ lzK|uRTS{jʎwĽAUJ-X4nڝy;WDhs۴%HD -2Vܧ 5ӰZ}- -q`ÿ7n3Xrţxl|R)F.GU,9iNճ}LD^xd6I]WP2`Lk?4+=d$?xz1XTOEVFb@'tL%^aZ|"`#aˮs3X|A'E> <1X2NZ%E3Ѓ-6%V'\\Ջ8VZ 2tq-'}[ӢC*ĊT3]I.8?g - -(a~af-Z`x T̘A~$/bZ9<3DpLDZˀֺA'ԍ$W %aq&XB #S𰅅莢S^o`M?iSGp@qJV)لfmsyp<ʤy?Uhm;gqǙ4ٺC#PuU& 뇫/pG :k׶_>|g:5 Kn-6d%J @?FrEno=Ug?~nz P|^ f麽unI}mBoܩM"<|N>6ΟPY`X >pg^Ĺl1*ۦP#YO -˕&gKTn!u0ws%k*.?֭_u+_=meތYT8ФUxq%!bV#GeUE1L m { -U|O>4G f0[s[E**w?0{Ǟ=*c># )(VB!;DAi`(4eol0)c tPxpygIcò +quIvQ`S)/ j;=BZQ7ĆiG95a&Y89_sܦש:qTeu= -D Gyr%`TnxE7!*Ǽ^T7WӼwHs[ mkmX@CD(-7}ጭ¢+ҫ mDWz`}FW:5ܾGIgo)*TT/蘘ȣ?K%h_t/cUMA'FJ8n y|-*f?썄!xJ)>C6C./w~ vM:!LXdKdN}9 2lVkͽvc,MF9x[=R@ߛmX#O'`cɩ46=.]%g; -KZiz=^@z>T&x ɵ9wpo:WtŌXѫk-|:qr@#TiDt( fJԂM}i"[@wp}OeL*5&uJO?\Xї]5j\Oa5Adz?6jnq}F OɉI`}wn}woN$t "/4BFqD^KD5'ɾ:SD؎ KBRX4NQ/ÚQZ[«C?[rw|7wn9͌+v]pL``cHiOkg -_"Vf|8N ס/*`$Lj̽F3d@}nj8Nh3N9P?/J6bǸ?FK4#kp@KRFꙟlO-&ܲzyq%K@r"+dr}î~!/NMsFD:esZ]$8^ ,?D|ߧw{j)g}NP, Ci2r?h !P rdBnJ 8cֆSG,\{'故*:8/z3CsS1b&??3ސA^1 n0$(w7HCC}{38(1 -C1^s(?DaS5]NA"Wx"{5no_k$4YUQMa -u<>*Dzsr{`/a -~$˙7mF=8QwTO8##Hvd?!;TTD9=TtĕuIܦ\Ғf'n5>woz*_GnBֺsY?SEo+d:yV#q=ApB=pM +=JP!Jff&X.6$AIK D8p7\ hr*+"ztW@TA}1^aE:-ǁW&QQV:h$KArM#@Bd).9 Evv3k} txۤYJXsme Vc*Aλ q*\nV;A"4?{{_ q;u=&0EPiHWa^ C">h\*w,It~xuMa&܋#"tFyJ^QցqZhڇj)0+4¯Y1?bwTڵ -́iZQeTXֱ9sVЋ?uEuA =Qb/.;|G!xn J&i?8U`-0c; -!+-> -8l ͊cN,/ |Hzٝ1SY(_+4.r,^~ڍU _08u˯4R\Ot씁.{3Z;#@z"TDYACmҸ`=ʐ$<M=XېLl9*"3{iSzSgl =H]~kNu=?/[>C3&FWP!E!-RQ-zQW,2j׏YKz~]_g>jxDR ͑ϭ6ˋB;lskTԧ̎̏R=DO/RD 6s0JZ ".1EƊi -NԷzGLJĥ=;WTЕѐ@F V tSoQ!=ldulߓ?_QaK3~vNT8xN9'si{~}RQ+J -5"j@= oTi=nrL #wȁ-R b[ru9/#JC|Qv,qkU'V3fI$s -0JVx5ƈ {<D?mOd뉼7y[C1=^ǫۉ -;.\Xxb́ =aQ1n&wLx]hJ3*%d#Ha.nȺW v~h9F1)Zf`"K 1F[5Wi_ V@;A?QgrVas{EO'6;7@}u4d"}!!zt($} -=_pJ\FZv&+3d3sY\6d{C[)@IM2j%vU;!?G>QHBGϜ}+u0L*/OEз?<>iԆŸUIJJg8Jg'Dn17hwZ_TVk!S4 dZWbZya+3 3d_r@gT;uy7~.)c#nԈq`i'΂sn 6tjx*8 ܕ 毷x*צ=|3 !E ^=2PQZbq3잆 6/%o="m[5v!ˎ{T(I)=D4*DKS{&1}N,`hiӷ̝AxDo':` gq?eN#xsIzKUH|eGUM= Cl_Y6b],>*^BnW\g< T03w;(plɮҺEPfpҸ{iy`"}d-H*= -Vvԡn74fI/':.D>t"3^#qΌՃUq:Ҍ1g~v[ b*}i_?:_ "Sb,ѨR6yB;_vW^|(X+Јۉf-[eYlǻʔ/(%9`dɝARχh} -pFpSDl F l'n>_έ,̭}[p`߇ BkO0J5EI #² Om'j JF(?_'OС5;lp\8Bpz^S&I)ғ D߭|Q8 LD#+)E:v3ŸORmDB9:xo)cA -v0w153+*bQ v?k/ʍ4r3$SN}\i5֢\4JR(oNgJV{W?`:`)خƈ-[aR#f{]Ns8̽JW%My>,05AH=m-jJv-CʈTHuEXi'ZZ'7:oGn 6gSc#RJ1E"-U$SLmmMNQJO*GF%<(%ꊋ.O23f# d co8C9¢- IА=C.cN>gJµE&%ۑ<ꦐ Eu n1~p&=DbCFJeۭ I*fBO$\WUswG4œ.>4A.Ggl);fҘU\9D> -U(7Ê "v'GamxfV%_gzCU_y{f.\}_T 0V+cSa|Q;Azjňݷėq]nqn`4[Gˁ] TBXW "-I|9{lz(SL8(1>'$S! :IS2ov8aIO-W@K~2\JrYu0`f3AP#dwmUGy;kA<@Un7=Uo$7X%LWiٗѧ.Np/UıA+&!B>́7 8G(~BC3 -IVSPR -Fl(wS,T5!JYTT=S#-F\Mޭs@sMhR0Y{i<̡u~g֡0 2l'I,)o^WdUN""򙊮ʌ?>~$R7QgR:@%.*J[͇Υ>t 4S - Þ঒;er(.`WY ò֢[<`jBR\k8#)F:PV7`&~p@){\\Ng,R$f/KGμ#0]7܂b$=$It`i #, X;wKұ+R]+:8.pzzRJKh\ (Ü\px %ad?xxE^)͑eHk v ;ZnEgV<S{bUL G3H4\bYD[k2,BL}1 ?E0I:Xh0mPWvhoD7Iυ7`e7*YP=@o|'󮏖zT7Oo-E)R_8d&0Ap祽$y7O -HfVr!wO+S٢kNc3LɥRSĶnǢgG]ځ EpKk-54Ҭ? ނ1^s(<J HT0M-hlȂ3 _?)v2BmCqx~g1Kg;W=_{\L UAY-4K.Co0=B%,KszRb_Z;9FZ8aZq .wA:힣-/틌iU tcOWD28QE~ k"@:joo8pt2;`p{1sG!_d:gp{#ݘ9@Śk --"R(Co1g:)f6*+"RG@F>vX8h,JޓNOTu'B.&=Q\s8G43T{]ʆ me8pA{efwD]~ Dh WleF_Ga<^ۛ]= Os*gG`hoDBy,LԀ+`;-ZNl%d)K htCQ=*(WF<ۏU\؞<]XȠHb=1(>]`fLDѓ;ta B47أ]<_ - ^gΣ!2q|gzc6^cMvudľ&^9z.IRճ=z"G*O?_cOYS$ b`WJEQz~agl &z @)Ζ~.h1%&`P'DtW ="u4t -WwZ#"__r~δ5_>}Iorى'-dDS0 -/xr%\6)u k7AMEb^ &|慽iBatqH ~#ӊnMo0*:<@PH$~~ľ=b0^[Q4B Ǧ=4~ks+LW&*|43q CɀRyG] F jpp'=^QB IÊ}(6]*d2DF>B_L~)E= /2>͊j peqM!l@G^Bc-a$3=I83OpP߁|݂@v27e+َ2^AqII`jW 8rnX+_zqkˠ6z &#мK- =뮏v Dr uSB7[SZO [oZ&02ݴ&gP&?>S6(Qy^R5{ܥrnI/(%awbK>4ܖpK]tR} 2x~9_պ'l qʋ(s:HJD+zɳ̏1edd Vz4co5vZ, څ/8?}1-j -̽ԳxINݷZhԙϖ,)T$)@(eࣖ0E~ė+\GPU6TA" %55]= ZETui;YCVZPn!-Ԭi$W!\FxX,AtUPڷψxHyS# &a3K]}HvG~߳hB:A;LFoJQ⢙v"n@-Pe3/| 'Rk-k"w{@3xǁZXƻMd{; -5{TiҎgF-tx+(ߊbܖKMV$~~ȃ -,roCeܷZbq_"+"`ZЍ#}˗X]o\%W/3 )c< -nBh&j?Gu991Ɩ?̠8aZnz -A|IO_5O_no=]n@;c&E{ʐNkBP`+afح5/_ȑ~{!vRlG<*Ren[uk;/0c seEm[)nV e.:V |l}{GY0s)DvMDC>VZO O"/W@/Q;?@[aJ]lϠџ5ցq,9Vt4A6<;uUfH<],~YdI9Mrs{GN!8&bKe> -ÔgBF0 Ci|X|4b>qYR0R +b~"8hr4xWuTjiq.P~,ll{Jl28t~@+2Qְyf9'*)!.j7Sֶ+dkOϲLCP8c!Rrt2mʱnv( ``ٹ`G85x0X~ /fvAi4LZK>o'b붕{/GgKRwl1FAH5U4t"*>]^ԃt]&Ruې0:]p=4kx =:[EMg q~ ]HLwhNz"5!Op~F\P%p.'9%^W((]<&t-bסGGrLi8xo 7y )S֍4sңk$?й$вq#vPZ*D ,,\a>4'l& -$P*K. -=PX#gN:G ,-zaJNG44.3p{D\ Z]@ -ycIXϷi?yP9Vl=۠JM?6Y=E 4D"ޡޗU <ܮ+t}XATgؾpg0{w'Q{ -|?] -}h\ajZ*$D)DĴkY M@엫%#u?yḵ,Tρ`oƻحtPqP Ô)0kh#` -Oj1ƉD$J3653r,يNu^KcŲ=Q Ҡ>%{R fPrgӓY_~=O[p89ϵnZ1ē^Rlz2#_5L7)VI9;qVw9z4:? RHSB~s@yp ۩KS2/e̢^op>m5 B"NovW>_GbЬqcwg$+UOf{L '| cﰪsdkmX^'bMVDTNI^e'գ,C -m맣[]FXO6XI3B:ǽ]-b0=Uد\ ̡P I\\U|=i|&;ܯxwHN{8 Cߣ;޶Ub:`0찮5+)/ S{ԯэ͇IH*Y,6S+xF:W3ld]rS z&R׉y>\V)5 -lo<=&'5G_2+7 fr 5qa]"X%HAjgiN:.  ->Sԛ3:+N4Q.F8Q?r,S 98(}Yy^%Y)D><9Db3Ôf:x/!.M9/uRSM΄S~ 8s%.vr\jʵǥ(s)!م\?7cE QRU+~!y<1僘Dt,execG@ "o qw^~;\k7o}F3~^IBwvpKX;!$AB7u(뀬аk&4OP| #W}O/~ߊQ݄]HL'f;]+y-NCgϔQ+X="GF|3&QtMROD?sb6 |zne0=H@D:40&ڀ*y"3i|=pWqX!S3o"1{=?7_3yLL^sGRzFG(K -"j, KgjWNlU?HܚqSS EI[ -B{-g#)a3DX$@S By!l߮t+s؇"=?]pb\%>#QkF%U+/q)}3Z5E~FrT微<KȖ/U~RR.7)&B\e"i (Eyܺ&5fb 3\9ט~PccaRl]d`Ur!b <>mLIVBiF˫K ?c -uD(4|/'k-({0scjC)sZ,,GIr0ԣP֥ѓS8K-z@(JA$ PQ9V~# C;[! -#ȝNQ=1B#A2y`/QnU 7 -KJ1NEy}s"䲻ɖcLW_['~ J:'f<"QxKDܫXػ.{$feR)hɘi/B&b -y2G~_O>kL;/^4???_??~ǯ^KVݚi:ZO}L&V*'8+o⭪:>H$0)vP3`z+|K H[h~X2{xv&P4^$UN:o' CtK阿O{,A}) -x!=sRYjvNóYw }^oeojTyόh=32pg}IV3GI)ݼ_{6+?3vusRb"Gng R>88\ёDY)*7+Y 69@|/^H}(zkL -Lb[Ul>X<&tB7GEaWZ7Y*.gAƂO>MVWWWt{bbtU 3;#R E'yzX9 H9zzlCZXRfDjZMm޿9AluZFAk|_GapELjn ~\d9԰*~H mK ވ5/̅ DgR2 -x|x|,ڶ_#{K1IFַv%5Q"?eU];3KB1.UfttXK7%{2͟NN}uMhN5mWU5+H6fR<4Ș -nL`wq70/(C 5kjWOh̭g@fȭߴ5m`v(۴R9cX=W7VP{R&Hht_ku{呓UZ#ayX=-"+#upiԨ-n^CJ3"u Aӝ94W%ۢgx%ZFXaL& q)<D dCshDt>)ܗcY_ "C_vWc/F hV*鄷Ҟ5,˘* jsjk_R+բ' 8qA˱> JSsF%kyzi#v:} -)Fz.dzHBߥ6|ח7T|u_L5ОF錋;J#ڳƆrc(b6I+A%>u ` ?+o"bXBs-/?$% 5*Mޚ b"ÓQpBnsP ")[4BTA̩᩹&;"7MW3~LxNPhy!bj6aR,,KĆn[@|'0U}?$`@Zqdl['ͮu;0!X{eD8ȖPL6g {{Z//}9-Е_xjf#40a#ikoZv\NTqK4"=h.-J~4v_iDɺZisC혢ǣFNVY<>Q%߻zb硡 -dcP$ cY=~30C=~0r0p$Y]@Gz} DJ6^P!ʆ[ JZF[+4ǁvM@1$`EuHa^qrq|)0(D"wՇOOuZ4aiT,40٢ zh3OأYQ&B{Ik5 %+uzX}Yk lҨ"S<(:&xce0 M s$=V\`_4$+\"B +ׁ֛l_7S9:)UaЙ,hD9,6zK -tUAV~=)C& <ꀀC!QLZ{BPdg<3{!&a8Dk%m򋧔 )4K_$n?ӎ@uN7/qG1[%#P ),{4 7lx Ձ -sZG駰fBKH# #.d@j/ϫ0Uy*!#!Ǹhqo_/}XՉZpct$QdWs›LDLeeDUQ`n5EƮW{ng{.%>G?+'\#a?bH,׈cj%&n)+&a'odYZ[)_VKg6,\_" mGKoN@c/N=q F;R{DL[>W.2HL{~]-l eV;MkTews1DP"B8C;0f޸"dH _&Gb҄王(2FF\ڒaV(*d,}=vT9!!_sA b8ehO|p(z翆V{-ϸHmCG.r<(Fdr} 퍔ρ,KyҰ0D D Rub7+H.JFV5h*n*m֣y;E.$ӢX\=ɛh!B20b} ]KQf)ƚBuY)ʓ^W "!2"d&+B. . +tG:3:n"THKy+%)_2K;mCȃ>:&7e Wy[(c̏mOy8I9+|~wU'٠vaުNZ;rly@<=}J }y R K|𲼹5q#c%5{4u@Y}Xat>y 6rDJny~-c`L@hBU2RX T81st8?ϛ0fyW$IB`? Q0Me|uk-)og kNcu0NǺ7D-=09A&4ȫ(-aAu[+vVlĸM5ߏ.؁+Lj}ރb= =eS)c`CD]M_-;!Dh>U(` {9y?̂FٟZ#]BH}rdύ(`߳r:kn/00 ?SQ'vsݞcݚJ*~IJF>$!L-Rp_qQl8hT/ RϱSG[IƗ8ΎfM2OvbdIspj0So W)~`~=tc)0]ik+:`_{ߜI©㱿1$+)\~ ÈZ6 ԣڨ#S)2(R(έJ;vѸBm*-=O~]aB҅r-#wfh"0x;kc=ED5rp.W.?=Mve.,haH%~ѐ{io0 H*1H=TSlArx; ڻǯx?Ҿ~oQ-Bey۔67x $AY}4Knk k([GG W=x/v@`F/^ ~Kɔ!3&dz.ten?aBGޣ~>`2?Svr.#=8R7+GϏ'hIʮas{&v:5EZ7F.PZLh{HŃ-˱lYrݖiĨT,}k)8L3YOw[!B1)($\.V425ﹱ't)Mj-;Ò`sֹrnSqhW,)ҷ7¯ qs0I[eX7|h*݂%\7wAGc W[]hN/onn^Sw<4{ 8'2 k|$%Z -ւM)#"8PSa^*W k:!\qDrb s\Qּ~OBׄO&k:{_Azv}Ǒji҂f =(b? N: ʦAT(倇kUPG%(B}2Ğ}O_&rȕudp DvR}UMӏ_F,@4Rk 5'`3ykCXu=lIݒ+hʬƥ4ʰSO) ьs3tץel٦"fs -0amH_dGT%\2FAfGibb.~{ MGtlՇ%PE~Q>Aaj;Yss)y;IpeBw'rO P"6Di/^ VgP%xn X!ppzWBe 4s ϔreK FðLvM^zYvt0`hƲP3 6"Bˆx^Ҷ62)ba=}GV64a `y_>n&XS6Cxix4|iR OL|H"Df Q`c|{, uJ1QInD蒧pՁ!9DnQZx"LSm^23Ɋ_^i#NtjC-lQA"N Ҧ}0bv$.!]zÃL+ҍGx!QqH(e1D\I<棙;pN.|$;Եj8Jut5LxhGzU \.JN -9N>a[ {3(?;b3*9И|Y+?B8-KdWp%Z9f -l+_ -[ -6h U=Hcn bϩDPQ% =;tA.6B@.lm[2&iS_Hϕ ݮ#f[K퍮b_tIL_OV[w`fL+ߗWuI;CVV:GՊF.Zhɞzd4NҲj(!}R~c[%ߊp`ڨZ^rU^]v? J:  -4+=INVe}jrCr?Z#mL6*Se~4'Ox҂WMeuZ_}4!cN:p*"ǁK\!&4I|VxfCfr3T^ģEcXߴ,*T) e=%#>Cd:e&Jٟl{7vFl=Ĝ̦cLϯ -k@;%ZXb:[7hNzĂ Ȫ0+O8]@ rl2ϗBfh OfwjfJX8(`ўGZI4.r#i~uġ_= $dP8~PG m -#)ބ,߉}:({&ej'Y_@W 3[Wΰ6@>̔Y@,\(wQoD]m$[j7C Z,*<(3Dbdgҭo(Yeؓ>I߻l(VXV1K F[ /QUkf}x -[ЧQ0yp#]g@N.%dyYONtw6;TXDHub{e5rڟgD~$;mbgo_jbWڇ:ܥVee/th3Di=.H"0&| -4!m 7PʗBK@K+zgTp@w( -VvOu}~^h P C=X t\$5?Tّ<{c难uoڑLK+%+~ܦfE Q( vg"u|,BrZQ/_Ɛ_Vp#q[*5턝-v!9J2RX|oC BYnM0%N̖4*?bÂRp|ο*9+X?Ҍ -G@ ^e f{M|@o׳%&o3m7P#O!L=%ʲo44ʧ팔Ych5ru mO @d۳U7MtG9 rV ؘv'dVmN9/Nj!ڼWm$Z茶ݕ<_& -jvWt!lݫv0дM.XGv&^6o v9tӥlBja/dfXGVG,NEU,kL5t -Հ.֥Wq ]0~"V+8%H+nobՅ[<cQ@; wp(x%AT_Y:WQ|dt,c wʅQn\xŬgZ9wH͕ Ja#2rSw Z-ACTUBL&Á"w Ls^BnĿԠ5+(1\vw/L=YC!t-fQQӍVRz#s{gXU3AFG1 )|}%ѱYg/ ,}Nscƕlnw-5%6:`,kTiZa1ոJff(0<ܧ+Zg ?cdqO`{H~'wf#)ۊqK!.t# ZKTc]OH:N=5\2-kR5#GffQz[ɶJv6UMrV#JJ٩XՌץ~lgX S=0ٕPFbjJey( -=}QrXHu\D *a=S}^*9x F,I%uIgK迺O%c xܜ-lBb~k\YJE*_#!72Q] vO{wqAL?@x1͵B$[xYQ RK--I Bl7.} Kq䁋Gv׽Bh,Rǿן{cRQ2`TU.mӇyi-oa>?Ԝї `"&O$CK7"c @×ԩZ fuϔ끁!X;XB$NOT LHmS ԻShJ6-s,Zɶա^y9"Flq"V.d\u[Ǩ21t7#x!F_Q$qxŖ^p娑2&,)H@M5NHxnT`Bv[N}!mgz(1ƒ~zgeY*6`k:' t?t4CE%ǫ;=/C'y^ r#OR0\S,%I{=Ԓs{Z,(]'K~hWQ") a]0mHPL!*RRɘ뿘RnB'i=SCG:̃F=% (6Oܢ sw%+#HC%zNg`=zDFG~5sb;(X]c5ˉSuΥARʻw2σp7?ɞu<꨾0B X^m) -r;mM--( ~>0]K(곊oӪHPqmLD ]Y -;%]!;Mqubڔ/\P6+p}pSM%GFkS#t]9Q/drzdw#0gew'vdpOf\*>Z!W UH͛3&!ZQ6O'jEq#|LOhg6 -9MJ="N1ٖ #"OYbi鳒'l&`S3fYT5UxO>zhYHH J\TF Y_P 5~;|/QBM ":K;$OQF0H==U: D)4~M 4gM/穖+}q,ݚ#o:6:A -mȢ tPe700axyG`bO$~LbDpC'xܼWkq4Dp{EC&j><{خ`"ǁ\ le~ﺤb$G`GU*n.@\,hWم}@dve]]x3IGcq[cZ4ς]6,k:Ы3Ll<,D]8~*1>WJJ6 ; -*ڄ T"5+, \1HPz -۱aDˊ)q|(N0!A1yl|6㠤;0nayulD#0R50Gp8oP@CӺ+j?.M %דursE B9Y]S%>]T119=@o\X/NZ L -HAQC&3P9>E oXK,X -f\}R0?HE@aP/'%,pU^uHAgӴ_mmrKނrwfb2wF&>\ybB) 23S[z=G&2PwʣQK{95P&֬c!A>aKjB ^*!Y5_vX \_ oF)F?ZE@e;~z)칰7JPpH9{Fp r=8VN !lxV8DR/o"p*悯!GdҴzQ~SףJf@7gfJI!/zc*:j, ƪOAgrX Ì -Y{0hYjtеۯƓ$9dx>}r'H²j@hp*vف60 -fAC -{;D.tTx]{ʃNmJjFCtG`o@c:Ɛ׻fWCq6>c)=qn]gq 9? -*xqAWo"qs8JkW0wP u͙;ɴ6Tny%K [U`a!"_caѐ|΂R,;5T34B SB("i |c;~m哠B/-ϓp+Mj=Ē}~Ek{'f7Yr>s`gm9( ~3X0fxȁ'̈ݓs! nۡV  -wW{vn⨖3J.>tPESט,&{bY5q*:HfQ7=ن"yU|u81ۿChJUeKwؿdmj A-{gGU``;m߆ <q4В>-!2 !gcs"RYqze_+U* - oUG!`T Qa E}AD[|Ad^ - wHODN_d+#9 K\mc 4ĻN2 +GKvr̆$υTХiw  J8]~Q1A1?0˼u?m1u% {樒DdT)LNzV<x(0%]GX-%e(;X=]^н/6Wy]a3>LceS¸.B PZU^u+& X5r6 ~NYswbKuoIn8{{5 -HBsB"#Ce|ֆ&p*: MNSx=&.`DDqìh.зi'A~ܭ7++W3"+~_0 - 4@@ -ۢ}җ Cs[l,tA<KPD% -d54" 65bV# -㊈Bs08v(j}'s4W KWs;.8bk5@;T׸UY$'v}gӊ[ 5@7 @)Jt)մd]p[\AI}Z˨#h+5С9 @}[ʤgv;\ZZjC)v)őuPvAbCmA,$$KZ둍jχPqdMwC·^R*a~ ]CUI2^dŠч.}X_M5bDnv1^ ]ߜۂ"ETo(Tjۥfr!/ao4E(eo62*:kk:!Oо9^!Cgg - -ڷ,(jd}:/})_0FeS1 -c,e=vD10;aY\q`j!&$fSVcs3Ի5G֠Ke){x -0fI\Y)V$Ն(=2Wx|qN]r7x8#}~PD({PC? PW ""}6W*:>3;a0ĊyH[6QZ:d`XߐcGP :%؃1I)sGVq4Z{sπUZD yߜ'9=σ\Bo&!4[X -UL=i@%VƗiIF5.0lOB:x^M#(vX&FXӂZ,k“g/ni)t(t 0vRhǠ(kąe8U9 w V1 t@m=^KPl<͙++pu0Wn M4EFםs`GM)  WZꅅY&:d"ƧP; >}%V jZqÃޗu5NpI#hVgMYRIykLGhb{ǥe!*B~r 7+S[QO=t/r*ȏIѹdFIЏ8B[hW#0*^LJW_p+|9H,vEn{@% -#Ne=$Ȋk0ZPhܿI쁔PK x((g@>(Rן2Ύ_??|??Ow/?o/.׍{8=OpW&N6;< ЮJ9рoCE3?SHMj J vI\h/zεxˆmEX:;#NVI0fQbhޫP*?,j9JaU(aAmhmZ[s 29f,ȈbCaBI Sfe~X\Xoy#!= )"9<;A!J۹S(BQN[tڎZ_!@n@T(M>u~gueKcBV =/x{H ?~/7IK+|b^>,`tEЪuGKm`HPa3~v1d=6=f=j^R`:ND0aM -{u%a3Nhk#` 0+s%H:#H:^ y$W0aOAM[Vk2/&`oЩpX s0,OU4vVog)8FmߜȌ16{h< wT'^ um-Y==3 sO`^ZB`ϝ%`T&g歊RS8r(UI&"8Ptz&)xJ)Y; Uad=a2\s#P ʇ\"HoqJsj&锰Figy[ANX tJ aN7'j];uE=L_R/y%fXӗd -TØyv̓P"%b\%3Ԉ\/'eLpہ,+I?AHd8S $VwC{כqFQީd]N%{?ÿM8X'hARLd7iwx RϴYϴYLHD|Q5ý|&>4dŇYfa\ {a4nU:(ib^}Utj0Q`1X@\}e]JȻ&ӳHt:U5F4ƛD@hzQ' -٦<ò"c*tE؁m8aV )CKp[?8c;CHJNsus`L`#O##8$Us TBjv]F,orl&Tש㬛dlt WȿtuCHuVv$RYO8F:* -"4wSb_=A>H=+auP]pM" eSgb[8-׋25='ӇчCX/A Kn,G" -̋lwFpLO+{ph=r5HVz [yP0aU;V"Ӕ]d/+Q6=Y بвIJg]1MѸ=J_tr sxTb0)pۀ;t"bj3ٞ@\h_?X%_)ۈ<KDu"TzLh`"R{Dy???s{n - ujJmаZb2ԗd6>"r*NFo&?0f(X/_~=ְ ǠFx]g5`}3[ [LgH[ZABMK]T>3d֍IRf~l#pmv xn!h`^;bzpŠ,`I6Kmr# rq`Z5Mb 'O PR0ƐDr;0^-o -XA8nJ"GzG2Á@` - ɵ YJ4Ϫ?tх/ bW։u#Y맾p艔>o"Nh-G]_rz: 0(%˨9iƕeE@5A>3UJ6H~)$ky ւZ =DJK$N#n㾞nݭڛ|اBTm6.t- Vmny џa-BW7ovj=L)^="=qұ?2r}e;|FD~2F$LZM[Nvw}!Onzzk˚"3o#QeLà9108^h%È诪›`-b}u5.Tn8PeAkgk}gkܴzkPJy˧+mt=1fXͯr[p_-r#(}avfti+u+ǸewA"2?L9Azؼo^U[S ځG.'I;%@~֩!VHETJ"N~} C%K]>`4]FbR>|vNh/ -uzN#4*̊=xrh^=NZ4ja:R3H3Qnuu=0y&VEKm@JyKbp ^̒g -;H~QhH`He6~@f:BUV h>͙:O lWA|=+)>yYtq2- P -90FgD~7=g=傇ns+fiҮy" Rj};m2gW[y&ܫ^E40 Gď[G]Q8<@: c2uKS1prpP`8  -:X[ƦMޤvvJ1?teu@F=gb4LcWgK g{?lR?ӳSQ`>ݨ)g 8 \ ڝ]M1sK36؈a%>hsk3x\zBڔ(~^=cq5IY-vDn71 "`t:9?U,3jȕ@0),ld9:wujJխ!aA3ÉFǞ4w!;` )vk Ϛ|*cc_M˯3؞@4CΝ~pW(~"C6uNur[ў@nESM\-CYy wP GM|"`gN՘w¸i}nWZj*%Kl`tG.B|ߣ!TrQ5 -t<5$Ih]6 Gfg TJNUumRDbt*y!@ٳ[WŊB}Zo9\a9-%LE@̓(G0g+ zиN՝@эczy}$'~ <d#ߎ5cx'ㇺ=>p"fNǩcӼ'%yi饱si=ݐ"7'ቸ*#Л䀗.a߮Vٞ Txs>e`yq*-(W0°Qe -\iK6b~UO1W~.@`8%C[PJYPTo[G0hV J= Z3l0}>\yk UT=Ģ g:~v@3ֽ)TgHQuQ6Ӂ"a6*!1}z{@Vu=\ N}$4ʑy9Q%oI7xb)Arי_#`Dڅ za7J.OkZT3`z'ؑSo)F$$(0IفIߗ<%a$"F #ur%-?D9ę(|HpD;wGKK1MWЃh"u9ƥz0UD/~:~ ڔMya(:-\'EE_g Yf{~Mr9D`2tY\.(Se@vgZ.D {0b/J"w."aXOkCV"KdlKb htb=!_?1Gmgr,AUd -._.蓼5 ??yQPj8t#]z٠iTCbw$=z#T 5gf-$Z_?!5,jTֵ23[Oޕr;r;o%$e . KeiW}9Itp>&]̚ΔU|v$(Yz A^r7t]]!rgi~ -?jݽUףq5|}+rah1AOk5o&#l^$A]6C-`?|-*0%{S 1RV@uBA 6Mmz6p-^0 7_˓t+s0E`J6dPḋF߳.Jvl5DP/Xv e2lh\c~UuҝTsOH S}ݺu K~}9=Cʌ<#jf#D/z*04:' -ӱ}RS8gkzԐ AK-!ЭQG]Yd"/u=s17%g9͍o {&M хBro@wr"q1uyTa cL%CUeG\zFՒC37HSB@\۲)ݔ;?/L̈l a\D.93ErtUn3`"6\zn5# 8RLZ{X:]2: -0XVs@צNPنN}F|;, \jf_YX$ϒK*zuKÉ5(MhHƚɛj!h\=CvDPTPsyDˡ" pn3Mx+`d^e?̂6kY$],F" 7B{ЗoQ.S9DO ^@5h#,%.ĊkK ài=a-R_sF*sgf\ &woN}͟%RCǯ '*QܡI?* -/ !͡.p/Ez%aQ.t1.gLWQ23Rf<'ysITV.a]D6ar!9gDT;6C$?茢ԫ_ 얄~MOB{ޓyW! -)s)luH pvzwQͻ%4::^-N' :T 0g[UYzmdݲ!4a`!&ucZ{\;D5 v:F}y@ogS)T;<#{GL@qANKpʸqG^:LYYT%|Dshw:aL^"9$قntMR58!eG3&Zev<#pt+17NEӐvR2"EW8i@Z06u xD!Y 4vh \_jY"Ϛ3E&7sSqeǤHc pm#:h3tmTc׀Rnb3 ,u $E1O]CF p*v帶KA|C /ӊǶ+'R?ЎBL dR#`j6PP`}@y_O+"CQ~KܐyYϒ?>OB1u|gG9: &c` Շg}2ıMXs;UYW Mv;h0]lwJ_[50=<vlЮ[/ -P3=53 PF >H77¿@G*|#}Bt6;VDßmL*9tbvG͵~] [~8g?6"m V3^OWO1CC|xp$wI2;?K.VKUҖ1if"TK$?jVw<U̍ąϕg#=ѦͶƹ|5Γ,,VYtݖt QM#=JXt m1_fk д91e V;#}xc;1lA8%l j̧HA@GE8wsc6D1mMkfnCo|YdЉ&rP恎gL)$LIkk3gKX)P^ϵy8J:T-_2UtHxZ!;l[ -;%_o=HO-qp&QkUak|mcIfj`t 2}DH4KW}D:<v(vyx*V.҃-W~ -nyG6!HOm9SL\7A9n -l}-8`m/fʪ!Ue#Cd"Ŕ1Q<֞ -[@rGiLYG߯ax6E+ "1s pDK~Q %* E Hguqű,W=E"؊H{^+'JYhj6Q3 Zⱙu'8%I޵~0/\aT)pb;֊9uZ# r2;^|Ҝ Qx_grLDĿ#SЍWB̈;?&ܮ=!h -SyǦ8 BwMLg(`qzB&͟.tx}aIxjNvP:"9xϴ+l|uVMJFk'aW ֦}MX[VaT0`Q - /qԐ= -rnOڭx;B4A=hT XfUBܮ?92C;L:TizZ'8D,Gzi'"nZ:m&TwRamx$2iP>4h[îYbxWlmb߶iDk<4y6iz -5_[RΤD,(3(ixc v8&BFo8Y; ->Tf,Pԉo%-}Bsɝ[ZLX˃E@/~Ğh7$e v"8mTF8(0 B8BxkA)y6!$v/6MIfٜ\T|_MB ]~(3kKu\U #ߛLU37_BK$lhĎѶ#-"^Q8%̓ތnttǐw05wYm@kĊi^9_B>'W(4/ZODGx:%. -]K -[XWVs{$*ָF7&a 򢊋2 }f+K}f#FW)eBc# 998g$>gw:N=UTTOGheh 6w(uݬQE3|>ȯr 4ԛ\gZD,T9b}/E&[ߓvlz~^A&۹ -;LX˭48;̓sQImozx;a|"FN5;O?j֔8 [/^s!sl}D`@+($IUydy돑am@0;˘o@7cr'i ^]bW6X"Pm>/ðY09FmF0He_ˮ{E2#9Pw*= #ŶS!7Ia1(73\281'5YFtvKM6AEP?g+#|!d~Op7ّUX+i^GߓS M?c:JS]beҕhne'Dqu4}:Gh'VTdٹFMUMUEaYcil@%8L@I^I wTZdnpG3vfUeޢ>/_ٖf&! VPQg3<*t$)>t_ms)1ۆS]YwcBql\EPe /KM} CK25l$yb]ۆMh^U!0zRKXњл˟B,2FT ,y%%@-02<.4"&p fAfLW*8,A]R`uJoB[O!nj=+$M`3MքZ`iƨ>~-=znSecWIduٙaXBkE2}􉼻t9;IQHz} )3sjI肯C1ʺUFr-N>T#&6挜hJyP倠OGŷ(:}f]OkTPWk{IwS"Q,~;*1TQK -^Ѻ5 Xytp=DO=vĐ~ΌPj=@6 qF 6rtn 3+Ud=$p/H\Q[ٹJB+ "ܟ.XWyiN:_7AI~n1wat?IH7k+LOcfz+ -8rCn- WH`Uݥ %)Q"~I SQ'ʀ!~;3(Ԣ-2ți{Eםģ뗙Q<=`ϤY4b7!7g »K+{ؠz1('nH _\C*Ɩk`XH 3#*@3bI+dz εsM1ha2}*_ @öEPre]שּ*ñ(5E -;}(>D^z`}^Ȝq b򊝰-.Xo-HM7;v2pQ?^Y afHVAxl¸TooGڵW.tfǭ_{ڶ֚[_Bk/T(PI-7mڦIt& .c;ɑxpwr4v dKӈ7 cC\=x Y&GpB{/ՄyU֧ZvC%84R?jс(W$c']pQC%?꽡4EfFȨX4AOnei5X)35/TDȣXh+1H9};@w c&U8WBClcO'XI-3c|)#~ǎi4MFCIAzoSK@fGݭq:DaH#*uJ<°24߾M6ӳha)F3>7Ô1r|uXD -T劙n՞1~7kFjT%T%ndm-lѕ:(2~FT[B޺?Ǟ*9; [V"c{]Ba{T7;` jeǾUvnKA L$SgDhĴ|m7}J odFǧ REHt+O9bD sq'"ge.\Bz-"}\L?* + svvTfkMiȖ{c`zx\Tm ԫ|Cwb4M#Ɲx%YdDÃt@'0PY;bGŰ?=a7X]tl(j]kuL$d$Pt:UݵUMG1=CLz` I`&[78n΁ɉGDĘ ߝViMuzBƓcfA†n'VK2g[&H6^:] mVvsEP4c|C̰2BJ%kCPFT0ݔFhB"u^6Y^a s* I!2Dٞ 6sعi=W#MSzU9&[ ٦ҼUpe2xJ7c h%q]P^zMjC`0jyԋy,aGM3mdú atWD;7Lזok^rj0V}@E8SLNZؖym+;A_?Z2JZ -扄^߯`Eq3 @at"C' sjpRՑ+SuZݮC*p@)XJvJϖnزM\PlQ۔kl(S]DDS -+;Bg[jeR #@"~!*!1x{츤 i1s%2"E,3*LGg}_eGA1 -BGc}XJaDLO-=6@L)JYʩu>*L-!L񶡂P> r G:,ö]>Eh'w֢`tu1~DoJCӦ|f8J?ӈ1*|p/EMh(זЇ h~FDgEs|hGߵb65ft.G v@ ->32={J@2gYOi(=p<_{#A^{5^e"ږպjΨ -݃mI uȏ ׹O'L3 -!n;}qU䊶i+w]՟|#6IvlR) .ݞT˵!!b+Ũ}rQ}9h {aʱRO"ƶ -dgxW*33zs;oxm)4#J󱌋cW {G[]+ "ЧIdWE`U!_6t9 0s׊s%i:-.*ˎh|BSг\!Z" !wM Hy(z |X=A8/zD9AUߗC+ù'umT FҭZ5)f.*â{s&#Rׯ(+M+|Th|N\N֧q~TwZbEU> wH/Svsu<1wJ"0ӓ5k{%JʈVޙcu&R9+%Y:txΛE2_`i.rjj [RvϨY,2CT7kBTZ-}*ގ*1}/f MP3CmqjEFXQoGeO Y[^~=i,|;U[@dEh]즯KeyFm2 `6HUU Ђhmwf:2W'j M{]ަ\!bD%lHYJiF߯'6EvlVqw3YP K]/$}#q^D ߐ!nS F -/1d)-؟h8P~S.4Ty+8d|igA#`*<1!_W nܡP"2*6#<wFP|҈oEfm}Fʶa/JiQt84 #_?Fi25shq8ct\X~x(~K3iSϚBzn11cӿcJ8XJsfFm ~-- Ċ .W7f3N:X1Ay*_"PAL],eXeO\"i%3/!b0-qP"*Ճ%t8BYO&ΝY;PbA<1G=M5S܊I 3z\U@GF>\?KƢCx0c?btrQBt/b -Ѕ{jh j#Z|5Gڪojo@FTaV\ @큥D N!`CDe\{KBu1I|%n3^QP:U7\Tl "\vKOuA2b1F+#S_̯ҷb'̦ hr2a+YSZAxQ$5"sk{veWw?Xi }sa*N$^|k6!9QogAn@]co#G\ҧf&R<;Ӵ738x%.Z `+n= - p)orsbBP<|ߘg$͓48|B}ʍϜhbH\_Eݵ=GV6m)D0 -v_XBcb<ԋF2Sȸ_c-lQ(B'-Ҥ&UiP -oHFDD!J+4VsFeQd5#!H*WXG|{=T/Mt1 -Bu%V8QnTkJ~ |qlrY@w#S.!f~Ls۽~d{=AL`1#t\QC -#[{ wM$" -֐5~`MЇ?%$KP?hwA eGZ b=y{!+6'E -#k7_dGȿZ2G%@mc"!f; xhG]^E `*6f+h "\6+Y׋H:!4s%[s{+p!`ׅ( ZR?#+QJ:.ulCKHHUYN4-kH8׺S#6f7anDᕺ\a@!0"3A"i:D=%cO"b;lij-()4WLOZ!5C.$uuV1~v3qݑA|صqDZ͈ MT3v8Orݿ[OiH&Ea`1F}-&(>'A8t@^ago$뜙~3ȓdCS.|A?9HSk,(#8U>iX;~f8?Sr"VuJZ8Vu{r>|uG6#,Si"hG8woG3IBv#jQ>rEc[y\٬ + I>VYXB/BS͆W{lPBV)Ph)_G֌f}6Fg1Pjww2N-%+,C0|zr}= -{mѕa͠@TD;@wK^vge/o'WRŵb5EGie0\A} AeFWklPztz*4s!ɐ/+\ !b= - O{2(=VAI:VZ&wP>E_Dc"G]>kifro@oAA ?;BLweΨiZK!q 踀V'BN5  ǀu~3QbxS0$f>- Q7T']&5P&,}L2_cDDG'! }UbN$ېmu@ÔLHvp.k`B >=_lDIJ2}d.ѹ)d?z=6fDӭpD-5`ÁjvtĝG)Z t -.b2էǔ"iG -!+=ymRCK$de8\ -ʱX,qzo!c_# #1͔^t)mClU3#" 6M%ʾ.dCɭZ>GDҶDp5g! %R 2ө_+Y@{Fp3q:\HS0HdMF:|z5mƭaHC*HHS#ou!Euh4gdU^+m d]|}O=Ͱ`np>]XY`oGP?#΍tk);б)}f -nK؎R{GnZ%x8ª+vZ;6]6YӜAĶP]'C ^cpL?5:qJ4-uٵYv`8ݭ=Z[%Cy OS e5T*nC[X\+V*_/b sZwtnʣqٶS*6#9 -C!{C )AՁ:Xp]Uݸ7-fgԋZvCȇ}s뎐#ߠCTCbq쭃},:[;҅-EIM{Ofj` k4 )asKj%DU'YʬK#VEoO$OSx~(mb]x8s&4~@[Zu4_AEJ/g{o_WOZ~?ww?_???ÿuWy] 'y`n B;t4/;Xx`t1}H> s}nkSK_)ŕb[U\ɅQ-B^=թkUo [{3TY^lzO;DPW+Gl -#dE2 jjoV%mq;&*W.s>Ɖ=Qdt.RXn# .d=B^1Z#9]@r4>W=Wun"|WYaEPD -)!g 2*^*9p"B]D-;ᠨ]j=; );%2a p#~+쪜~#6u-8\ēc|mKY^/VթߪhN)~ A;{Qe]}TW9K$ -/D$0KEBҭXHgu}U6EihJǣJ""b-ꝩ;X.rjYÌWLGZbz,`vb ֝ _U,.V)8ʨϿ{G:OL*pߏ#)75_?ȑ"ZA&Cע$]w=ϫ8) A]t.${DR(h>k$Hc )N(9,Vlgg* gg^"O{/!3`$tQqy"T۷ڦu`f=,ZU{2!uTT].-w3*wf<(2 ߅}?2]>®M0wѓS5en79#r*X?=҅n;6X̃`q2EqɌ lQ4~:=;lc`yiv-Bt*0R# sJl_r#6of~i -ENbbxnkRL Ws xs!A#{%ב(MIy3:L`t/yDtZFH`$'.b@4%OԆEs" -49~3ɞ T!75sH_&mG,#렚4ɠ+xŞzRwXvW#R"nå‚7烈( QoҌD^@~ӋLbN 0%RYSXh0>zL*k{ܹ?_erV$6_1= wYg1q]^?/WEőj -}Z+]C#0|qjw='-Q aگ2QD+,c#N-䃱yآU+\aQD%@~D45VDm [tNN *~WH)]ycJIJuЩ9&6p"f"v -endstream endobj 154 0 obj <>stream -SDLW@{S q49( PMt0kF ;-pb"GQnrpZT.V|OݪLE""R䬥i\z X_7oC^1-'B9Ug' (:.[\7kNyW X뻊ӷ@ ->o+-[jB>7mU?GXpҊ>h|6 WrfH>]P[Fe>~2\OW?2B:π?<Ֆ6kW@XnwgE0M3|4m}Lc@LsukmA#s9 b28[5z_҆{ r=Ę:F̮JyUA"߁5_e1E}3Θ$ -}obmFo]poQ7G4oŽn/-(IjC"MdvM\Ks=b\5,溲xbGK.@ԗ=hX"f_΍,ZYOcrnDxvv%n"(`i)n -FGU|eeÉ8̮R\FԱGq -Te^!*IN_Im?bs 4CuQ Ij]= !cBSC B42bcA"Ma=]al*-[1IUt; R3߲gTT뎮"@),8zc -6ר ja1sk:n#_DPћ<@mk`MjԵ#]|l`=W6_EZ\";#/VUf;z cpsK}ί㏟"^uij<ЯKfca-*+[DN.+i]8P+4Q tILj .h2 -XKuE`,;~ֶejD,hs -Y (!Vس\EA?Z>Ȼ 'G!H;ZWp*2P! [uO2+H8eWQ~`]$*l{16VF֟p gLn?^ψ]hlR"hDn +[ۤX_A:-eJzl-"%;oUAԜajj3F㱠-RW~ (΄BqY;_рhQl*k)UZ>S^e-K=x^'*BXe] -*oq|:JrrcmS -BB^{oHȊ믝3֩+u$ Jbsܪ3b߶.̍1U[ہQ􊨹rCp_0myN-La?c#݃VTy =;i,Egx L;/KXBl&KHXY!H5WQ7sk7NB?]À @$/+l;e;eZlਿO U7nPSɂaYBkFwgW,YNvaػͰ CO:[ cW`X`fq޷$#*f/RiU*(Ѿ!'CP#I%8{|F쌤H5q 䗒n?m!pņi)RX!Gr?\E3XQc*:@=e_dž %.i|dw DvX)w`cg3ʁ%N+&UQ_ ?5+4: -9,oڊTЮ?`!.͊R%aO/O%눉i{~=T\uy>Ώ(xVz% @M{ - oW=Ru|=7{dL Lc(*pkX3Qo/JHdN*ț6ەvz܆*@G5=ݠE?EWd`9(Gϰp*4 i X@|DU~V˥*:%{qECҶ1-ޙɕ21Uլ &+gZugQkVoydi@;as^ZhW'G/u̿SN`z]dVN'#`tSJV>uIgR pwlf~z?wsF_WvDh;޾ -KDu&_P+DO9aԷ9qQ;֘ܧZ= ->J؜ec(j]Wca -^+lkXrfUҔUޯ2(5 c_>&y"1rGuM /;T)r[/KYG܀Ein4^~Ċ7=o׉(4"4O8+̈́BmFvCpr2=1)2n]0W?)Gc9gLg"RL:ȏ"Sl-ܷѮbֳ rNɕS@!}}{п5r̲QRpTުAWmó@Ӊ\}m5(|B>=Iɩ!י#}25 ,ӕxdZ[Bnݐֿ NћE 2 ݫ9Ց*-sȜ "0ʉi'-`L'P#JE_4J[sߣ7xbCǮ`a `uʍkP7T$ExN&HX35"bnxOecMۿJ&nDK$U9|DYPR԰ -n@Etǩ?yqpQ_TuSˮw( hcl@J\XJV$] m? ~# -h&Ȩ T be. ^*>}s~Q8RW 2;?0-i5 $6)C h2T!B^LgdqWrt9( OCZQD A_qD-J;!7p2~EDc[*۩9qV{y2Li-c輁ZE= d",c]D|iwM@!FQ4iv=Ff̎y8aK9^=퇈*Ei1|"IlkjՌ^'#d^E>"P -W  ܩ@0T%sUާ$џy eiTnr C`΁tQȊ=ka<*n@\g=^'k;k?]o㯧;a )wyP#.=U\rE3XO#]lS(CM?\1DhL?b Ɠ _|Gk%,`g*_1Z5<${1UT/Kj1Na,:6jC-M݊MN0p=UsN?V7X\&{&w#-ZG2TpCĠ\2ɟV w0xſUE(WJBDؕk K2hUFexM!5b2烨޶3d]aRu*GJ -x!|0pMm#&Z@WYZv". kNØ#6"^*)1F$-ą BKEU Z`p}_WEtֻx`wW#tʌG 8DzqӀWh1{ts1^ @!E̟PN]#( FGmDL- 3ty.WÜ@0@01B=U,v `|ӕ>9 [ Jxdb D>/ zk{zclM|;+R8Do? &l dk"aZFnNEJǶɞ~}#gC̗:%V{A?7n'- X5D>oF,3`%QōMkm_A("@9ސ2!z,n`1kTCba eks%gd:z`)XqR6cqUsh ִ:o1TbbjU^a㋌U\fj;J;wEepU:բ/f>V]sdMؠ}-gR ->vha瀌VѾQh/|lLogʶ5cr1&f{9L'W~-&'"m=P*gyYÑ7U[ et)/zoHEjcl}62Zfʽ>gN;P1idQgHȑL`\uO^N.h%֕-?m LŰ]R4%C8 u{AJ.y@WL?8x\V|qbo250cرa\l &XOہ%*9=<2IUjqFLȖzVHf{k:ѥ -Zz+4s=L@Ng~L[JSۼ__PڶS3^ev$u]8LK/KɗtE!_$m7QsV2ŵsЃTƎ -a24EΩfоռN -|**&E߼`Ǯ;W1\>ToPFrc8Dg] -!t$֬.{*0(Tc-]LRG)eR -/v*r~[z-l^MJitQ]RPƃ-~Ō_X;wA@*hJdYIbC*Gb$jV;*U8*[snT &ϩV6L@cz-(rmbBkQK}P\.]?Lk_ -52KbsoTk5jlK U=}o@ OLT8~/[zdOŽ "dj} -Qqi+5J8jzed#7*.rOi1@@]b07UN4uU߰ex E}7W|SDDɎV"t=!{M&Hv\MJWiKږ?3xD`0 ~#TF,j0t ,zj͙.1}z#HC3I(3=nznWgso}TrP5~З hqؐ\44LWzzO@d`bhbi L(|k+j)fO6޴/RR8W}[ޟWM w{x|KƩveq#*nH2z$WPy7 Hy.;Jf]cogH -K - -c;7 -Sk˘,l|!{ڐ - ˽+~:tTES<MxR<>ϩ*ӌGwQnŀa[KZȔLGɹ yB3ϛkPM *Sl!\rTֻ) -t`'@6Ti['nl\;A#z0uvȋB<%e`Dp32GnRFfl_Ooƨgib-dۮ+ƉHgVBd444lw|WyӗOq=ή6"Fzȷǥ|;zIEA6G;|WH-gB'>2dUvK@X}r""qnaEsx 1]~ǹ * -i]% "L]z&v0 s~$}Wy/\W]B#Հ Cд g>HE@{j޽V~Q[74fPq1XaENK.$և3.LUaJNn>˦Rof2H!3-9M(PC]ۢb* -Mq)#x(B܁<ue=ښ8 *D|gC%^dž$ CgbsjhZ kaOP'? ,4ps\AgB=E~盄t~vha+&Jil5 բe(ҋi{PZ"!uE]n.$V3+h=]u~۫\ۄUU@ ՠZ`_;ymT1eM|Q#_-~ -Xtz0òGE'}."B 5dy8(T֍8@t-qG)}:(" UqwDP`-!p|}YFmXý;vq2t-\) ,F UWCLD+B҈_!+{Sv -rȨs(swO0"3'CTQmrWǰijr{S,mCFZs'%L*q]13Ǻ++%w&q] <[Z0S]AP&E@ r-FWI8Qy2cpnߑC P´*:Թiz?\/*6,+lZTڤ^ -˘{ =֋vWDK ڢn7TƈdSn mGD) #Gs~_PD^ZzK 9<VzI"3^=J*p.f7/%S{D\ha;]"B1`рQKؑ EZ0WJ~=dtXTMܩO#WeƚRk񽿯ޤy9x"@U4{PODNPgXvTuٹ5:Aq[KgzY8&XjΚ<:]Y$KiEo^QˆNv&NFDѨt+:W}Ut2ȩ8-:2%0Ep.jI1|ݠe+5kilD ĘZdPcOo꣋;Ghhyi s 5#I!9|It[Z@i80SVbCLșRDJ:P])5ekvHDÛ$ -. "Na G`pOhkv]v͆ -W -2Pʊ̘ O# >$;vc(:t[JE@X;Hpl3FGC:>PJPȕ ]5ɖ.yKX uԜ>MT>z 0U&Z@tZPY~c7-2tt[Qφ){zV=+5+~G/u[# :~.*//n#cl~wGԊ]?9eWTUm4{%!B$S;rQO_c0sen}#AEWaV͹a4AzQLlYatA]NQܜ c\q (:G$@njfi R5D~C'2Iel1B3>gQ?! -m(D@o/zoo${D{sE_ƙ W(hZ(( ;yHDL\_35q *ZL6iP7OD97بpTiJ9Z(NJ!xn(8Jx(c` yc C2"世a|zZ`C҅[X1`Y-V7QzUc5d+:z v6ټasDIJ [RozhuJ be)P#N5+FAZd=~5kKtݢѵ|) - 4^J!-DMWMX  aPEׂK%w?L -ĶϵNNٙI -9Ca#y^)Q.TE1PE; Kb{:e{oB;CO@༊Μgմ u[{հѓa4 -^){|e?xy<"%B<=T $菶iM&9KT#Lz(I*=ש@P-x7^TVwD<̇Nl#i:mg7kEYEw-#a_}8i9q)|iOKf$Tj(ay>[$ZX;mNR B.3[:>#`\ѩbCVQ:(\(cJniEwHEwVGvCsh>-*G"[iN/+*.0"w+WZOgIHYub2tlĩ +?ibl/Ry h*Wz@lo%v:^ =<vjt|ӮO@-mqhi<:@S3DO/ S@PUkX}C*7T0/l#ejI_ywh$s|ȑSPGl~7?j+p7v7qco.Y  zhc@wDݛ+ёH]7d]O.Rg h'WbwP<,;W4@N Տ?>~#SPm %+#sNd,e7˦}X]JNy˫Ě)ҜQF0-T`hzGP=7ncG~hT"1.?FfXHAYh'*|@ 9Z83Gֹ)'Z@8O偰D*gaㄉ ` ]k7 -x Z03 |Z֣g>H3vŒaat/ 0$&DL)1nwmsʣhz4{f Y.fWߎGi*jfeIFnG`!|hܮp=uvXRW0/i9iSvD*DnB6 dDx +ǝp~"iDA=lNrBgAZcbN;$EiW)`D5pQ<5t$eETV m*uvs f׾#{nMGX}PW2,.3wr JBG"$6 bΑP$J)h;bjFDHb_HD<|/3N1WW+Xt4PO2#Fػ!+nOؘF~, f\$} 2#V@<~oaA-HO`;I; <WY -h`]{D -z]`u =a5̀11)mٕ 4Wgw2N!h X23$=%z\;1m5 SRV%<{ S]:e՚60*Xȧ,NʻluKQE6~#,C|Hz,)9k[1[,!c Wz7ŶYSP~^R bwB! ݨTG|dPEkmbj14fHcIaB[T7M+\~M; LaV˴&gdh[bZ3uF{SС%æeјh-2wɩ{ -7x3]hdᚋN}wD$GW?\YQy(?D]g`'"Hw ⩚!ak`Y]>R?fVgD=<$z=h ⬐\J z6 vNT }2B0;sa'x S9\QnW0FbCQ .=Jω/v睢Wo þ]jlIX$G4 ȡrH_͞+/ #ͧt ѹ^hӋ(܋I`#bX&.Ƭ 3G -\V*"v2 YND%`xiaSt%i]@î 6$")JDDg(\s+܍='.@舏[kNH8A(E@bD#πr̨qB1[1|̂g:x1P"<N@7r1IROT3TS -|:+􂷼#DAuD ;LcFWI]# =+N&WApg4d-ĉủ?8A$K]iTԦLcC ZS!V1_e[ίcSB,՞ - 58,pKu[|%%aC[ibJؼoa`؄@#jqhcd !%ta1Pz<4\4 Y)*N<@Bd343tpN"T D^-㍎){U<0=Z0ZɰJ -&2Q0lB%1r@EUee+.jΛ%.'3-;(Q46șoBeV>]>uk((Ł? yQ(+mrFJD7l4|aw_ՙ i,QT&p #-d-Jqm!͜@7y h`LXEsE-"fB.ALG[Ra!AJqAqP&9 إ4٬i|BC5 t9W.47fp:EF8H 7Zc`8S*YjBvaRZ o׳+P `.JdՔq$|G5W -/\F.M'3OAtA \Һ @tdכ@KqTBKqUЪ4 CE/΀i#H/ - &f`-A‰@\T`p`s!N@"_'oN(=DiCJRq50^kC$āE7piSaUrj!|gtyNټ tnBQ^"J{)d@E (-ԡc -lRhE+ADpG(XBL~qNdOoO<5UDVa`=Q u&\pX_jUPCF~T 9xؗ+E|Dǣtc){KB] -t)օJއ:vPP^$۠/Y#,X9DO.4՘#=| f]z#}fz^TE oض6TVJ%.@ -0d37[wmXc= IJt{ Tx.>wJ@4c frhA ;K1rSB R'1 W<fgR1#j/"bihB|.WFl[''5$-Č٪#2ݎ!}t> rNc&h|7n xv>eFR 7yyHp%tXñi8~O؊o"L^ߠ*krO;n˦Ǻ`,0 7+|p_Fo# ,AziF+%ұoo ¬?6<61+m:m̨[۹wGI}ʞ(3EʌB.`=k!x]?^;ȄJ@iN:x^ȚL}j6|DYD.M-R%_ǴZtxtOCprgmVٵ!̀~hZ3ĸ(=ڂaZyNdKjĩ9Rg"lIL`:0yTz(Ë>x*h+t</jRΖQP=xӱ\?%1I/]1oeS ">ЩAN&S -.ϳkBeB~9?*娠Qvuġ(ǟWa3NBb`!E"(A/Z}-W.ʅ Fo.Wz - {L2ŕ\$#B@{~mGW<j2ۀ$Y)i$|stov@H-\abUݣT#S= S1Sěb//PK'm*.a -Es@,!m#NsA| -ㇽgAI7s,((S5#mFF |L-i숩>~{D| -;DKc-=l&2`z;=sG u)}&m>$ggCɀD\{xΛ8S X5s-\]zհkent`Z@Y@q=-f%.Wnq ^݈0T!Z'BE/i:% z`}w0BfXq"KN_г9gj\X|pW_N5k_+Ƌ=<}?6U?8ZÛ􌾼\ ͢@>ƟWő'CSpߢfz8w R.+q нtq!|*ooA; -=} -STZ1k^օXaH@QC:k J=yg-x}Ag6fOs % kC@wWx1@wQ9*a)"zVЬ 4ƚ:b`/È)lZ[8rXT}:g>&B!#N596hGX3/9I?0Os[;HRpܙ?_-gCg#] 䔾qz&5!Ci0N!(ooTdр7D)g^&1]_aT6%صlEx 3Pjxp,;p-v}HlWD8flY͘ǀG.XN-Mz݀VxSd%g Oq~RY_wA0*#eT4a&Q-Knmg@aR2C={JI ([4xs"#i<ƣ5=#+;@`ڄϩU~Q;O3^a+Ч~L9s.Z(}{ .1Ga'XW @ӢkHX!BraQhIXgVz;q`8IsT,d$L(%$I7$/rOQT7D ]J+uM#PLj+ZM3N%^Q$:M\Q]Bx GZ˭ĕ.\PO}0RJP0"jhh1)kP2D "L["^YVDWR:B(Ir?JVVv# H\qwLGpm8`ň6 -kKȈ~+rza:?3;]V|F%PBΔ"Y҄ 0GIGaⶒ^P:P(}P>3*\X%@?ĄZ !xr"QDR;>(͈}8?.Vfe LqQ1=|AC~=׉fa-A -~^ʻ OʢN3>.fN,`iWǃx@DbZjQyD)T9nafbAR69B]&$R&V53MHlu&+dFcMNŮ!r"LKlq~O0= L/9ip/"|y [12^p;y5#![}Rع)F,,eYWa]fQn]Gm=i3F]ca\ʨi9Z]2{*Eα[@aC@&dnHNܟ}GCB0xPcI7%\"&وР)T-'ySn.n#Tv;Dغ Vi_bȄ߬폨&bFkNJ:P|HExJZIMo9l?5G,NP芌1qa7 -cN[@~ [j):_4K=p}Z-rhhLd޷ե-{A*tG` /D01x((IqFx1 LJbHp=PƴQF='5n &=LVC{4Ky#&kt_>=,x^&%gOR=Wr4@" N#[)_qh0:TSp{DtHô<®PNRli{S`vr)1% -4T_qTǿ0X:|YS%_N(4K,8_3IBОy?.eS엛7ww8P˺KxZ9h4$irfLj"JQ -g+T1yB0MK~`i@N@߬Iש -@|dyr.r6ۯ)K7xėY6]w@;&]^Ra۲g* -*6:LT@6Ayļd㓲77aOk{%()n/|OشJ+`vYPcS`. :K}ˉi6óx -eWrdH dlvi)$MrU"-ޗZTAAՃC$L -5&k(L) 0#Yzy(ad~D $Zd;~ W}'2 cnvSG<$ɥQ,Z!5iH5Bҙ`D9gP%٢AFtC.2PH'BaSRqЄ -2zZ_Z)ApFWtsԣQv][M>&Th84K+W`c*h=U;|XJU) .bG` 4Ұ6sݒ(QExQQԾ=JTiZi jc5rUőv&95PƂiyL9Hӹ57JcIjı7WU^=zԄ]V/,Ua@/<0k.}F~ٕ2PtL~}1gDcqh[f -&BVvhϧj)8o iX[@#V;:`W>٠074񘠭/ g]eN̊hH. '$7o#e_>/MC9Q[#kR9S +Z^?ǿu:08UoӇᦄ\Y1{?Ru+WwRz(8;__G;1=~0, 2 cRYa g,t1TH2 (vOS]Ĵր:ӚG/Vu-[2msؽ\{Y~:*C|0;PX IX8DEKJoKGG k{[ףSD6Bd\ 2euLP~}'T -3؇zah%YV2})DE_ S"xO ^U Nd k)&VEަW w(σVSnOm+?3Dt`V;SbSTYU/"Jl`j=ꋿ;@1C^09 =>Q"PmN%hhFn^1!tV!o*q@(f$ݟu$^ D{S!GK6_ =d$7vO@ Ue|XN(GvkTy~^@a<5qݎB fVXۓa.LRXXRC/|`ҖVd[\mZm}䀡(KK"WY;:Or' 3$=͝;},Ўc枔Ұ(-5}/P}TU8,T~IVI-BĚOeXaC 0;CZ1~R@UL = G$仚oJBE@U\dl//&?OztDz 0Tdg $;@:D7(6LކQþ=&S{LoX9Qϗ" -3]G+.̵4h.\^!D #OQ.@>\ \4vj;y.dYנJ0KkYAc>ʼ5}8-`hg EëX_ \hq̸;^9mj9:s z2HpGޓpZ+gQJuKGClg8DS^J@y γKF#&6kƏ5Vc=I4i=p\+6WUkET,5[Z9'gBG-vMbQĂN4liMG%@lNȵ݁#c80o' - -ߞ(+{qv=UFyR1;K?[VBc4`.tv+~35\r![ Ѫ9\,1Tr6Tb3b(-LP^3eg{ZՕa|mxK6td;5}5&݅ aP!M # _/wSVxsQuJ4>һ5R"LgAXŀ]B9mYjWa@1r$J_pt$(Gl?)* XȀX؃ 063YCQo{*mQW>k܅ 0yT͑GhHD )".lߨl $Fj{34>GaMS~Ts^B`£:!Cj~ÆR-})RtEZ+Ш)>`݅fh a:jHS):N5U@v^!Գ^ܐ5.bU~K%@?HtRkFw=P !k#} x[Vh8[l]ש>\Sg/ojCw -eg)xWZ| #dOkFKbKC~{;ϣ^=e-BJeRpFޏ - Qpḏ% .)|ͯݞOD_@[J +EyOtpBC/ \AM&B/-Ѵ`B7p>!QaBF?R\?lhd =zΚ.N2Eʦ{ ' z[7i s68 1нG#)RpF#v# 2U*~gޫP- MY|B5P-j;EOB"À'Z j/Qj@RPG7\+~ -38-}+.`=C+ cPUɅiiC?+d3!ҬcPYty3~\p$'p.=j0ƷaxIUٓh0~0N(n -  DQ:pLb7 Z-hGs߳.a@ο^Λ ,$ D!)uI~;;wsDKwp $)p'{u7ais{G3PI2ʉ@W~8nlS()F(<:K8ЩDˈ_'H9-8+ fÈ!_AD5PTvSKKJ_"Vzk{ -2["Bh`(,h6$W/{>g7a!$Q8&R B",+t",jq&T3"5ѱE'J O=Qu<6MI]6C3Q`J[W\cw&6]G{߂U `atPCZreg f$P FRFJON#&k%}ERGe. U9= AvƆ:&J`vmMWL̵lU1_@x$]KTnPyèza7) -+oO5sSC&c;y3K#9{0Sq9esq@љFW%njS7]ls@Y֌k4y\/ R60րhN#d _Y&ᐍ%+[mZ›{ee|>JjNF#ڄ]WD# Tn ܂9gD+g F"<`%P7[7) -31G .*0T_?>3JJ&`d 11%D=@#:-n=7s'ddE[1ym`A9SQh#QwydfJO-4͝6RQDQ Ʒ˦ M: -uwj d85`UN16/wڀZF6" Bk1e?2:%P*LzUL--~zzs|I`QMX_*=٩-lyp&FNY?̑BIb u._Z1lkOM翇Ŵ}OA[sXjTMZ [[Q=r>F?gXw eC)=J '{bE&ˌ| Q'sJG{+jlѼږ>^r{foN䊯Pn#qbSripuGm-nqqQ=} UKYb(f kNhcξ}Z=NCKv[ЧyJ=?iB rZ`X tmS:e\hw Q1G Ur -K%Q'EPե: %S *tל|_ &bn!Fwq" -ũL) -RGԔݫ2#cqs1{*jԲHBf|N5 fqhO8@WãZCR"MZ5U]wĽv֓幇1"X -0^H\mMZa[`vuct[F|\"o ifץ#L`W,/e/mHِa %||U)ab *Nw$+3(Eˎ`K˫n]EJ}@p9Lp}mt.n ǥDofU / bVITv -#^ܾ~}iQgeM[j4Y*Fӱe;D9x*5ܞZK -Te(Cm(QPnZQ[WR5LėzL A;c=5lM`9ݟ\|-7唻p}OTS cfԭQn-ٚ'-8۠np%m;rtwlt= рn'lD0(^\WAQOUN+`Z.aỏ і&A}ݬ1EA2e=e 2EIl`q՟U;R™$NXxq3ΎkDyׯR|:RXC]GTQ|]8qЃr%r^8ڽ{E a -[JV 5T,10`YbcWs nr<۲gVgĸ` W=hw3Z^؊%e[l1cGTI:AݯbNBfJʊhO!17`'iq >!=P8y4X=VBxr-g>&XDбAʟy}ŰPTEVUG-o ZЊ5U,uv,|0_ -fLMQtņ'dW; SI7 -$P_ـ(C%BDȾm\}á,~*S߹v.@R°t]voX:ɁyýKԋ^v,iE_D%ŀv$;aF5 ysJUd!IY񚦈_CѪZ$TD- -N(et -i7 -phn =C؃`y \ Iqe Q=>;Ȅ{uSݿY_P k R?|T*J?Q?ٞ~wG9m֠69J: y8tkU6}~\2%H3[VxGn=ルҘ{)~nA}K-DArC*gϳ3@!]Gn=`v-#ˠ^| %Y5%5: ,[8EǗU]#Wfj^QB*=~ك2>!6zwE@I_XVH!#h=RU"cJ Ϯ'ɕ(سŬ益A\S”,%>RjIW - Ќ15rGL=PopAk aӳ ouCZ4Ab -L-{P_ AO ]L3z):94q-0gb ƃk7DĄjm2љdU2vBqn |3XEX| -;u/Kpa SQ/"X1fޓUnZaͅ~ʎ]@G!Xv.INW1p4}c)d%.G_Dcbv]><00h@@tYF PT\ݘ7t;d-[\HKKxSv+/e'*x7Y -lPp>VNͲXG*_ ԃ e֗r^ح̢̈*n8W,v͂('rYE 9#69>| [txq:9MޝʾtDWr"+D,L܄ҕ(y9o\a{FrYxMRZ,MO ř -~|5&[:Ѐ;YڹR 8 paJ5šEM B9o*ot¨D5(A0F*xR9z!1 -)fFbuB ^83kmU8Z\*g lV@ ʯjX ÏE#DxpU ME@M .$<#,`Xu짣8b}HqcvSosC%z@9Jwٙzyyx3 |; UzVH}/^x /gѓyn -F6h`$vdY|#G]9؏)M/*`V44e[<)}2$|nipR҆Zv@rSECvE>ooǤ3D$B-Qzu -hj"Oj?:v_ XE[X-8].[ro߅(0"`doh a-Zϔ%/+1U4 -T!e\Pq*pդcpKܒu#:x&(t*&4Ub rJ[rdB[ivD+?P{Yڱ/gvD |QxGH_@9B9.Є2oP[جq0:_bl$F;[I[ -}Ȼ̲Pn}2y | I#N0CZAլ9b,}&J2K^Ϙz`hu6{@y|Jq '"rĻ! ԱRyg {'ҴaRC;ZWP)-uM1! _|˜ʈ/Z<{z^6NHDt?TVPwP >hg,Ff jyx2@|1o묷'#JS'~olL٨܂}HF'=JM!:eѿvH҂LB@hCnq!ZV =MP"3+hUk݈2)z4>STQJUe3#P>̚J̼G9PzrwU.MB_.9R^“.=m# 5:M7'Fy}aq<%fGwplaPHyόX"r %|g[t d%q~t2*Y -~ -HAF"kDEdX ủp5Ia4# - -~Cte-ǕuI4B*QUIJ\qĦ蜙=c+I$-Yny-u@2dh:rf; WIN&g K04*Qg-sA>tGƉ}q"H'MDn#c"{KgBM,dX ^ʟAD}1OC[z\oQz3k:JD 4$=7oTqDzQ3P龒9Ē4\uP o5PÚfax jft@+UN?rU Jh)tW(1,r/WHu UGHG뜣ؠiFxl)`Ga "8E_uRL{_!RQ($\".)vز9 -˿E9CO!V2CV0!Su (xE)hD,>+{w"ہZ fϊtkJE|_ mƀa.s(+cK6Mqed >&Z Pl[Rn<.X%{~9(>;~ /-! U^åLkz]KOGw}"Rz \yȄ(*ٸ|"ޟ -?e!YF1 (-~>ll=T1 pt{#JO'%q>WE]*^{yNW\UCK8Q{<`9{\9Bt/v 9 -AY=#~Rsd^:B+S\ՒR `G6@M|Wv)x"͗!IF}b'`D_ !8N:"4)q -H4\~H^sl!IjqO?pYEBӊ%0Ô t U-қ!?$|,/, -@!¨G{<}/4}OO?_??pNG???|xP_c\ϯ~Ǐ_ݏ/>w?͏Ӈ?wo?]cvos$r O+3KWȈZZMO83GbR/I3>Ҍ?9 -kF#iΎp\.o=k{[#]뫓%₏^}Ww!jpwŢw~ӟ,R?go+sIo,x^D'.rӟfŞWWDiND @*I"&z -Q[W#kKV6rKU6G`;8 0,f2=$ףmlL],d,xDUz:cZn=V]鮮ddFX%bsG߾ -1""׿!`> )*Dž*83 -Џ^0e -SDti"|/_*| Rͺ4g4ALi' GɫPX:C͚䜣SoS`Z  MT"^af+ e"! b@%Hh*mG#ǿ#_}[+I)`XcV漫W`JaR->оӌ/puC~#&'%M ?213&k%>9nL@"ʼ;x#a yZ`h3sv_,ڹ`KI{Zm*D\c&b.>Ha4_Jjm#p!fN+V~rniR;@_on 1A[Nt}4GetGݤGsђ*U+0o Ə1DoW@i€lB=>j8uA?4BhADL27G>$$h}(֎ =As@ r*l'WqW C!_iz聐ւO3Bh9tc_X%vP]'(5*P<ukvE=##fpHV%"[|ڪF+lW^YFHRḑ Q' Q2ѳRҳ=}4SK R8;ER_1eVUܖÁb!;,̈́Y"y"@dUdYz~2tHmen|8431c˂ħ,wGi~AL4;@hn$a9hGJ11z`C7R| d0?N\0C Fi>1e$4EI(&IJ.hʾ Y$1 -Nͅ *lď9UrFiƠ86N%d,&ʹе2@im4L7Z+vܭl`$D7M䜎Ćovf ZЌAf^ة9ܸ0< hXGM h|[2#f 36E\_bf!7k7JuݞqE<DW-{5>/_XXkN%[W5|2Rv/,b\]lb3{%ԑvEP0 |,^-D bFtx<CtjM&UB/Zk,!G8\'=G%a?jNj}sɖu-YIZA)cȥ8GwAḟ",62s -oHB idjf|[̡7M͡q-~cG} -_.tks0 V9mb0fk6']/I@;!3N$QqBO1lhDC!Fqc8U( ,+Э-gDg0b:p<ɑamZO7/~x߀i%~p0xd֭ĬNaW욓BDKYiV:fi>95;kՇ?4r ͬnB;5I.bH _X1h@a;Hhli Rlj4k/xQBH -Vj3;۠0rQ2KC' `йĵR$T}5wc?UNWr?9}y'(V|,CLlD=1mX5tpi? xI/>N@ kc9+kG.^n}~!n *_t3J'Wa8rÓFVx9̃J[ib?!(8kA}ӳ@~j -vvc^5EBWfpWrV+!: ݚ*%GpC VEH90j5t:귻4R=Q.n\(Gm—!yPyM0ْRlBrg+jLRO|rv78΍W[`D$k4 -b׎K%=Yy-d̘6*AF"I`by֥Wc 'c,z[-'9NHB-d}YD" 0 lӕc6!H6&V\>mL읯RC#i Xdeu@,r.}ȷQDMf,h -]d-蒭' =CԎF=/!XZwAaэ(lfD;;qޫ\(H#krByvufO}1>c3ǰL4=tHkz"$zygb`}!^m.gd6!o~tNv#q0G)t'M2YHqjk25pъƌŭq{sv {t r3Dє.D"o8 i8'zVM'ā53:LJ/Fuy846p9c[!&D.)p`ݜ bi$rlPhv꤁b -q,€,mub];5\ -70SRCs0^]1v&Ë5їDK1 ɔBPIfБhnAMd 'H* KWuCKINf'yt6/F~э7N`*axi6q>T-GF#n,y=PV{?ĀlX .07IG?򍡈ЌFjtpА>;Xg:l5 ly4@`n -L>h5jw=yV+iGŶңB1JO"1zݏ-7@o Rbi\i6}-sYG 3QS1Q6DR>6HD" l{Cc%:8<l6DFM.C=t`G.}{f4=0JFoB&\娐&r#(qmn&ؐN6ϒs^N#\p - "3Kɝ7\1zx* L:L$m69HL!K[pJh"%|a\;h*rXO02/c2FQdAۄwΈlfQ݀ 5Ӣ/بe95ɜ9WfYQK|УdUl 'POVjm݉"K4Ϙ8zʊm|86QjkX/fץU}O05;~XF#F/ O`Han%5^XK?N-u -a'c:0 A=bUȼfq`˱; -WI4mC#- -Xu]؊}sjA>08 U]&ק3] - R=w0k"HǛ4U=e8H^$x;aϞY2'WӰ.ie`ㅬB,@3F5 ;Ď&Uh E2chJd G&՝IF8eHڗR%b#8$2(ȨĆsjQHP ̭SĜYCIs1yt߇&<% +k/5&TFfqI ,c9TxS=7ڳs.vЧ N֣iTBFPcTK'{_}F JċjCrQ>Z&t mMAG:tu< ##1aAj V`GMD6^t#mG{E~ Vm1J#vY ѱ@"Ge UC,cJ~T(t Ƹ6wjhJu?A:&13@hq1nBF fZ Fg܏AR`(UpEVWJ9)X~GPɄ5q5vbKLyH-U4?ʞۙ|Mti8 -q!1 mC蛏nD1NZg2R|_W,+;DJ|lfp'rh://J g;Jq7#aû1S,7ߵx\́B)m_'|CĉԳUfWꌑ/0A 2=*_D;:F*Uʓ^CEgU(ՆpB,m]]U:I=3S#'"l.dOoљ-*SęMU5MHCz45a+B{&JMO;%2r=$"Y¨- mATb-RAN" ama3\x8Gx|O5A1K؞} -\>) Y5|vcbTsFjd[|nhP/.AK-(Zj)\:E"$%DToKM$v% =Brt:"*iu @RJ#PPgPޓjbGeTOb 'CƃH2S?ӕ;D]OX]{S#$ݧ$Дlvn\UŌԯ#Q6tNIHsU =:B垧戻:>V1>v#鸍0yw<7Ee=~hNo]s%n ׏Hj5;G)4V";"}F[V!Uϫ kQQdQvHc3|f$"6yqG~PsbXX13}ǔk錎 [Qx6 vɔu]}jY|ZH1AOx -ksXAz* xFMmz2Q9GS0~qyorX1[WъD!81[G -Xf -$ET8h!ڄ^U[c=l.Mvr8Iha[cߏR%/EɽT9 <*@$K;|j 5sA':WvZEGB Ẻ515Ѫ_34 -M!UtԚd /,yQENr W wn.T?+PR21)q&/3,e#C9!=ƳHȗ\mJC$̋{l3?MB^c*PcJMQ l[p%cc)dK=dzۑ{ԣ\}4E(?&'fwTTa(Y\邮 GQ>xg&;ޥ0&@w7&0hRNx=/sE7X" X : 61ny'<\7J)2$f봳l1Sɰ75rBSaULjoWN n0(\e|F0 a<1&I XFՄ늗w1:wxf4wH8)(0#z&FU M  )DzdlsDr?Vx3WLr^lE=m.:4h/ZB*,V5Ga҃!v]&cY)D60˚^bh&3[gt&o fEn#IȹVF=99J{)'ۦ,^Z’ ń*E%+2 MAG=A`xK] -Ǣ4񳠗TƝ ",QPw`dTхEK=ZU7Ďef֚ac/$w%-#DnB9VkkpF]&GPSځ=Xjn&ciҡ|ݘ|/Ѳ@: ǍiǸtM }:kvkԓj;%YԪ -J;)M4O?ix9 -tfHpZ֭ZV{\vbU=źJŰ:ȼvD -G+:^cFQvzUZӏ0_җs 鰚GklӢlhT`MԉD5eYcʂCrj{tr]*R -m6 T Ѣ 4Y-z[ LRMt\nDgR)Ž V31kڣ*Lҩŋh<6g 2Bt/ψH}VRlEPhjehE& 3tH26-Zt] `U0ԙ=QJi/v}D yy)& rۯTew h4b ?~īl1/HK;J#*O%x+ K6 Q&idKfߥS85\ qH i:y>xk{ ApW+3 \}E&:)4,P0KN؆ zIR (t"kU86OW]ujQG*2㨠<U$t2{b ԡ(rԙ "HT&C"'A;q^^LżTERBb'<]ܢTɈֻl~hrs6ҵW16ĄĄ؄mD=iRh5I%XSQs NXEJwm$`)hm_G@%W"eT1Z9g˓#R_#DÅj")S>,[kG,oFH"~ӸxaQ_@=4R B!3\*5,S&-{Mk6wLj uJ 3N]B,V#4V"HfB`>}=UVmf |۩8XӨ}3蚶CQZqm -*"Է7Df"tI!:꤄)Jc+af*LKt[]@m_Kl2┣ nJ("{P{]]p~fMlR5"( &76~E- {9t ?mC6RdԠzңn(RAhvh>'~jbqVdkpv@QF7̂[#lUg [iEyK) ~zh=ZPm. `LctZ~88WP_^O -Q{cO`Ԟ1:BEmN)?ۂ/A`UqV -KєN51z$;GJWӠ@׳FOovJ@kl ]M\`&eħM{QEUgƉOr?k#.i,w5T܈/5aw(ځt*TO--2@ڞCt/$R_;=A%ܳϼ0Tn8-7|{=rJ[SmInU|6=է>C7 a7-2VV#6EhmDZ;%PU,V5k#Vhȇ+<*ܧf qa`ՆK^PExE :"cLy4э7,=Xt6^UPDCmʼ.vcҥ;d,b#kef_iɷnWx%ɽnL]z -ѷ 1 bn:~ef6*Ld C!L5-W7~{0 /5 !MJqug.Nz :]=]WPmɯB./J=F9xk)'lcq{o_|ojWoߧg޾yx~PnN{p5 IgN~xžbFp }=KF456[Yݾ${K92A7:8 $,_Q=rXȘiw`\1bK5&J8 q bak0cJs;u(tX{N@g2x4 W ~,}:EJpS9ǒ/sTq%jI-Q~3OQ@0PG3x/_Ǭi֠0UF?>/b5j>d\oQKax\9vѰ񕽿 >%E37FbshY x>z`؈ t;hhM.J6'݌BJmM1" Pt@Ox7EW6E[%r@Շ*[5P/,׻6H:b -{џ| k èv_X)43pߟ~h.{o2$ڛO/ *H!„ƔPCHhqHdS3bћ742dUuP`ZœT~>5,BeBabl"BbA~B -1a*e5XU lyAwnտ㩾nk`@*Of܈ij|\UwWϾ{7LTx>;D5]&L{:WlV/ت]jMv5xy[ͷYܜOR=ūgw?9Ca_J]$0:R`n$ԯSjn* t z?'~ /ڜI=[\-z<yur-F*Wi~>(Wfa}zݽo_ۻpٹ.^}v}38q8N1^eM{p:i3ЩW{>VNk\ѻُsǹ2[N?wW ~|٤Xq{n}O/`\㜘'.Xy^ji+d0~=6TV笹a8urY>NM#XqP*B-F)Yl*;{Nee|[_8:zer}:y{Ud0+^ 霤y:e{̭,z4_[Qow^;qkMe*޲ѳw&Ak/檹z9Emm 2׀tiuCS4W -]႘$>^l;0?Rc7/{\,sqmw􎍮7v_ -45w\=oK=bev`[/4|Z3B},V~vaqXnC8/^ rei6f~sUβ|`\y`$ziyo{//:Xм׍gn+~m-8l?>HqV>%Gˍs -K*k1j{z_Vf׭g|v1]==lPzF'?6/AC; Za)t!(Be5`R\ыѯ Un~>QչS9S=%լ7xTQh*KyGV FV,j;?Na.KP6i1:#>|RD:2l{`윘?©_s;O3K[ORaQ6ї s2\.n7ݔ7J wukE6DUlljOdw}suras?EY[zy4J(AMܵVWrxٳ?{91)T"@WsbtUVn0Eut#A,܃x-w -_Ul_MN11*mMuN{\ާuF,acx)gïn-FAnvf7m_/6>Z}tN#JYQV,OxY:pZ2Aҁ,Iw wJՃ:x\mzy_i5oYy>MWJDLtO*&`%Untf^hak<Zz,2>9kSH6Zmz0m}2\v8рa|rf-[,6 \0 P,9EAÀZ,MTn -] x ~kᴞZO{vx2`0Imz|/\U:;WwlpwO0W>+ӜÓHz_Pjw}{x=yR{WL˗+0z . ʅ3)W]k城_KZdUٳ -]z'Yo;/??.^+pfwA'Wv[N,grt%' HI=`b*5!޻9=:|Rx?ȃzMݻ u7O -r^l<͆ڶQ:YmxS; -!F` RJr f F|,ֲDAoMwY19f~ nM*u`96еUjo%9H!9dA=/K%{}w`oOj$n2[+6 wy@dEubz񻝻?v^Qx~{w>Z\|__hNKxÃzkk}@U:Nj!s:~,wnݣ3bT^fϊ9>=Oȳ#{l,)hOX9_W/ߗ{[m%w3Ђ\WДn Qjnڧ @%y -|#Q)33r|x?Y9}[f|t_G^Pk)(6@iWdSvGo @-i F~YK8 ٝ# -ͅ}Ԙ==,V[ֶ+V\r @V ( r5P^lAvE.u^uU\nݧYt+9>u\]M[id-Z, 8 aUur[޺P^m9ػe{%hE0p:ӞkШ{V8m6wrr%gN9~u埻G -F~|z_ g 8$_Wg[{To?|x; K]9:`,AZwyLЯNZN靂 k{z|]2ˈq(Ԗz@CUW8z'`tt[3:kizAx[ˠqS\4Wy 2yzdf,p#i6˰ aewR/n"_+WAeS^6Jj `ۘ>osb -:03N4>:؀i o3rV!\ -d 4r 01-n`w߽~݆U~TdJ,>@ fXJymA6&]}v,է[֦W{ؠ\]n;|=8|W_`mrk7SE;p`ϋUo{rQu!ƷóT{p{'@tۇ^J*9\e -{_&mP -h.<,^c~)Quͽp:\0Z춶|-gO ^~p`Xm÷ V|ҁvGu@D4s4[E-pt:60Tkf4^l-1m VY,o*^sz:Z @˫7AL`t2~_.7i>~ Y,e"H,<Ͳ׭C,w]6{=Bq:YC^etoiif익@nQmtI C{*UF -aY>?j68 ȦM!k{q;2-`\tv_7f׃ѹ; 7a,Ļ7..=7ҕh᷃xp\>-op`ȿ>JDt`Ģ0= -ls56 Nk?s0ea<)zvnm4cjpAʕjFNP>ʇ|zmUo߅?Q:b&(x\n$(_ -ArNˬcd.+-r|b )0a"+xsSS͇\p.@&ն̳崀><(VSNl`=A25b}h*T%r -ÝovJ/-|8_8]VycY+g"vpV̜߭ǙFBLb~k<zm;եuPk5淫w79pi60htޝ\}3~|t\}9wݗ6vxVl_%ͯs}$dޚ߷/@?ݟm`>pxz꟎YΟuoݟo|3[o18{rs"Un] 4zU?k9@bcqT=S irl3# @eBuN%P(O2^-pҋ='ܖr\  UkufA}C@G*2||u{ AqpSP*4`RwN~-nkO'`^޵t=^tUv`Ih;@~ut"}57pK@wB\l&;]|[`T1/Xl}4VbՋ0d|29^$Xu&ي`7?_mBp:Z}XX]Ū9 J}O+#t7?sѣT^s7v )>Ta|n_$h>v*9hϧ6ݴ* lrp>:|V,շ˝d v"Xњd4>MBV ')u؞<YO2OSn39) $2tR`zV$N~GQ:\/zxuDb" ztj3: ΦG_WnX]qcr} L%gvQnvw_àsN6(9nMgyж4{Y9VoW׿]q; fh{MNs1yQju>4oia`L'YŶe.sdʥ:SzH[k۠%u{^u9{r[L0oY7Έ:V6KjOlqcU!bЫ@XYV pqK*94 H6vbտ| XLd*v>IZlYbdIMYILQ5| id5d(acED(e8*K7O8c|r"#Ķʽbe^h~nT-Uq8;-іG^edoiyGo2VeЏPu@n+;0+`7Jӫ nZשS=+a^nu.-NcrwM6ՊGoݱ۾C WWuz^K|ԗ0&~mQ{a`kekwV_\m,_±%@l,i/.XkzƯ+K~ fb,4KzA64L0wGU{{[EQLZk5<}v T zFjuE(/Y8 g .x$~hO - -N΃{Be7UM7z @;t@m+ei$\0B_vf8֋~uV - a[Kۍ V쀨IZZnZ"f`ڔ,d##rs!;:ë-$Gp5ضT C8:"/b^\WG | -9y9o.AVlI~(wo_'<l'E=`/ة\ .5?|{~ ,!C > +ث`nN.2 ?uc|)gUn{Rm f4s $X{v3:~(6 31D[iVjo?K8?O7sLAZ,k(ʝ<r1}Pm\]1*s_?/TwAYof@0׳d,Wn>JpSSN bm@5Y9F499n@ -bN`?r|(6^N?>cL!| Ъp];bD=9&ùaOg #S ke FwiC2 Rz$=z#9k0j;6L8*蝶^5^4\"DY U )\e ,0eiU:F$ P -b,4> 0[d˽ꠧ6K-gl-+l5Yl=MWldFp,@"fӵ'`$ưՃriVd@fP9<;&h-n-4L/W77-8I -leLЫnmdT1(St1*lL%>H*G{ wpx^^ r}uNVNpf'}myT H}0oU`IZ3k;u1|Y韴fu}zuY;O183u7y(F9u46}zW l  B XK$]8ViXW5'w`VTG,] =jo닻/u0 Amdy>/+0$g9$Xq*|m -N[ݩNr^k+_+9`LpA4Z\o~KdJy_u. p]q};ZAd1bd'`9毂\RZŸ9OANT1 L}x7bm6>8ap|]?z寜yyPn+K8jkk+'wƆ` AaIk~}%F7rt:'ؽus񬄶 -d:LH[LbO grx|Q];t7#F^8 8u{;9oȽr!L-5 -YmqW Ϸ1r.ӛmbnlTsyԘ1jim'k`~@}9p؁I&.sPÍBo6_f I' -^׀ơ[pdGB Uwahy4Y,6 Usl- ث kϮM{xmݻĶh@$@`{mzi$$Yd[e]e;v7Nu=8uݽsKsxF,_yާ^e)AŀLxԄKI6*eF@G̈1s-l$)׽Rn LnREG@iӆMTD -L╍xH:O#VmLa$bZD8ng̴CPk$^37zc:T5tP7-3и+0h0=-t0= <`l& f [}GgM%6z4d!bN&KEPRTR ;؜Ax:,cDadԸKrpGnO "=}Vfg] -b0)4T㲳t9(J ָ%7AX#7BBALأB,{Zx|jPɈǼRM)5k T }@Je UVյBnY;1RCV#hi-[DCuLTܑ*H3N0;èA)\ ^ۿD-xx-oqT*C5Ow\]B9L0OmjI>V\F [- -̙`fWNDB*5.HWBՓ^eDE'yCecRe+W -kDS5(m$D:vg01`ƁbX6_O7N +i -xP\bS`ATF!c ٗlp v&ݷkS} 9+W`nn\N6dml װp](,`<6-L]J*]Re isW'OS"Zvr+7m}qg HPkDfRr҈)zO#Qtѱvc.PUk̬P^*k66Ae_'=b&d:""59(_+bnr'n"XGzvO9;gZ<&̴OsjT DeH0znSg8 7윅R!Y)("[5O57;Xc\s7yMp)2>I'CDoO,-ƛkgy^*:gVׯ%gM>7ỏ9O ly\f|ynkL|21= -!I/\[Bm[(.^/j츛0$L TcM19 nC|#[rsplc`Rt'3Sg64^XdKM {J@;/><5rnj&fJm0_\8|}+Ņ;o=/a]SKɩx{z5A-|!\i:+E#6_^rl?&N]zz#ڙL+ն|IX];y{+ _|e]@y#@r*JϞWڧ×(v(AHWCDs+LWJ38)bX\^#c5v5 Dk |q)5s.ئS3T]cfiJm pu5қ?MRrqcWors;u/o+kfv;+Փg\*\YB0v۷2WəZʱa-N *|AKKr.ZTH7\3s<^&g΁PSFDK5 *1QHuh=;u8/-9ΨSמElyBdpD@5.9eEǚjmm`fCRß]N]K#vF+K`23g 7;bB -٥+vX3yˤllab4?mTLU]H۟Sjۼک*6i.6ie*TVKƪ3 @QG0TZ23kZ廻@V:O jԖц#"m{Ie es3t0P}̂oU[(tbõ~  H<$H /9 j4vJcp fӺPtK5N2ZF,B `o іTX`M,"U:%#@fގwwJEMA9ݜ?c퓤0 - B#xl=a!@M/f&&`Fͥzg2*\?d$'zא f{^b?Ȥzz c :c aMh%ZOv'<#p@݌ndj\ WH]VmTXf WjuNXO:I 91cRZ-\HNHeDbW읂E>=O+-:F"4 ON:LO\du/&l \գ2߻:-^:JS[:4`@6R6? -ވ 띁yPpzaR'`l[ ?3=a*=2У8Oh0GK5d/TKґa$@Ԁ`nCLY|1sRQ/t3PK[x=X-%ZsKgr3ũpeR'JB`=#y,T(+۰#{7TJ&OFD-ȀD0xe:A ;5\L aTjς f -endstream endobj 155 0 obj <>stream -H - c%n6TJFY31_6H C省IUۅ/ܜ s7A@b -\%y3"8lTHmc 0pF -q&TX åOS=!;N:dRh ctzOAJ\e-'4b+{9=uM3,r%!V"t(˗!TF<^)PJgF?٠ԚGI M.VTLeJ5!9{,hmɧ֝B( e" hMʧu(K(pu4w63yB)ϑ(+y.R_ "ekڽ64W/R-.k7̄Nb<.9y"a azLFHth㤕I:r -T+ʣlȠ- ZGuC :R" "RRꘝgʲ?3dȥdcFDPF01?chxL \"Oi`JCP驃lo_.؂ ruN~ZejfK1!Ox,nH99@sGcvc\2a4 khB+?""CFSΡ eF^ j6L6̺ҘVSB{.Lq6n6q3a w3NR$T Va52b凛r\b2zˁ -b. nFq2q_=Eg,L rǤLTOp*_s`(dnEs1Gv]1;x - *^@$gVktbtW{6R XvZ -i09IG{&WYIe+#*˺T`R#Fd<>CGuIiH - VB߽<$G-QQ#ccafJ622l~} U:+3JuWx+V*>6x$;KwΖ.10`GYUt!x*"uk- J09=㡉o7Ե'R),#ܐ;0x֘1aⶔYV?./4zK;sg_<⓯֏~ѧ/~tp&Gԍ>7Z|+SʷSKkg/_}?yG.8q}Oy_7ߙZߟ8`BF(HG+cBdۜ]^^?sz[Ͻwc[W<3W~{6 -r(U#E%.+;ɹzsuo~|o~SR3:kt<,ʲ 8/MgTFj3sW~O\|ੳbe;hpq,))bDEf\8z^~Wo5OYwv ı`&lHd{#J=rgx]yWy_Cki}n:L+`b'tU -d3\۹И[߿sW{/ 1FAu&_33#z4O8q7n=ko׿ ~/w|x7V3/&7Y$˖{s Νy'}ٗ_{ݟ}?___o@W?ů>\~j3ha:qVTRrkzen[{Wy_x'G^o|'?/G{uI_|Yd:uݷn<̍~ǟO~׿oϾwl\˩Bs~ri{uy;??/>?j/?)QoPRw2*-c?zۯןo{ݏ~'/>|/} 7¹„4VcBX%Lcj}ą7/ß7o}/>GzJG~6ϐhGH)U+KsWx_^~?􋯾o?ǿ_Ͻ?xG?y[W,ɶW(1#ūR7SڕKݷG~_}[?,:)e!Aqtޙ]ڿq׮[?ݻ|֏~/>?O>~r+\pqqr*W-o8~W_䣯~+Qh/oz_~}~~g_O_~'~|'\`LcPFq|(VZؼvo?}w~Ͽ?W/+<ϻ?O{|l۹KcT 65FąΙn=o[Λ?//?+.Dmr;['ҹ$Ĩūn>pΫϝNSpEXf̀ BO%Jj/o.nf{'7ݸp}._9ֹK9VIbKP`'M]Iq;wέ&ljmu{[?7|ɧK/?MOq&uAtE%;3TnwgN~;};?~;o/=CkmcИaA>25Ȩ [4'zW^{^{xO/ΝX[,jjè1Mf/"y`D%+5ϝ>#>S}_}_~_詧;x&S[#3莍ڏ;hP!9L-,n:};/_z׵o+ ??ʷq}gk'*;}E܌Q4rƁP!%sڭ}ҕ=ݸ<Ѓg,,WHecͯ/.ƈZd,QXYټ|_{O=#g˗_ZK*_Ŏqh-.r6isu\>}t҄iu`v1.,xnXVf99i#FDQ_^)AFTc%D؂И~趣" )%{{ayMx4M2noeWm^zԄ ]L hQ31n%P&l9PEA -E՘HJuj!(+HRg3l.el -$i@?aRǦ|-)%$!i~qZͧӱj.v3 +*ashv|<0f16a}&JY 91i qqhߨthh1 ōr,72!Ӂt 3 &vod`>|tLԶ#3rx*irPCQk<ݳbۆ,zl+R%[>0h#ΌF'kB$[R~I{dqx|dxt<0a1V=vQF3AٌQ?o+:D}p7Rq¢Z<4j;2j@ir fLHꂛMFsK4`1C?9)ܨŧsLX+5Үū8v6L7jn@p!O寏T`@eVN_<;#V3H Zޣ81;7X0ǎ}cqpј\TvFc |srt9F4w+E'MH\ zRDOSJ[.|eXECc#UorbCv#c`1l}DFd*"4-*qryLCG5 %??t1;3c2Ivh1qF|#q (+i,TrsV\ etKZτh gB5^&)%ޡ!Ӑ5{yqy:: Jf:젭xȎqbRFTDP' ׀uulG nIJ&LcBQM7wvV6_k$B_O.X}+A/2b}b L -y74(z#4d\WRvBUp:Qt#չh qd>uYN.\$,JJפtаiX2:^hp0HR.۩ȡ1Qk؄_ *02¥HߔJ(N2WjBrRk 9 ۾9nvh ԎϐRAA4΀NzRSYZ2{BC|؀è\DhP84F)M\(XcȈ^Whl4NG\|S8;64yc02|l9a06U)01;l%* w v8_#Ŗ%)@fX##3suR- 2x {a=?ʸTSS0 KR|`6cް !\J],*lR ٿo.;>/=lBNtA)6\4cqtmrON}B!V] ',ۛHs+TpyW ^n.qyBIHy#Th6^RXEbDw']4hl YI/JH%R,*Kg˨=/!\.m~'+T 3=Crv$dgAwQ~ 7B_̑Z'h,NA#B%`r+Ԗ_16nWҀAVRsifH}n07OD.jՕ+ן-->NWܔ 糭Uu 50ɍQWnmL875h1aKʬ(=1 VPJuB⌘."<Û\>͜2``*R[u#) .ࡼcٙ#sG-$gQt1 (-ϯ)䕊n6T Ěܢ3#'AX|#$5DС I:F} -| 9̻+=.mB=4bq3.l$X8P(w@Lk}xX:>l;n"4]4?juG^Kˡrmٻ ěH0o%2wKSg戋кL *P(p{)1)۩(7ԔX^\voA8\*JVknG[\fΈ>)ϩ!}F/`Ps͛~ \3:8lPfZ'\./X1JʁDv=m\z"?w#@V)2vҐi~-`Fm  -66A\L̀xhkOO,-^X -/ K`5-xX@N.,iAISd0uoz]b-n -M S&T ccLcg_i&x1;3z  -FxW -T u;D Q }a"oWo8ӛ*-˹ۆ G.Jxs'5uZ-srnC-kj{<p1fOɘ-N  =v2 ȓ/ؘ4.OG,l.E$Ld:h}|2wVjJuvӝ *9##(kEK: %:>IE:H+֎q#iP0E|v>?'/l]T2fcL*;ꁭΝ;i>a==*&b lqAՑ/BEV)<[mIi63` (V';Ԉ%OQ+=qxe~7 -%*1 Mx䈆 a;@o?5e%HhvFA` -BiI/I9o:,`2a'AlY[CۇXHq}z\C""'#5:ZLs8% +m:^sb*b1rف/2#O&养-@/@ 9j4NbDm;ɐJsk ,{hMvH|jދ>IY2Q*"jwP_j5l?B%$\`!AQ&.4\u2IJ\%L_4L p=0σnuVߎHZIBv>T\*̜Z=Pg.D8HEh; #&/BG 7c.="ɥxXj|V@kݽ+w'\!y%)- -T9M1gȨsNGn3&DZcʥ'u0#6iHT2\bMJK=vb&B Hҁv\wxti@끪{op -.ސƂ{, 8o''Q>/AR+ZpoeOΫFTiRxh bl̞ͤ0"Ա ; O!O13+8q!1^zfp SkY?L9 W6)uI%o03l"!Ⱦy@$NACy{?_q\cpl#c=TƄ -Wi`qmp¤y66 J^4b6j}:f1>w-lt3Zs1с:\*uNBѹXp $;Q# Јuuӑq ѿ?P{RmT,yBl|g[6hq%ƨR"Bȍ1p۰sHkK~8-E\*)`CNNF@xa&Z&;|1a쿻w^>yw %{ʦXL]al{|,p] C@B=X{Y/i7rk~A̜Zŧ3 }x!VJfw|rEO8b$!ZaƊ1R2X]8@,;2jڶҶ;u/0.iw:z'ھk=r}Ēl\fp1 7`էlD l6xKT7w.nDxi"Wr0?ZKWOG%Xؾ.q,fp dǭ%ˋFA62!U"<<8 6Rw6GMJ(:S;;}_ϷV'/)+hAXqnr<8TZi@P^M_n+zK_A7l`-\U׷/=~i"ҽce 5E@q>MQ2atjJ A23-G: SgpU^O Hs'[$b-<\ʵv6北+3LX@b5xD?hQ erF|﮲zqrTe4ܲI^)Ϯm%#T\t&$D:*!\ÃzFm~ਙ1zAyX'bP 凞yp+ MJ+Sy:\*tbrc뎡't 51h8z'9+xc$}&7*+{﫫{ :ЊHICII3ݙ]}obDQ,y~2kOׇH4s^:"͈⠢V2Lpy]l&rw+Y]@zzQ0zܙ ȴ |t:@dLH+HA-ʙ>3|)\L:[}^" QݬD$%لI vUaz F;ZzVNxiJKDaX)Sdhg()gp[6 ٜuQ;}sg-`;c`)Z])mHeX*hÙ-)1FG[9sO)~> F,qȴlOK<Â"$BK^,YHűhKklÆBU PEQS\;v֍1?686G-IfwjV]x-!bBJ9!Jͮ^s3bC6$cvŠ'v|0\g=#F*@s`O鹍۹ήձH->s!; mvVjk!.fyJFi_04 {~tf^G3' 9 ;4 X1"傅I+zzeV1oޠM90PGN``'@"D잻1m^:I*P:%<0i7CJX gLbҊ)@3h0P*ӓq+IY7qD.ԋ7HankzY=h]/-^V˨Lh.TvѠvL!bke;6pB*\]{i[7_;y4IDJ~鞐`b*ڍ6D`cV :mG|i_pP.N;_u~b6f$HlZV{_Х\~ al"Xu婓 Xaщ.L.He\߸F>:'DN%(jM bB!.TA@|| УN;ii&/:qP!ft :@Jq%JX1tJ3v40<3)gޣԽj!&(o'ΚFL`,إLm1lO[FN"HS+lJۛ=Ң%}16[f'/[F;<5\FI9꾛`rOuӝb?Y]|sw_ Hʅj}zT]U:Z%k'u簟XtImABn F݁1w9kgə%15 ΝRo -Kjbm+9ȶ/>3>d5DxKg`>ȵ1bvLN)0~rcĤL'E!c›8+;fkF.U^LV漜 )Z3 @-Z}*LFb{Ĩch0'1X@J$*z$,1V#UJF~!b?]Y} -'L)+"GJT$0V/?s˾@AgW~_3Sv -;KQJ -pn.3j4AN4m( #lN%AIR0>3bDט{a]pOǂΕ㷧ݔ r6@Gʃރ7>+vsCԺah!E+~թ#&tAaX6y|Aj VWr.n&"uRtcҒj0mXAj^qBҚv2f.IG&ځy"(lOt +{kWV.¹75X0`K>>ͪ3n˴vk|MGP;YL*X1 -#2u`3^Tmf7_Lە}"X0QASN -AAzg P{&cg$.ޱSQu706@dŝI1:I!iB耿!BgBy9ݩw^\xYȠQa6BdofIF1)֎T'Ph#<$ƌ~@=>J=mDNy.|LۄRu7!|mxpRyՁVbWŬKbA9(U&D)CA[4ho7R„2hQʔ>:oݰ! #bANKݕ\=yiv_4Y$Ͷ -snu'HSՅ͕KVB!鈉:.$k+_ڼ.Hc(T\`izq9RZ6) cl曅V(tLc.vL R}mŚ"I?tSPXM.̉>v`Gőo|L81 k3; /H[v:Em5HLZã3{&l5( |,(|&7 ɞ6bS -AJk+W_[|kB4N7lJ^. j'̔1:9rCD~ ho4X=IZŧLDDm:a>kĀOwκ^֎vB Q*Zֽu/;zx*%2{< *w0sؿl^aҊ??\9fEj'CDqt$Qk7x}#;sjm1.L؉t%Sl_}6z)AˠXѰyؘSnFHq z' #֋ GO֖.GRJ4|o/=̀]d$9l'G9>3#2PA* '{b -;9;D3PnӋo5Z5vK@MjZe h ۳I+ڰPivzVA%@ -ꅞ RĚ wW7./˯ 'JT•}03+bZc+a[G}1vu{Ksw㍍du鋯~nL%&԰u%@7N` &\'Gm:a85 i'ttj@FxIFljP^+΃#hstu}\^n2ɞoxVrR*$cxhva;=S@)mENfyF+-Ks㍫t6oZۈVs1qkNL1ϛj5=W*,r~9@A 'a)PO. -T:f܌th#\$jK|szg:^]++^ %kD[:lekpQ+⥅)J94@`G -sn>,Ō[Pս[^yK^>[-nIcFap Ѿ*$z9iK)2 -*vRaa-&G:^h{>6˸V@HuLhτg-ixHBt'$aM$% >\NT`pqaDn2 s13k_>~e{媏MYT,}Mp01섃S/Lz͘ڑ0" GUL矮x|ӭޭw nX.V&WꖔYٻ|P7:8Ԩ}~vjt2 -Q^&"T ݽ;o*^'n: w"-;t XOS9.i-ꤛq _ o 3Hܥu@jRsgG++\aULtV0ᜋQP`(P1DqN7b,64lC55OV@91Q8T„KjsV]sQKK궘LyQ+Aգ+3Ef/ac3Zy#ݻo\Wކ { `yu+0WHt١@klXp04"T )nvDǁ~߾}p -*W`!hM?9S'F xPC9kp?mgG 0N"6\rԫ|փP1ĚN{+UN+zŭ7^^-f{W8zWA􇭍l,,.$; R…\rU&/4ʑVw\U]'ͫŋ >o%ZHirՀFBraȢ -7rVaY ̶pq?pHux==s׀UTs𾔟S ΃pkNБ ٵ.Bv9!tba؈kS~ tEV8hp0Ji'buγHa`SLȴD,2Iqb1頜X6"L|8sõ͹/W/~88 =}pnBĜӧ݀=E_tm!8i."xg>ŌIVogg/GLЁO)-t@֜1@)J qb.^}csF(P6f\u<:%jX;hy!V˴6zf@<<mŌWfpe(4vHbrʁZs@Xv兣٥ۋdͯQkunڸ\y!p K^7w -+~e%)< L%Pq5Xp;kZmtru+^|TLk{Wtqqኒ`NRk`uE9 ND*kr ̰F(e;&M8a7'+Tq Ug-"%>9UH( \څgYEGapؤU  Hj^:d)7`jZk7Hǁ;xpƚM;H`dk~0w$Bf -h{!|tr@}é؄Scg'&,S}I{brRV;#1 v>Z1`q1TZ#- -Ps?Y:WHe+TTH -hc/fC5:X:k(8@~&fr NrctJ+*t{tqnQnfw“GW쿘jѲhfj[_._mI.+Gswؿ海Gkk٭OL7V_v|ۯ}_諝K/ҒR\2 ncOBI - Y,.ܒs)u(%EZ,o3Ij|hx0-D -bi\biv frs>i}<=TV+fqฃAlE( @Rr;3{MthЊvl؅IV!\N*p*@iں.a$CUT`ԳzŊ,\ȒB~6UG50 \)J6҆ƽ J}TMh.\XhF>a& -9nen::\1GLDsEED)JJI,@bF/,ji%E ~N1LPzvucn̔@ RCh`j>]{A 9Yk\ -X`r\&u9тxj"" tV˱rԗ-$jkrn..[z\oo?m. bc`s.?~Ko^yYٻz֕ǍoV׏{Ǎ+|Xሔ#-~_F4-%=~_͐b"R~kv-\|VYl;~y4m -6+˗N^pS7_ɶ7'<)Xu/n{d{Wt h=FE𓄒IB7+K. -.0u3w,~ }"Xbr#By@C& `O&tFp qГӰsn 72=.f"M_$S.M1%*,mEUZM3 >^¼$G~s 6pNr҂ZIVL.̔šF,Ĥp>ko(dd3R]B+1I`1jtc@ 0.o;ÞWo!JȬ bZ5T ZdÎ[QX}MɐTIƋ\b(o̗rybe!*t{z`ٽqQ.D&*;7eX7Fo݇qeeQ&eSڛݺ=H)jHRi_<|1Zch XH61nn\{?\Z[;ބGd3H`ufx? -7l[ "@Nw揞{M19hiĄ τq TJ˭=; rZ2Klr fWϿvdȍ/}j eK^*A [߹yV:eMύz,(dcdrN=B:p)%8??wr{~~ZڜrSNXY2H|EJp "t-=v - 48⭨j%@"RHyVcl|J\)aLNryޝ)2m9ma fq.d"fpgM[NDSЁ0Y|K yi b`v+[+ -, fR`C2Ǭ!i CPBBMHeV^|{F姵Tw3ӱpaω偔yI͉(԰WtĄ}MK`n 70!LWm7M_I.@a>G w+(S/2JaچOj,:~~ĄoO#\*[Zq%ʼ/n=zgʂuM;9`aa> 8]K5Dtx^cY 3:HC=\WK^6iБb?X`fÌIV8%#ٖOڼ\q%gq0XxmQ.F+.? -a]W0*!~8#fbBYvtd^s,$#Tq"|MO/taORpr;+]߭,_z/Tȍ^wc V#Ռlȉ*x9Ϋ R^abxAyHu -{壼?3ijIjT깭8-RU-d슏]~A9WE?| -q!%IIom]]!EHrӋM6I3 AUY!`!.#De!ZY -r/fp)T9RbuW2gÅMeg0)F;k99r~&E!b,"@umHIF1D)E:;g ^`HT pyU]~х(~*vcT);T8݃Y -ol:.tbTvN=q:na줝|aǛ ʳ;y(Ȉ Lش{d6m Lv|vBJ(yNJ{>e<1xa56LP*q+ȲjL WMϝ:!7΅2Y=-l1( ťH F}lG(p -T%ÔPbTOd[7T#)wQ3jvvHi!TC:ASVƒJ8-&3 ^| q xhSnގG1@+D*NDkj05,K ]$†Q^>Yv<ovc!Gۼ40`\P ~^o亜^cM ldnP ZbĨei+lqN17, G&Tĸ0 -P%?!:|d A4*m`| 6ãcg,gGSf"F뜔%,l@X}ʂZ Pwx9ѧDČ frcO&,<z"dBюM3.^X$ 4Ƙ`)wV|02l&˹ 擨TI`8$}{K;#,sFvE QAM( #7/[ v1(48IRq^eP4+()3*Ω^)N{Q IUa8bZ)Rq ٽ#e`WL^ 9|?'VDub@"`(l> e#'y_VNZ~Ҏ0防B#t S6I8DbLvߔ\7bo06ׂ.P S*X'u0zM7H:(~Lclnhskʎ'_6{TCvj{Ƨ,g',GL*&EP]0.FPl#Sim.̘=?iQT GI&(%gh^@H| _0p<14Py`qtNa]1 gq۸gIvztow1w!'k0)t2\n7s 'ӥF0FJHOZjjc48)䒳J2;ǭ/BJ(cTdaa yv~v҂<ò*xeY4v}H w7֛JR p_2)$(iQx5؞)D"W4g`X_)'[%P1*0#^2B8&BRE~*%ՙo>{|ѽgf.`\ -fc\惽FdoS~zs'<>㯾Ͽ\RxÜ w$D&S@1Lk\wzfyuֹk={pRQ(9:a ˜s҄:miN&W٠̋ $ٴEN1.7^An;O.~֍ms߼>~ڣ kK3X f5Mcnsh;/ [".nk?>;Kk|۹D5[-SfJ0R jv?w_\}ӛw,{~|v_~ǷVm5b^V\)amFYlHUS\36$ 7W<skc}Hdq"X8=i{ԈdވKPY{=+j['w^ypw_/{\!237Zܟ:f%"Pa|;lڭv_>}vw~?O?i4&6qԍ߼}9Z)lÅ 3;yr7#z1>X`0,$Ve/i>?~ow~յ~>4#Z"/j\=pW=|'|Փ߽/o[/]]F bye?}ꏿ{w_\ן?O'ޥB!<tKBU߽WV>~e?}_>g>?[[?xJ' --#f#ddUSQg;[*>\O[>?W>o/U;XFz^+ŭ;?{Ηvڧ^/tt)vbvĄlhG;obGgwggO^ѕ{ז]-ͅjq2@QGAB4KaG3[_.~ō+W_?xӗ_H߯A㣼3B^Zx;bӧ?OO?޼tQn?Q[`ypF}_ޥ{O_w}omuVh}(/i)V14 s7Kw?|m~/mW:oʥB)e9  ذl4Fܞ/.߸;G˷/~>گ][-B4CRb^k4'J\R2/H+xq'Oo.\ݬ.fkZqA qmgib#Irz7^uSev$tKr2T]Uu$HirJs:?KV疫\lgdDWy@=šlҏI6i!LэlfS%ӹFL;짯m 0 @XMNfLF a7Crx!e&"P JdB ݋n !뀜icn1t0[mai\Z.嶻饢\ -sٜSyrB2.]h;''^[@RInP=V R('3+(x  e@@)򙄖hIYAIdw 2d >2$l~#ὼ\"]<.RiU3OS9܄KY=Ԥ `n*ʯhUTLq,a qĀ4^_hվ9(6vr8"Tkt*(7OZ -(qU`1m$K|`5eP=Fm?kZ C)$3mjl2&h9kjYE|0 -Q;gctByO1l[>8YR0J$Jl-ɲ_`bz=n&hש@fy]~0ASV8s 1#t26K1Bn=/fc!Ҥp a2 R:Cr,+ˁ0'4>5paMMY, E{EM)bH $M&x‚rvu(%{bU'Yԣ qa/.R^wOM&,jy>Ǖ$))[#ڄOvsI^6iT/BhN[A&!\*MI77=zU7p1bQ nR2q\-S -D[)9A .:aEv,dE4wQOt -l0GJIV+3J#QTc59؅-6\zI0y~9q iY'$#L 6„FĢT%}a8-=L|swIFL{|r@L i)VLsa8P]%7GuXuT VEh-DPDnCeJ.&fP-潁l;n.>bM~ v\iTpz \)vHkK\kŒOZdԂ.jEpJf7gple;U9 1 hrVdd&>ǎY`+pQBRa>63xEg|I`i8 =kD8}xrØ_)zO*UlEE@jO#9Xؠ1&fV_06 hAC.2iCV$$mHhB6L -u<5$}܄ z3U;Y!KL5BbKQ> `5{loɐ[H:Av ۹G[ÇmsrgĤQ/g@4D's֡o6VC569`S>`yG%.3!ґ\6lAb`pA-*Bn껑ꦚ_r s;q*z稼vbu^}]dl2!ŦBսdrbrbsN)5_ up>wЪ, hbzV:mY$`1cE+")lG*rv2.܂rjRʽ!;dB/W IDZ"f ^m\) =:2WCPqu%RZ6- 36Ί2$ZP'E26CDg`+ÅP.. GETk1y$11*2W] ,e'O@!b<{f_p ; -M)5a#w@;mB$i'0:mgnT@mDJFT j@ }j-,рW_Lo+=/q3Qx~<X,qE.,6ꆓR)6\Ho$ tNJd˧bvd7)m,]/3!s>fBʖN&cb.g֤.X[9|тj-S… ^ǃK/?Xe匝5"ҍ7nr# W:MFťltO~(e .W@Q+봝)heօo|,hV$N*iu+S+Noin&Jiæ}\ - -XC璝K{W23%Z B%6ޤ#52RKI!Z k_u.E\Bd'S=2!b@X 6[`"ŹdT1Y>M^(n9i Em#HienoŚ[n62.Y;{VivkQ{DDڤV.Z-d\|gz$ɲ4X3]]ʵVfZkZTUU]]{z`9]Dzg qnns>n~WV9'fl-Mq{#s{9'/}7Pιwgߐk ݿmΟf --VnYAjkj -ZA)UkKN֧%1Wʾ={zoDׇŋ S0XۗglЯz;Zݫ_c'v };xÿxDݿWjV9)]]v3Jα=/{@jlzM8 -Vn3f9>x4A_5Iz:)K>Y9,͂nϺ_|V]ŗU_W;=B6Tj{̉k@qԻ{oX=@V|=UnceƜlN̛=97}t iM٫0Έ4zO~W3u>C}/~oRL$ٷ:_ΛofKTRFs'?^) -cr\_kA#HEe|Qގ$?.&"Hs$ON_Eypݢ܄LuPݨcܹٿ-^B-VMurHl._<ѫc<c8<:E&7j7{k;o/'!zz>|Ycrwz6jgOγR}1;Ϲ_Ջߵߩ}X5ڛK}ȁڻymtp' +gZ?o}?<ۻ|ٓ݊̚zn\uOpŷ6 o+5/{O}=+6hK}TZTEm7{߂S]A[/j{_?URmރ[ -Nޕ'f,mvnݻwڜ___dhO/Y1y|q(O1:ɓfWs{ϘQJTytWrݷ[= m|ٓ-+Ns/+f|e[qf}wuhw29by;zB#6g7^4R[}^yLJ)W&1y!=ڗ3}IcLi_>zNL6*kxIE2Ef0yyG%}+$mqIe_[+coHb{tN`7SGv -z/w^uxk}T}oX1-K_H[voQ! Eعl(Z~O_+yգ0`R|7?d>Z*jcLudNioY| 9k0a݅ڊ-/Pc[nOo~!7 eIHwMosPҤ^u&SFԝ=k9_u()MZ8j*"v"ڐ&LyV*vk!T -)UIeTA~{џ*j{R21{΋_:u isUI.hWyAʺ#;عͬc=WVg*`(k$Pm{p99ZWiknVA $Y!ھ7q̳-HD#Tn:XY{:{0'-WYdX>G ?Ǖ:!q ׍5`T[{oYmĊ]*Yc/z_Lv~, Y˟o~}@4R񒙥8fTj G&Sڡ7{NydI{h\W:} vLiH;Gvtz'_qr;$5FvQmIZCot 4{};'Bj{ġ朿/)gYTziY=Ɨ9 -L#`xu4&Vo@fCwp a}IiBLb^j VchJ|H IkHˈ[.V9Ik͕ՆɃޚڇᒔgTl$q2&Rb|8($rEMN~/6/R({)*)Jb&"@]h\IΠ28&zQps|QbucTsXMOUv#Dķ@Iս"W~ Wx"h!T}a '/1lȨNEpN39 gtWjaوY‚:Іi}0<0f6 -PșaZ@4C›<2uFO"'l5\[s}+} mto:iT͉~^^}/u3&ԝ=/-,2;/=:~mvǁ0( t._haf{~iv(]H*ڙ)ck3͒ƀ,Mc?#6Q٭V]E "HQ;E}۰{=Ph{RT݀#gq 2]Fա{aYK*Ԛ 62Bwʐ)$ v$03I:Bg9L*xpA>$ vя;zg~jӛ?ڧD3ʰY9|-])LaMGef,%,p"YwmeXQΈc 97ڧy(Jrm>VcyWC&`ܠ"ơؐ1aG .M\0x= >Pf2ѬDM'P1g E}]ޢ4)V N[Q"I 8TJaZWFeO\˴3ꄒ_uO u'ˈ$fƁ;gsT'TH!%x#3_ξ)?7;WEFe2S;= :m}gtigyfO|(uQy^o/ߋzLLy9\?,=)88/hc*UvA$p ,VTlGrܙVfYUYPt\#RAX8wxäh SvMf1JR0GSϛ4amlƝ~y;Gg - 7֩9j{Y^óP}bWT -%U7?/7TQZ, -{/iqBp^yBbdCjm<9d/i6iCisaM z9y;s9N?Y

`/T6CyĘ>^>j3b z1;i͕W_$\`AI֧Weu-Xڕ% Ak5J*wx)sLiP,[TI*ysyU)lH5=Xs  #NishNb -*5ցMym.0kZL< UYa 8;[9'Puqi -P,yKjJ'C#^cppiF)Di-^DnΒtWpF*cDrzIn1f@sgpWW;=eQIܖ*+`ZOPY$\JfHvf`3CEΫy#9Qb24CbD<'.^݃};A](1ǔS2B)ѫ{,VzcJ,U<JCE}E!gBy5KE׺kb8I2f7>)pɎNQl32õ@1=^RN>IP?MDiNBu4pu?דWh>RI2I R4A"|N ->F[Ƭ5IFT\p+ =TE\T-rG]$؄MiQ r; ބ = "%p + \j *U@%7;7JiM cX3{@ sGgA^M_h-ZƉV?N!:κɄ+ -:+4emfߓd+Jh ˻"_@ p*%\0֎Xg ҨfrՒz)ɛYQ=Cś-~hAaZ<%CUfej֢4 r )Tdʸ=C(H$8Z܌[)/v P(Btkqv3%6r7 -?B­8J$Dtg[n;+*#n&;[^k| -~+.]In(a[OJ#uĹ"_N|原LZi{dQIB 뀵!vI(apA ɂ* Eǘc|yzZTcZ?/(mf$zǐlyń`7N}*"!@\nQ"઴.QBkYu/%Z?ݭ6G5WxI:c8*I@lJ 4RYoOn^\9rNtQT_1c9o̐^׳79=Ԛ"(/(fcos` -PF-_ -6`XQbɣPF -2Mȷʹ(e8߈98 -U b Vi8+ŋ: -tMpw 3r+TYg?ȇrYk"SJQqJ6J3Z nEm!Hh8S~JHP^ZGs})'Yb* Xu N^5dj^%FAi9b}ן>7m -\R􏚋y;c\(D)p@ ťrq0R%GZ G _rF6F/̀nI:.2r&/3l8'JpclIƔrv b,B>JjCROmeX79"-sE,Py)RT g:o׿;%UnFQ m=%RSL#}eJ;^II:G:؈O4A'H(.xb(#74(^rs=m%j=!IZ^>ɢ,qx3\f?}F[E(omKqRvfgIbi(CuI[s :ckjjj!IiP<>,vuY1_> 68j]ĹKW\m5QjA^\vu6KqoO~0qN`9$vQI8@FsBYT\IhVp~}#FV.)턝FբU,#2T?`+p;iSZPqvr3zΛl"Y"ZCX5_ھ?~&z+DCōT=fIFϛGWb#&Jb&iY3IIiGJV^2uT@Dq3'S~ -"1$i-rVY6QFVQALpm -r`HW&Jʠ<}͞C(+I""M:)\,aHX/M%Rm^8WQ(ͮGbӄ(=ܞ1iMℱc({WwK@ -[-Vo.bv/p,/ݕ嚄SZ`u?*l'DQ g\bQzYZ֡=x.lsFV0j ![J^(#=Nт,?}I&k(} 7R ($MC0OYs\lٍD;x$hlEAls=ۋa6L8\60&,FZXOKI9cڙ"krRDw9HO1umPԡEMΞ Cs #\@m TpV9^l0>H}q5X8C.M)L$P_T.8Ht -B58m'*/`a@"j@"W/ -"e?y B{[sM;$MS0,yf{+{<+vc ^Y\u&/W q"FYʞE1+ ֕{ʖ(ld+x*-f.wY`;\f8O9MIf;#xU[-d]ElNd(2(K8o%H+@IG@Re4<ɋWizEJ\ܿ};ޙ >niY*5t$YOy{ `)2f >~ -d*"6Do7P^."@^̑ҹnc ?RVJcg1(w rdpfUZǬ73)<9T9IsVN^h;Fk›\3~{P)f=+j H2B9:C/*߲#* i5TeZwHҔ DIE2@q]6"A8XQ͒hρʠ)@i??yM&IrV2~JpNVO6`o r^o\]OѨ*Aec"kY+pّ &P#Ͷv}$xF,T9P4nmı,e]9Gh FWQejsYA|USsb?QG/K%"ă0 Q: OBb *X8XOVX14 KWJbg;#o&R%n ̇Q`1ǘ1xIY^# -]-(#T(c{ Nh=N" Lp:IMPǍIylE.Tu%H7lh!S^q2-~?޿"Y7s",DKKsMT5$J)g#p_*՟G1j0 @VJ*._;(jGI>KW%3Z\-W%rRo-#]q~P(X䌎V]ƀ%s- KYE V˯vQG ޚXsL*Z4Ffl--Șڃ;T{/yЁ qx -I. mq~*@", P^^zqʍӍ=7Z)La}ٽeZKk~Tu9Gov-bL@o$8B:k#?Y/foyo pA M -E%7.{]MWbd9Բb(v2tM,p-r!X񂙧S;-DQ^9@ (g(+4ԡ7y/>,ʑkz>[i{'f%pQ 9x3Rk Ѷc(Nʼn 3wKXPIy Gq:95O0!Bk;حbu/ԄŻ(!z^hk]FA((ڗʫg:ڗ)CSN>XDF`b``vVOX29Ggj<ڏFPdI^cT*΂u6R1g}:VhPJw7?!*gKYBԟ]|*ͬgFN]Pb;DX,Ay\Uuiq!!JZ6]4d`N.k/f Oq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]ܵq]㿐a2-qo, N?Q]XЃ{?^=:r x_4|UX*29Y¬Ihd-m:ͯ`g-kb؃;ˣ~GSASNOrxzNk^ײB5?Jσ?: ~ɬ?W oK|-^3ZX~D A -kZX\1Y*?#x?=e?FY" -~9e>q5?Nܿ_p$?J hZb(?%sRY˦30_''#k98L>wsh6 (1TOfQFj> B3KԒ&GvrE&Ygf`b;7 J0/qs@qG ]4v*3 N.ƔvqQgzIgfw"E5ՋrQki.'Ty9M1k3-/I[Hy*օ:xNV|=J=-Nڡھ"eVn1(r|-A[i+&Q%C%R^+¨AXr;3lCoQkPs#'mf)H%aoFF(+%1f^1MبΈDQ+Zq)2ȋݜ^J4YΐeDcQ0c ܍f 1Gi4UN`f^4J<)v+fp@{Eâ)T[? LӣcYOn('*f3DleĜ1͒! YƵ[^ \ix ;t\#T2Cy$4ywΚ f $7c*))E!l3Yv+Ö;Â2 8S \霱a:v,:;Y1Yĵea;iA(3Jnj75 R_C묒IyLL0ƄI4nX1i(A".=p)H1[Yf i%R4 KLORr&!NqWr=߿}QAUI -"rb= *m)c=Ghg]RL+yg+YNs6l=IqRDŽ6Hc1]zAW8o_{X HS&% 9eIVVC1K9EяVy_~Uқ?MvAigLzSܛ_;-_:-ƙv,#t$ݠk1K9ALq YT7#FSl7QZgXg^zZ4F -*l(Q` -~&03VPzH0 hLjHH*a[bxe:a.u*cedz,'Jfi-y}.%HA`C&r,yZ| la*HOebj9q+/!Nj;+sR; B;I$W-DFygC=0Y!MT}]Pˆ+J[54$kST9ՀP}D 6'Te'-ԅ08Q;,_. D}'7m΍Sq-S{AW`܇ʊvЄۍcv!R`UI CP%tb3'?N)1ֳz7dp&̉#Y)8] v#%2'[ōlDmSCyDn2}Մ !:Kz,qAJ ӭR``%;!z*!\P3l3vqfR{ qxF tm45h|.m JZI}Rbb-V ҳ|ƌ+x Tn 3F$Y"Z -b#hz@lCqLi$ap Peg -hTLHyfv/JJXJ,Xjs=CWi{Bm 0b*ekSz0=P^m#Jo}wc [ڛg"Pmm&i}J@$XB4ԋ 6ܢE; JiJ֢9Zrc\4N'ZݧT*d ( -X$8m$gjBfs#-WYRL'Gqf+#o%H8b0ԣ9Q5袍$3$,IK˱ vhP080Ǚ89g@)zE4mѠdb2"0Q@ޢR(trhlQf.Vg̃$ Vul#flfTZ9fu R;7 59UhjQԀ#A#w+7AHNJ`JlVj:}z{/h=ܞ,)w%8qyH:-WDP7ǷpO# -׽qt -B Fډ޻!Xݽx{s0łC5cP쀨ɀ1́7\ -52ph4| ,FHRdCQl|JP"aE%$-BQ0*^Ui>Np[Y e#m8bor h^:..MH:.$ZS $ZTLj^듍d?0$_ބs261gVȧ})+S@`R>Cpd=aabLpɹd$#@qDmLB[%Ni@ TRPfTbĄ7٨,/QXIM0y ?v: ;܁#z|DOO;j(G|F>~`dԢWj]I>wFlxR?j4 7/[|կ`ʔ/BòC%SS-9lq9ieȸP7n@ 0ِ;ic1f-̨ Ά||qFL:v`#f蕆[Y% g hj`6_ -:oC(Xh2ʹ9v@=V -43b W؄'X+' -$^ax6p(#8HĔ%Ck-XF mވac&ŵJްJXLxGvrc/ĉ@ Zc-ܐeŧl̗G$"Ӏq -Bk휇-ޔK<4.:ޯ>2 +c#NbfjxM13VUmt ;lMmdϏVG,G&Ci;9t8ȫ7u -j#+i]2a.? I'v0Xh=1NB6<&g|ʡvوrܜßYX1I7b+l[f2b3Oy\r-,4$ҘH6av,-HX4FQOBMP h(/k췌[O:G@ : Pi6mBB(+yX p M!x'U(B@Z52-Bⲝֺ, 29QN<l7&fBN+N۩q }G<:B&LT:2尹Y&)qP Mx rI6@%ABOX(pLCZDP:SOayӘuB\ chq#1afZc$EL#13vK6nB:ewIJVa Jۉ΂JsFi =:FLڦMXZ)a1 8Iѫ<l", \ 5FV:iDFuay@QyzågLA'|F٥X)dG˜QvJXg_i$;FQ(uBbPy_f63 0nl@P3y2Q9&>}W \<۔]:;}xyˤehiq*vl3]sAyamLR⯺ h)TdT RysԮ&.h(xsd=Fxk'wfФ 6Z됨-3e 1`S6 -6hN{"Ng@`Ӎ_LvnЈLXa/$#GTldɊFn3MfW@T< QAc941:XIlOPO|({fh(h6Tp!E>( _֫2:nS- = -W +OE76 Ya;n pl Hff:Z8&W)+gQp` [0lА~e6j0l+fFAjF 2f U"vBmLiV#>l&&jj%.4nXp-؈'On#Ӟ*QvvûhŤS2aIDvCGlMTkznr!@{.Z$40Ccf Y8M:J Ctc1cBn萰֩2.!F)4"PQG+![|Q@]F  KjSz$.G,ސTq3 7Nؘw..gc-fQFLѺqO#*WfƝR nfרG l8H![.O:Q&q؄ #m~/!BqJAȄF01"ҴY7_EcyHp -E@yeē„D. bS&*88P`b@hx8O6ope\ -01?ntXih7E#ӨHD4FZ|*"Q< #A0idLh^̐Vuv1\p O1= Ѿ4Ѻ &mGj j}cV*MvzSRVρ v1ziKRrB(; 3Y$PEzV*ⱦ/Rxxŀة<ԳQV^}-/4}Q__dӗ^.CD6&rn6I% Z䔞9Cf!k;ЈV*hA"66&; 6PC -^Jz[!DXė'&&,d&g!36*:6icyQ~84$2xT6$dQO!Kh"jJq_':`*Ca0N&EX~4E6:]!'ͤz@CCW&tlFg#>+xHB6xRpėt#ZĪrvIÓ6/ b6|5YմOԡzz*IE1@%C#PV^n^ 覒6_ -Ofc)PO.kSȻŲ7ԀY!,7,LH$̄F8Tj#z_BoN8e|C*!CZx_vxiM"\3,- T ,rT1S@f2 5p [ >Ƥ!)*>+WBJ} нa34 7xpsqh.*0H1ʹoDB6"0wzUȂ|~蔂ܔ'dO@Cu9`¨g'&C2 -Ca&V3d΍zOZ}ZJi >2!TzjH[$8hHȴ\U NK$8@ѰSƌMZHKs(Bc`z9` 9젓+٘Ec:U.թWφ]ld_H`l옙"ZO 7U6b=o5J}/y5Xрy -5"RHZO* E:sK63?O  Vp5VY\ywF{6~j윕V̢_wjf*呪.(TE&J6ؘ< WxK/ЉԪ+:UJQ 8.?ࡅT&!puR|^#t -Z.e@D&5 2CmȄ..F21'x$meR` xلC(8%<֢3.Ax;7Q 5$cXaٌ!%7{$+ЄGB`錅HN#Zx_w~J$BO88"*xKrR3;lDGe uҶskP?#ffS3y2hce3r -*B 8:b%Fr|A !?FLj֟buUY%29}<6ՖSɞ#ƁE啲|ǥcRqq W\#fc)wuߝO}K2X#ս[667+r3bo:|ȋo Ov:߈uOI-pN8(5Y-fNgK3c'ۺ$oG+;WZ۷4wu\po+] QHaluRszqDoruxw;旊+J.\HeNB;\~)X6RcI0[ߍuԌxen6P ի˟cpyU(: S׶3i) 溌 rk;ZLwKsGWN۹jIFkqӍS u@+mۭT JJ";89k66l];y) s=ߐ*sH 0"AڊDkba>\^0p1(Xu9ۏ768Ypy>ݏ-"֌֓3{ʊ'\'eȵiX`i>߻p r}֡zr11s4R]#ȷɯ$k6R|r}~w7]biqWyJu,=ml F~fӄ X`CYWID^b3Lf!U n>" c̝K ΂] 8LomFj*G_x JBhl\ K3;>"k;T6ml]kn_㯊žS2tZrh} +~Tj0{,Kg?/^-ͽٓ/_xx~iRo4)îJK\gf܉gm!-(mo@Ǜ܂%WVg]{7wA([w_yxvyT@76.o_|/$xkP6%\<ks6tgar ;X޹܍hLr.v{`e$A *=ReMildˉ){.BVgc3\y)##uik, ߘ;-$&#"xs3?V;Z4WNAڟt3RtgfN*}p1.ue LD[ŕKqqEH]OָcҲ뫥siN v_xu{V=ڽUwꎧ og%{ڥY&=s`*&;F=58PyZU+qHt@\g Mm7գHy|$OK``KwHCZ"3r}DDT,Zg*K'#-o˹FںpN,1JM܁&Z{’159)O46d|~VKۚg*P{gx Xz-OZŠWȝ'_N ssss +wնarwR3H1%߭.v~e"PR AHwWOܻwTDk \Br}4w0J8ىBv<˭P9= '\¤uq24?Ցk©ų%| 9$ BǍ|0?+ XYvi_(_[˱Zq|y\ffWH6} LX}SJ<:;{:tT V2'Z΁[jG(?Y/7+ 喠ԝMDc - vuwn+򚙔{" eTiJsTXE#-{✓Rͭٓr}$r~X8  \YzG0HAQ&\Z - g:WH;DJȾ`8ޭU7,uc ᒇSlNy n^A %W=bG:2;a< !5?jj @Alsgl^qi+h?( W7,fgLhtxe^2~ 3[@Oī+s͵ˉ[3.!뙪fF}vrqG%c|myDs͈GSt - V#Xu`E@NG n A;תgO}v%^ZXܾtjV9"P5"+hȅC= Y-VwqBt !T"#9OiT{?;-d\;^[`ӳ`hd,.-*("bTnB&>N%H9q'fa<᩺Y(͟n]om^KuXhAY8 L/ ?XhT*JŅhe5PDlGGdȤ ,*`zIƧm ȿw'ͨ -ҖR?P />రTv& -\ $#T .a_03$!3¢n4ZqIpJ&X&Z +pqX.@F"&αڅdkK5t>8w7+04Ԥ'Mx "أh>;{!{gcbqGSJdw-=?QDfV"BdLHEԹu ၼ?5C.,x[Џ@zom Mv"**B*f&Ĕ FEHe:Tcs܂| 7=cC ?$C{..W)_n&P9X gDX&7k奋r/R"y2Z'zriM)op*.@~̌!M]DL>Z?u#nM>> GkdbSSv3YY#2*ܴ=~Y*/l ޶xRc, -lvZcDqb \gjɫ.*o8Nqa;Z4h:ʶ6 6$0Yy%fXVi-ŎXh䜅z#)Xo+5w8\jGtv#A+͟bpҟkAQBNȅPZv>O܂|Wǿ_O>xӕc\W?n1.)kRmYZ;u<}+O}+'_~ՃK --xlm<Bg{|yǞ~kcx雯|ok?x}s/:yp4݊\,/[K[g{;'jkw< ?{o|g?Z:} "Zv/z_}_xw~2Z1Ÿ|zЯN[^?w_⯿_?_䳯}GgϽ_|[o~ҷ~ֿcƲlwUJU2K{+O=/w?|;~ǿ(ϾuՖ}L ƒJkvyN_~}׿7K|~ǟ_^=uǃ"R$nhōBrY:v~򅗿O~?~'pDԀBPn__:{S׿7{oo~gӟ7t~ 0XչI+ ʩw 6<9kg~k>/xǿ~ן}~?'WLgןտFNʟdT$,vK~__~?/?Ň_o_{>gpd"3յ'O_|𣏼7}?}ɧݗ^{kZ/\$xR6wN]{~⾯>̿ßw~?L}UIs˻;;{η>? ?׿?G?s'"N.ѼJ3s]98sę7y7۷g}'~}߽pReMXyg)"W~ Ǐ~7黿Oˏ>/ }n!| -JP|/t6˛?Գ_{^}߾퟾˿?G?|ocVJ;9 D:`詇|ٗ_{_?/~;|?|_<ޗ0 !BTT-i-m㯿?y~O?? ?O;S|‰\7Voܘd}T5X?qʍ{ƛ~_ɻŻ|s_[>݃P$[o *͙|:5q]-_+р>օzF#$9-lwvt`au乣7o\z]tg{y-,pJ(6sx9HB'X?nW޻?ӏ}S/v] -'.S-[`nc}̙=[?|냏>yGo}^ygCܵwp[ yy/ p sPV7G7zW^{^_ot`o95:J;0LMG\tEV%fmmmg#=̷/?ӟ/~3O\rܬqMF! e\LP/Z\).,ml={m_wK/|ګ_W_ƃs؉LQa"),;o<_=O<~{{S_ɯ>r|2- -f7/mhn/wv^vYgc_}ɻ}߮^{}kXo|p #yIT~66rǛFsd̠3n,襣N8HȱXR -N{} rD'"lĴ.bXo518֍\M1a2lP-vN_ދesگsvEрtNfp.baB(GP$\&/FXI&RvwR.Ő; Ȅ |5V/ >X -G2J/&7w:Zg\IJ L̻Jh3wjio5HX[Je\ջ?Q.fgj>7۟sKOflXc7I|MrD)&DJ1#Jrf/ Lᔏ 쨅T/xY'b*@SsRwtvjg8ݮH8N` Y *bFy?5xI ".SL(K҅D*D1Db$C R+D#1^sl}8w:Prq>%*\ p)/b) !J:p7c_֘u.Ⱥ"~~.擦mM\ *`2.PMEh)CZؤÎp$`UʭbIc&hCFi2#zSor:&(W1RHP`@aQ=0IW6cFs:wB ސQ>m\P2i -#)Gc:vT~(7p #"&ZxȰn;8 -/+p=Bڄ,DDkgd䬘[~i](ϖN,xaR!Ii/_(zkRΖTkJ\ _n'radc4vQghЁR7LJi9jAļ.G+>!S*R&epiT*2IZ-cÓVlNP"*|:_u<:E>5`"\vaƟt6`q7'-^;U2b-)Q[Jr/<墓&ԊJC:'3iŠDklu#HAŠg45hXPzd'dz$.*wR[ "COȸȨHz6,KlLw#i"Hx zO@xt`Z6>z>ǃrPҜKR)]w#>,Fe0 jrL슲$g{gU'WË>,ѤImZo*$gwba -xK306`ڔz3f\^/,eJb F 8S3`(7b6:+BSgH2da Ʀ(80O-&iS긑` q>_L{BZ]YL\[,hO< -"!toL\3 !JgfZLt1ˋ\O4] -EOŮ (ʊHx&v0b}ɫ‚2|vvׯh FBJn}Y޶J!0fv3 6@ulG^T -0cXSAD*{IˇP> SMJ\26W -aʊ yLz#HYKQn1D̀tB*JȄ"JFcZ0" U¥2!@g}̆//A6b́3FSVsNl6 kq/cOog܉ L\fƓJ@$,YN -\Jh!@¹Qθ&2 \cBH@,7}RLa&&6\&L{bM&mM8 .UBY .t&JT5&ݘJZmD-[msF z -8cF(ݝX(qu1Ma|Dn[O:V+[t כR莏񳯼LFo8;I'? .@Zn0X;Rڬ;J(5yƋ_[2ZVˡ# ^uN"Prc\L;Y[PP+B8n@!u# sln)HVۗPryBpMwǘQ\ڕbjdJ˃WJUvKGriMmRΐ+5V.t'tޠQʭbE{PuC&riwaBWnF=i5g םI}rot&%57csLwwa^RU7׶iC, EeF+9dDkU|Ql^_8WκoOǔ=ZFSݕG~46C ebq{߬aRl@q";(m=l_,)Z8[tP01ˤ1 ,H%TiP(z9!O[tb%]IDFSvh5BVKȍ)?&u-DZ;k0!pj1'AP0/"|T^)oi=\`[/nP>lӳjy\z;V{Gb4q# - fkX>JUKֽmOZMRo˝DXc.@CY[ ?pq&nyeڹcsry*\Wʛŵm<&k Jb NR&c,٘T*s+φZ hkrOM\1i f$^}%u~T^eRc"#th Xxp#*1qE@+S(xPaJpcBzm0 ߃+̯ܷwQmԴi;P:gBI݋T_!1Hd`jUBT*@*nLIଽquR)'Ͱ`ZMoɕ-gյje([^+Dzb%py9F/x}[؎0KJlhi:o6H'/ֽ + -1 1٘Xbsc`>Ԑam|x  )$UZҍӕg 3vM;!aRw; 1&KM\oF[(n M{r?4]R +risVQ -j,Mshտ/%.5΄X 0)$޺λosJ ߴŧijFD<:֥h !曛V6K>3j[SI[GQҾ:u3䌗"*Q +.DZnaQF h)HZlnD$Y%.f)1?6;𚶫6z+#qi1xÇy1z(e7=ntGiVso|ѻ+628FڔT4(@^k} ^_Lbe'񽽋onc}9;!ՉT^ z !8Da:l0#L:=2[G;_UXϘ}K1JeWn4&h0M{[V}KqB@O"|e)ȥnk.,4 ݣ~tuW0zG(m'0\r^"YyE5Q16.w2csr81S0:gRo3Bo).jrbDOL -)-~DeҏbXUg4`X03s=4SrYeiX`J>*8!zڝL(E9pmwVv?N?Cy))1r\bJ-pD*nfDs>>Mpi$wvW?ѳ~}^<?RV=̤Bftx&W?ZDB RiC̃Av/mb`!ƄX -Rl#s+Lk1;>6{OG9-7")拯,nx~pO!& ^}ھ8y-a٣Q.u)nA['9 0Ka Oaޅ7Z6ʊ;/x߯}iy)j^Z@9~D|ŅG W:\s~OJL 1q).Cj[*'.&"l.6`topFj9 PLOȏR?7rNO(0h ; WҜbBx֗ ,(Cu!74f{zW.oz@*PH`omFI١^ -I!c %FU\B.DJJeƃA ⽨NLsOrqH0kyȔB߼2AV^nQ}w.w#4&:V[ nan -E0wD¼7j~bT{g [[goTw\ ~XAHUV0s^Iuh/-./\qJa-!\ҋL{1yfǏ@]BPu9ā[Ѹ踣t;8tP,f'RPB}2 ĔJHz>[HecƥrmGm| -endstream endobj 156 0 obj <>stream -0h{`N Pկ.'RپS_HrC8l\?N%YUaAٲ1n)&W[ -QחcV11>C;mPRmxwgrb=Ǥ|3qĘM>3&>]%  cztuZ1FR0K+U,Z6PBgrnP>;0S]85+;RfTdr<YAf>dDRkiN99_3郕tdVrrqj9"0-J0J0ƕ\l*h -tRlotO*{/ο0+[b4Eh|~ӗg+KBgXD@r&7t|1N-DŽ0Si>x㺜[ͺ+Ƃ^x^DЄ\g2C&*2Z{8`+LXy-$j\Rc b:A|] -a )4ivsD- +C{dz>"3+qg;'ǟ8g6HzQK%*gNZsz5B:i^Rl,e8!AyԴ~2%:2D[ 7viorwuB3=>Lj% '*請+y/_QQ{' &tN3LJyZКtejBqX|u˳wv|Kj*Ur@snԇ !K ~1T)h]On|U" c8yUiC& $/F-'\vu1,Ɠ6(PiEDr\a(;F!<1oƍOۓprƤݡ(݃)+ މ!$$LXQ9 &3 w~vE(Б>pKYy؆%肦g'TD( -?VoݼХ^_KLD۸ -rRIH\* d\XI~ʨ(㎰DYPBS7a\J*yoH+tVO<5ZmTI(/ dN4N@ -DTgY2=!rчϺP$Ϯzuo,] RgVAR+~"Eum}\|V]qܻ<#!׷JDUJ̭3닁9W&\mp 9b2~s(%'՛ͻ" -`lˎƇ/{ʝRw ^r}t͏YLu[+G 1Ly|'.n]3ؼuLN3{xNS*+6+ݽ 5 #]ARwڙe(1<߻xk~H#la)9YczЂlo?ҋ#w( %a&qBS -ƧøA9/W] qWDF & Viߺ":^cs#cN~͵[`kw[ƮR"́ga_ty$ln6V=Uya|P F}#?e)pMRoH΀5za2_PX 2f\+tϔm:z)\QZg.,cӧmBip/&M lv1wLv\v%;[Zw_vǗqt*6 }KHnppQr! SJ;teq{Χy>Ki$Sfc&Jb.WHF%obcG{?]F䏲HJ*N+ji3L>yQ1LaFǔv^u:;iKdsӭHNbRUUх`2Ba6!;CԬʍ {i?G XDFQm>J /Q. ߰V'̄<"*_s!ӽePKӇ;㳟^|}΅V[OG?>=cEq@.Ih4dRT⢮ň'H׷Yk).zFD(0v2>^'OF>ꘘ.Kҍ'|&Ä -  &=YzJkwƣ7ÃF__kc|6icބh5Lp悤'!3f*iuӶ<_:֎^{u+غnfO)Ym!= aFR+ԍ+grm)vu>+kq0a8k v4lnΌD,o{1I76dtsɻ}nW6~w3¨F;7Urt{}݅O -9?g* }}߬ʏI -`Of6y~nzÍHR_2jNAyezqbLr(憙N_q}nujf{G''"-?ɯ$t`2NnWhb2HXG - փWu7n-"ԪR5{7[;|g T5{7/>R%\fsus%;(OyyP -Sam'_hw'b1iuhA8ʓfu0ҝ{ML]U۝T +eҨFCt}ުwv>Uy~Ϥ[q6CHy3Ǐzÿ>Oe9T.bb˦K'W\חE?午a2Cj(H2-=kK7~wX7oF~x"m>/<{gZuw͝<צ -l/D?yy>tmIpYM`8T%&nm7蠱pڞwZ^}}Œe!\[Ry Jq.!TGPK3Zkͭ'Ï Y޼V{tXC8@DRgBL*! ER-| 0iДnJfBI۬n#W# >tL8<{1.Pm?= I$i^<1:n2kRU̯ٝDž񽤔꛻>DZDoo?A?s^wT -FLox0jMngs:D1&Iwnꕋ׿|Ћb7yԻR.E\h.R? rt3[FR!t:8U\FO[Gg߿Os~ٯ/>_^7?sRsoZeu mZɃDxR.V8'gri~83:GJm #P.mDD:8sp7ˌ5c8~c4wϴ+Q -?Rh6zÅW -S)$,OD0 -e_7?t;R@y@;Hwb\Bd9E4`[%$JgSTg<19|SuߏwP`9R;S bJMW[q&6 ZMSwdUr `bsd͌GZy'Jٗc0[9ŏy_.8U.M(lsf58m5s(*[kkW7[;~)99]a@8^WcG>T$w arJͭ *UWLTY\A9 HJu%;$WӥR cLlh) J-_E \22b'0Z) !ccVsCʝTefqtwhI4t39 oa*İV{K,p -1!c88bܭ?:˕ËG߮;w^^U{gO>S;x~ 78֪!'O_l#/7/~Y7_׋JU'vO˿??'_W1Fk_:ãw'/0-it9څmp݋P)Ru^IN{r j|a0ڃ_VEqja@T$.ԁ&hVm XTkc4IՍbqύ]hLLzl)zQi^zPt/4Q>jb"^vt:ԈTE*o8JU=B**!mtFH" -Q8cQEx:30.Bg\VMwQKҨ8:qliLhlTVTq-ܳ[;T*kbRV.]9ڰ2x0z+~u! &"L3Zall4&>zLE>zFULJ1.ny|gZތ tmNW>\V}ܜeKhFw5ܽwͯxo}zxϞ}=yt㷃 ). >Gϯ{MjUۃ{ͧIkw_AtY'Ɯ?xwA -cF7gO[x2_}S[9]`]劸ڪO~'3&ӍyjAqZ~LMIƨ¨ѷ~i*~DD9hjtuS^{"WvT3ƀAqˠW&cu B<4$S /Gp7'!rE>֫/ -bO{zW}@ L%8Chύ͌( -&+Z\;LE(ri6Qkqȷvf.r#b!2%eEIp0F/BL\* J%8]WELnmWn]|r+}sQB,_FNHcL֮! %br0i d4AØmCʋF !LKf8'l"8.f(,:[wތiő]]+tyѪRtHY#Jj(c)*SB@"K%&UC4ۤV8kCB><)޲|TD*/FfTkq9 -R4+lvIVcÕӗŕ3WNc Rcn@)CY;JܴWnΗ'4Thm~ eR\Y?0F(ڃOE,)o=<{ (T۰th7o~S,%òtz٭T?'_Q ?;<"e)k(cA^Ykm)09/OEj5" ˾X$N#ab~4FꭤhOo65z0. L>U`\H03JU+/BEhJZ? VR7=f57\q:MPKoȚ(Qitj6zsY݊fkt\P`$iDټ!\7pH-]I B0dJ81#BP0ΞIH0z5 f|at? Q D}i%;M"dBvNDg|*ҜZpjƆP -aRU8_L ө\@#N E%CGUL -<]IyF-)Nprn9Vg3K' -z&-v §tK5Qg3\hN2:]Vjn=< -J'e4)).ڬYKC8L*yY/f *B2aMW@I%PF&Q%Sf-ڑgIvRծVaB0JIE1(.lB.sBӌٳg>š~\1f4tO8'.R^D -*q)`bw7ݷ;zeSͯZ#F+͘LSZD]LT34qExLJ a" ^̪nPJA Vu0F (xg?6AH\|ƤQ:ERV3[ZCf ScqR(!+LBe5nYZr0Z #T0'}0 Zxs0K~2Wf,N(E쏰1\lܒZH1`!rp[ -8N'Nh *mZz!i437׼W#c e+R(.t&fz)ꪘ”?yK3`ө!RWl B-_#DЂ JkNy25 yWxHT-S$()Kk1|a*SN xI8NHVQMW#s \+ wZRFVe\V(S $h16 Þ-rQIBITJP.T.%Bx \* -dA!q%Nñd(,K@1tZk%47q\EwPLY]|/q:#"q +[s ŪCH֢|s}ֿCIF#"QDyɢLn,zbhѓY5NҖ?/a0͎PXTGkUpCBR FXϟP|qΝ0YsIyػHLLF(**T@ha:NwONp&1%R%ZQJ+޵嵯{9ux -< Tok_ed֍qUԡw*rF,e.Y&Gc -%è! b9LJOIVeE&A( -iU$QTD?"xC\(&^s|IԨ]:^+/I=F|Ϟ>s!Ng8&I֔((" B1f1B`8[+=1~3g5³ NݸGXYl9ҰW?~ۯxޭeh QG 4'E x+NUoUQ>Y>xַ޼W{ýf* -R8 wTI֌BiƑ.ײzukmPX9 ţA?UU5#+{ǽ7Fyïkク=||W^5L(:\^sb\h]۰n֯}Z^ޓ?+o?7n>wT&1= -cS"EXeG=J.[y?x~/7~oˏpa7MGc\(‚`e,:rj/V^ͥ̓^9oͯ~{eyQqbً~El(1u뜯SRFmZp~7^߹Ͼ+U{y:<|™ϭ01S@&qyxjqxI}fo>{ ;|w?y_?ß}~>~d#2/pbqDſƍ_Oq竏F}y믾s?{?zgߺ߼?y:O{ՌeYY*"ðm5Ng^zr7=|'oWyr9eWlF |р;rO%VNpd]<9{{o>Kl+叱QTdq`9r=ew/zӯG/~7߄}O·_RIÊIBA+Io?{o_O;wG/g~󃇯,dcBpxBъg_9޹Uol}w?x?Ͼy:7~j1> -h[4-VOV[>yc7kk_oϞ߿3H̬FIe%eƐt}xyfW?o?ǟ/g{|AWSVd+ ۠?;?߹}W>_|t?kOwvyLYgfB.tQ~r͟?oO?}ŷW޽׸lg(SưXtI&j[nǯ?\WOگ~pۿ?8O/sY0 H )AJԊfզidk>9Ju[{'_~|_sN& K S|ekP{{߼/ǟW_ƋVf!p" VPB"x6+ǖsǥ}~ozW~_p.?9Zoԫu(j"dXR*n:O362_{ϾqoxK-o.&k@hYmrf"*RU5?~m'G/o;o|rRV$ 1ըgQT%Ɇ[wW׮߼+˿~~?Ç?ޣ<| hI3cTTI\7/޸=z7m͓徽\^(g %fDQS\`yhfN+W7o-~||͟}pO6 FUVCS^,x$oE^ʷ^XO^;vzWzP5` h|zyyioU߼փ{>sys΀'ʛR{ x^H1.o-8+#㥫oܽuxR]-Ƙxҏ[1>O%R)Y Sh2oyC*[z;}Vywmu0*~)ٖ&$j<\zC74-+.aw|K?wo]ᄌkGpT_LABDb*̥m6ضb=ڲ}w3o_|_͕^&VPӋ(B9#r7͔5b y)'~aRxpxRmlI-YhEgvQ3L2l]+dL2*ktV˖QQT!GB .Y. -<+rof*kvMZ>Z*lմRN.&xg` R-%'_:37=C -Mf9)Ujͻ+_ynn14RJ7x'$9q,'jJ1kl9g( -/8+(it"J'1 ^D[Wp -D|ASMcО0=ŧx$+;F&y:qXhQ4:~Z16D/A5Y3ӎ q-1h}r9=0;h #c굂͝n/S'k+bm3 SSI`7\tBJ9y+뫭JGQSA -|DKBzrhʍb(Xl^,vcԀGydb*4"}BtgD -罞h$B،36A}Q!Ac8k#tB!Ȁ7̑B:J&l5rn_p94'1PwPʌ,TZ {I5J7T*(λгaƹ_ӳSh\VU+eb1*`<-J# t\f脔L9qcO/^Ur#)3N\+@g v'7j[1ތi?rv.8dWȯ "QZ)5O(=UCsǴ;;ND4hr7E5gClHK&#X-%Z2! <ժ!ʊBkz5R/;jz0݇'=q#dBTBD-N/SJ3zady$-ͪIG} \\X seqGxkcl -u$cǷ'b)HBgf_ v}S.t#H+LWHq)ZvOH‡ւY &&Tҭ#13b^M4d cj].oje`cJrvwZٝ$qgPwl|П=3wa!FZ:+zv2 ~4ԲV>+.Ԙļ9;WMBY0tiz3;ĥ(>=BTRi7n}UJ[t|VʨVK +BRXe/;%d71ZAƷ翎(;hk$)ǚ0g, ?ir,%ʫ s%nQZ3ZDL DHn %RɎSicbvHDز|cx(g.z 'ĕBQ~Ғfmp؋č^HGi8Q3@qm&HI*3Z2G1 -0M\kH ?܃9iݘCVN(eO|vTjN2Ƨ]QnʍzbJZ Sj -S@*5p.$;#B-Qe|̈́'0HI4JK(2Aچ֞&RuήK]x1e1Jj57 R9/ 6''dT,Je)ŭ)/PCKǤ /h'" |)ʜsA֠pϭ*fqc[r} oqc{jq|MeU-2F<-έ>g-^Ոd˭sͨ -%F.,D5^R'bi0K4i.iӍD)Gf 9[Ze(o^~LXXi 7v_{_)nqF]d2gVu$[An|)mp+PDz@͕Hu֍9 S\J-JnZ<5lTĥɐ0Q}q=L2R~U-oxXLԦc2X1"fylH,"j3葩LkQZ|O$>Lcar)YK.%Xde2هr98=DZ-m7`RqIdj9hbjv9ȗ@PČE67."MC3TT^_.GGȴgx^4vZwOx }ԄO/n2XKBvZ>IK*n9tNX\ iB" EhuzaQa6('SIPc-ē0tz(7߬l>!hiN-N`3FѿFzUkqI=(QЩVUH$o9dlT-lF*{wth*Ēfw%t\j:] {!9r"V~~otWX ֢*y~)|u!6M؝ QΧ7ܶZ7ZZV~ wF~nm>M&a:Z+RiL9nJfu7&杈 -u%df*Y3Q%3C5<lу|Y(*c*!sFiuKn̘pS":_y;GG?M7wy sW -†%P٠4|~UTJ$:C/[ -65~m"u+iLJKeZ{A_?^<}ͯ`/Rvx/"Nvn7 /Dbsj9]y]EŊ>tc3i{pk^mn܃[}uBTF&+G}1ҎZ+Ez-Z0 >Q]/m}_qViqw6O8 fOF4ڎH ^-]dSsq3WZ~k5rה]3~:㧳MJe`{Ó/ VLքtW-Kk՛z{JֳK>0لc6STF"չ[y=-=;X9~I9[,ˋn7ŕ|ʧfszlg߸X[*mTQ\I"Vc:iutj5[(vz\IhtOl-ݎ}rYL,n6n Y!B{}</)]姌eZ;\'jy%~h]sd7 zT,ּwRSȅ.& @bJ]/o?՘T\ɋ^VcQvxKʍ P?C'flV^[ZW\_gZܸ,TWnv4Vl=))U/aȥ ͗6xp(λX?Bք3vM]cE{OO bj;,VcrheWO((}#w676O_i^Js.2W՛Ws;էwZw;hjuT\{C\ܻJ;^ǩ΁ZXsk5SAI6Y]r뫍˯Wމ9ƭ&;Z0exfLZLJQo\Jw3ΘIB]`#B!"塳DW(6v,~Q7q{%fj~ޕwީ0\X|ujD(zu:yzy])F"Σ8 gn*ZȏZ|u_^B*&W2JLq[^1z'x3|XҨoCƜQ UTn3Ѽhj-eŃgM&BL%FJy3t¨l@*Z[˹m*Mշmh"rF'bL$W̤Af̔Նsc:yy<٥ңX#ɺKԶXzt7fvXBnE$KmLoZڂ$q~Tosej\H*KA.sa̎YYO5\LY8q:d8Y&;ŴfLFavb&yA0jkJ׈8:. Op ^ Q#V/();BtkfyC솘+s 2DԖ[m_zG|tNK*c.ףJpACer-9]v;;"^y躏+cqzjpUlwt_obZVFs_ Eq7cjer-*a.Ef-5D)--_[jٹ-\)ɶOqv+&VB4l6B<>J;f_-'2KL.`NZY[ >Cf r#wˉ~ 8;ewd;,Cb۠ۍlnxOr$"L&eJjzdJ*jfe77\*Jiy>,q+;5BBQXg 5ۦj8I`*HրZ_9|@Mb3UpL.T -P\׫ri;zb̖2\"ٌJAԵ5y -K.at@Fܸ"r~RyJK|A-!Lm*U'6h#cwV{Rz7/;\@TS t1*V sDitM+Hs~JrMCΪm>y>—@\D#tn>({P}>,cmdEpdP7^1ώjwݸ'VZ:Mu.fVބzv&2x9>*MYTf B¼f-%(ezsArƏC:dxM-D%f(׽j59wgBDv=͈\Yqtw^~Pjn8#.8sdsnž7ъzq͍j[@z@ȭ"9)7jAͻ+ͱ&3abvj($LR$([x(_saMàt[œ U -֜#SԊCl Z &=3kza4 rE&ېk̲WfBd(ڪJ1.i.6K -˷Q3[JV73g[wƅF(haDZ0D%;,&̂[NvzWP>ҊYxG?&H6Nun=1QCrB }~*3xjzvx33[h -D9X^+!aj&5w 8ؽJT,M$҈eVg&tq1ťW!_gf;^6-A2E&t*(xbrk4YYq -k/##)?t#N*剹hKk֥^Q-*r!"a@2TjC -aSR 3!tgݳ3RZ>D=^ y=c%uEo+FzZu65 En -J0Ṱťc,,D5F͹íXeպa6]^Dl4 ȅP!(0sfC)tR9O-*V펛\'\t3*` τ_q"#F9;>[͉|Rގ9 -5HRFdB)hRf #]XųT/š>,1Z~wEBMIǥ620R'͡+nBjҍQO4=Baz90)nmE;^yEC텘BǿHc:d\mnl.tL[;Ww_9~@nyQUKw;\Hf.ʞeSXjsPqF D/+5WZn -ȎLtsW$3 :"="/:Bƍhnf!R Y}y@ [ MtA$jُ#2 YZ~x*rfZa}q2$sPhB`J5R \yVٞ0X)ؽcj)ϭKA0W'Z~Br 'i\ y65bQ*JC<9rIwi'Zg.(;jL(fWb#X-O\UDƢR3c;bg`؉ɲ9X+ 2i^+,[X L` ٕu6٘Ψ<LS>:iiziVu>l wT1#"7쪘_cjɧzZeCYg|LpetOmG|ZΦh%7Py5&Ao}Ss1:}.fToL|D |bRs>@2Pd(2剪^vI|9M:/LD|κcU'= XեQ-Gd`:oPXg'$"e|tBq7~}л&Q>D^ q mK)1;GKoL(g8i\kTM6O2[BkKXr]KOP1wǀjmQqK}/"+հPr" )0'RsMO)s!U"ٕˇW/ j}ڏI[f+R(,Tj9bSIqށA%jXaڤsGB;"7.  Ҋ%?nj݃蕙)Hqxn6 D~-Y >"r(PJV2 YVw\<>KIfrc$t1rF1'OMf":\75l;jl"pIMT?_u1 J9qf*g5Pˌ&B+xpu}F բB:qkulZϭU -'`XrpMA+zi%@ B -x &H_, -53=mBt`\Hu?UDaZMdİd?vP7_\@LT(P5ȡ3+hrBWA@|ɥFje_)l6֞S -P!x**֤zyx0ΘqE:#|HPtO-;"|l.ȁA7a"0$V0b@*ОACy/ՂDž7A d- f_0zRpomϞ \C.]3P$Fgf|k<~A-6^FbӝQeEQsI71顁ì*zW_t 1e 7b P1|\Jdr! -J0yi*P -LsDP&@1H 6Q 1,Li? $$Qkd %**DA@( ]pZbŵ5^S͍)=4|( A -PO"|Rjvf7,n>}6{IK̭P$>g\s%Ah>GS~q0g3¥+k<8lX.ꍿ t1Y=fsK>V!pQ#)冓^p%zDs^s;Fv - ;bRfC*]*oZ̔/6g!oB]pQg 7ekqo <:,0 )K/սi3mJA1# )?'j4}S֋R*]ĹY⢋G 3jp R-D댵` -nTFTSzǨ /sy`I0^9ȿ E@]PubaYnx/>oBGZ4JyOQ6r)4ʴ}lLԢE%R\FA1-$}XG#נT1eMش`vS(€< Q1&d/29#b6;n܀<[~TjG8"*CFp@Ќ~:E8A0&.qxHiwKΘW)ܨT0cfL~pZ~HZ 5@>g -ۄ2h|+ǛCH ̄#%T\⡏) B 8J;*uBLOqV -HF@LBa{$OO!q ea\2\01H_N(\}-@S.q!WZ`֑)/n%E:Nːag p"L&3!z>SZ5Ji=IwL FAq%&(37B+!D (g{o7jiČգBpb7B l WN6L1UށpX2@AXj yG4L~\wŵ [g6cDS.|b&1iMbTmbz/iҋjeuj^ -̀?O`dnēUu\dM o_!2H秲uAퟺt[,HW{\vo|Yi._qԊ6|AI&3NИlQs5kxOE0P _뻃&;>0@! 5wHo,i'P?=3u%dz&{{ɤzS-_vg{5؝-E$a!@ -Ы{Fz73A~ѡR>膳 !XhYap%3-H`UWK9L - -Y[bjjy19|Q v/B` -̟&VFcQ!T߈_|j\Gux׿Hz)݇H7etV;@xm #q[u/D%Bqp{Ue~pK@V4\ٯ,^uDa(JAb:5kǃ/F?+E>B`7Toe\=*:`:@A&%u)H5Xap=G]@*1JFl. -j@M<;z(aDB9WNM @Ȫ r{jufBBk]駥ª|#WZjic.ϟwwJ{)Eer6 Ȁ6)F2&뻟̯W[g>[Mѝns[N@0Β43$T Ēs^S+3lZDDg:rXKP}ehL r3P1mT8nD4[@_)c+|Q[ƍW9h|18R9Vwo` -%KZ ʸP ,u16Bq䵅H1;޾Wz J@ ː:8 \%1|QB s?)xy3TXʥ5xsKy`vwҼx:r/q0kvyfiט3ui!Ӄր2R0hUs>y ozm7z\ZvwRgw+˫f~_a %8tΊ2=Q*GΞͣݏ լT2+ǿ_MpHj5)I5עդ*%@Cn^GqJ&ԡ8[MxbJ}Qy.5`H -&"V_Mp$7w5N $[N sQLKVwvR¥^^=pAD5}1Rwѹ -{=sRևg~T:/D}/ïY͏"l0ȕCP˦Eت6Pm:OQqg6펡7"|Rbq!{ٍ^qtZQ?jrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrm 7mrg2&? ͣ1m?9rT'OX.GGvkw9cQ<bjCGi<_fp"T@j}Of?h i -CQ%4M2eibTUt6i1$WOp$Bqxs6,Kc q~LOTE vONc׹k}{m%X_U[ hzeuQ*CSAGRv#gY+F_OEa,PdFͧehC뭬DiwJ]\qKs13R%y $W@83b~WRyg;%1_X'BBi6EV㽑\Y =$rôZ9<&DoW91MM8õ6eg7@5?j6*T$ojN \UHZcfh[K~Xs8ʏޅ: =8zYJa -ju0ѣ:i4C -+[ŤPXOmL;l!„<8mIb~JEq+_'B5J *biʴ= aFʨXcPiU uX$Bg$STJK aQÈRRC*uuwR(*1ʁ'bVR#WYV4)̝ʤ*]r)5':NXݙZ[ Ic(|D W ]cTDBphWv FeEݤP"VܔsgZ -17}=5aOIgF=r' Lȕ]gp_m %XaBej?ieʈXJ{+F)'7N;qߐSXO pA=Lsjg*nU=GR ѹ(_d~N:cξK)(;|Ndnj4WD2zޓ`!)q'-{jm6fvr##73RQ;ތ^D8oqڍNkI:+ދSv7D.?-($gnj;·m;)nDn0uJYI2l*ց@$w#T&g o! _c#~'NQz6Ya_ -"J! :qʃ*(M*@J ג IHI(_1v¬m?7O~KcGI纉I&Lo~9h4 !W1; g -4sV!qA}ȍ$Rw:;ɰ\[vl~o.*iՎ)iO| -R$2bӠp[>>JTFJ,"jCo4l~Q}VKѐs+"7[k|NAe W1 CoXD bF31$6bl0rAKmDXFkS!bi/J;q/)GlSl` -B̅NR -W gI -ߌqcmfr+Y# kNC\=ZwbT - Z ģ wBA*$SNEJ7[;@P6MG%/nn`B5BF_%@!XpO:"7Y?~\kfZ3k`CL3~,sDid0a+ySwq&~F ˮUOlꂴ{|a&Uv+̫4TmcJ7P.Y)Ќ7GYa2g*5 k#RZ@Xc&o/j缱RQ 7x48x!vs,7700nnZĻJ܀HR=0m8+uJ },֡;Im4_@: 8np3QSR+ef4l bDq`N -"j+1(B\$a; eeSTiQ P /<ƊvRt>+P¨J+tBat:veP;Ɲfv9h*Uq/SF،\.Ѻa?.!Akϴ{|FnrCtJRDy\0\5kwQyUF%7IozCsŕ9(MDIpLXk}.R)HF\/ Ҏ1X)bJuwʙT9|aM% SBTX ][:͓WzG{'7y&WwOJm U{sS9?cR,7o:Z3%x$( -*7Ĉ -Ӡvt97wwSNHu;+R &\0#FPZc.U#`0$pNFJ)aV)Ĩ6"m&BXh̀$+l\Aъ.mj j\8RvRj|#2`?gE9-#8`߾2b)D1P;RAV]ڊ3wC$ lFFHkkN_ -hv\yʅiV?wPFC-LAsz1s}&X@gP9!\UԶZΛOuUF2/5X6?*{5@=Sz.ʖl%Xf47GC8Oe萆Cٺȏ<|tQAM; *T2 @+ATCXߑƝΓ6J l`!H@C|q}Z: W`jcH;)6NZ`jr!0I-FhPm(0`F "Z#7#Tʇ2f\ - =M(kˍ8I^ ޞUލd02?Az 5@VP9nF(VVvPAuU$.V3ZzNF-!܀U~<%im~GY}U_biCΏEns~!iqZ86qBG7O): մ=yY%LIȏM,@wƱӹ\AZ>DAE-3T\f.'$u 1a6OwZD燗-LiB1Z#gl dVm}Lm2pvk&ېIx3 jV >EE7R E<|3ISL=[$ $ ~`I%9gOcT!GqKMP:";-i/|D P E`Q5%BCڡ$oΘ -M.$o9Ls`F`F)T`Z$L3E@̈́ xK5 8` w0}#nD(\cI @뀟#ޝ)5q,ۃZ֓+ZԲ\&L;+hbRib#L3Rfu_(NC5J9Xo2'zጳf_,X9 k8AuA$-Wƕz0ywDwlFnz_H2CA3J `|(uQ̀Pڌw#$픒Kdp2F #E.rx}Fm4B]v3O&I{#vXTBVWJT7Ip~3A\ΈyR -NWȏ֩XZrIJUiJ}qj5(LZ;DƸ<8pp4la+FPoU=)Ck\?ېQkaἥҸ"c$ -2Vb2&7&,VJKQ4̘AdmѬHVRR@==Xk -"!8I ;Ar -_b)5HqƆHPk@LT!Aqk:FT&b-ab|`rVDh @*Iy|4Vw'ݸ0J?}Z, b*}Ձ -C;+7™hՒKnVTQ5\$)X""䇠<I9i6lg̎U7O)}7mgmX&OY -d Ø, |JK*L+odգP;zsua|դ5b)z (g$WF"W={sQ`(^qPRaMC*!Aw\), -ݽWYQ01"J {008f(M2ANJ0aDJ_bvT22Ƃౙ%å,j9 -ǡA^vYK_Hn 4I 7mBBiW2)ק*`zgnRMPX@cpt|"?P^fڽ uN@΁"MXʔLIp`F`V &,()QȈuu(%R~/JPR~طƨ -t#|RN };%\ -$xjvuT=i.fsг1:Up7 &!cH%6Pjů* 6/rSS9smzmC%/GvW~ǛIVAзQ2JD*icf*;B!sAvҪ(mm@!k'9jVǔjỿKpΝ0yj7Һ^7pm#|qwY\ۄP3| -•Vuy峏d207h۔ N0#֠>3Rt`2'&FiA[cNލ!`dg/ŒSY{np\lw ̓i1#J-N[qE~1z#L$(Na hV;{0ô#.4&glXm-#6%D𯎋8_H $^Ȩ|Az)_ZbZ3~b-KPT S6@^]#BoZ -d2* ng;l լZgY(-J=k㬻 .ʺ0~쌟H#D(;7㸶kYB=wQ{zTz'( ͺ1ܟ0ɏ#f`c{4W^g/(@.]C܋ADTފu5Lp`BXFv_mg}  @$X.7+K/IYیP`a!ct1)c.QHQ\0m/ΔHkjubQ6#b&k1K:Zi8,΁ڎ1\i@7a|Nf'#T>I{>otL4`&Mi-V$¿QCn$olQ Uދ@1t*^IUL3eJVnC)(Rwxs'ЮNB|X2{PFjM8@ $_(8fmlVMV?Afa}Bj\UZQWB -{s8hL6֔& "ڃ\!NF`>vu` fDx6e1d)_\cj'_)U% TD.T{Ln܄~>R0% x'!3Y_Ԁvߊq;-C$WOp6`aG W N-JK)@'8#MqdaFgJr~(6eNCi);g[ݍ QwB%K-mxr'L7 fcYǮx݇3 *'Є *$#wճa^I?AŲv3` i? 6 hKeJ3@d`}ֈP zmfޘ[ L(CۍCj݉h"'j': x - -J堲xk/3Jܟ\=dybwKsDbj[i (Ŭ\__[&R7|"k`Aj)Qw.ƒSFVSv,-4t~'%]0{R|&0a8QGN3_ ,ar !8f -5ߋ`CE4H]?S c   `x$[ |H]bi#A? FVR1ZLdMX%`Bbu> -ZPZ f; !t PN?ڈN6H Ͽ J,i?3 ĶY9 S8D P񬃲ƹ*` -`ƻ:ZZo;-F2 "`- Sl[iXX0d#mjpD xA]R#ҽ$(`x!evbKIg8GT}97@I6V)KE3RKK*PR6" 2H4_)f\}2}><| fgN:)o:B(0ufYUa$_!7N'nb [ -T֠~'73e>TZ'C6,H8]B:(m^HE\fR <>o9cGB(-5 e Bne|jǩru`A87\NR,3ʸRUj )VJP3NJI:N 3l+sg;Hl8}8|5RLu)\%JwP{+c1 A/)@D@;IN O!Z3Qc+ nf"a6SGHV-mô1-Õj)v3 l6\^>"-m!r8ҦQ0 fΰNq-x}!]?I6xw;(vS$SGK͈M673}Aڼ;}/|%&aP :!F*Q{Eu* -%A"6iJ5mBP=c]GtRnڽ? -"*43B *lFjHS>`&H!PD·fu;)}@@vBpN\9bѝ$@ֈZ c3rE| Ex2$_>ZKZS|M5 7wQ(QJ(B1͖`$٪mĻ !u*rR,,R|l?وզI;5B(2pP ]1-TATɊ9_h$[ԝni 4r}vK'l -t8}r:z0-c fgP k*ZvL i2:Mk=f$Ku3ZƬ ]0!Šs@Fxʈ[I.wXkc05QL H誵\ZrƀrP΃NpUTΰe0مR1G- aB䝔BLh 0asc~Yv2V T1~3|(lD{6֒[=Xin:n(Rme#Ά9@A@ŁZMds^Ph#%TC -X0P:d[ra*EPiq>IRL-ſ$Fy L( #pUl˼IJ0)hz8Ŕ Jp?h3OEX}RIuN EPw A[UXٿ')UJ.ď6R?D71+Voj„ -&.,bC8i.VD: >s И9_ux0+H#\'!dv0Œl2zjCޛ ōD%pL~&snhp9 %QY!pyu@ 34g܁V̷)|>)ZtF7 Ygk{8Lq8%UqO|@r]߉=9 Q[;PXg*Tb 28Qk{fLkC2!ʨ -NrJ=Li`K~PCBk_'\2x5jf}_&F-FX8`S]Lomj` H>o=2RUjCfrF RTb0.nqY5k4Af.s<=2J`h=($]ZZό!8$_1&xA:wYBq@ Rp2$mi1"hλGbaPfciv//֑;+sNBh`'s2M.0_X#-j}q`uv0uR)C{ZY\TsCwdr#X]wx@-f\ai :<_/Ky|ab4v^azeV4]PNSZхeah1Dmt/T;*Kyb\X8`=s.U~Ӳ;lLK8mZYͭ*?<-/\iNX) 0j2}&諴Pfs#_F*k>?xPY+/ٛ^o$.K]n}Ϗ^y8ܾ\5rϕ:bj)J^ч7<ջ0Nꟽ,By%ezF}6TQcU}UK67#58.<s.?` ?/[Su`vg.Iuh}{Z? N?( `{뜏.>mY[==}3p:a_ͯ֏uڲbcB/EYsj|o' -c}0z;MLy "YEzOg<>fO8}ri<=O{ozW_S+PPו~t)jt޹3|e`o҂3Ugqi078-/>t|ez9xY[<6 >6i+5_'_֗Wg|ot=|oP?<,|~KӇJumowX<nWߌ}z`ra &"7z2}ʫ7彷Sox^>_eD/%L@4}9#Ã}\3o[_x7شdk;؄uN>otAramuU=TY?/LG_@yGgݿտY7?]RY{ӗg\Zۛ{Ϡ}h._};(꺾ŷ/^}roX5w/&WYtKPF} ǝ\Aǟ}o.??ܸqiu=nT/>wy'_B-`RV:?=y7{Y{9H\ՖW7ףgڏкYvvW/^o/_Sf(x2M3o_[ -8ʏ.qq`tycM/ޛ}Vs~7FgO |h{McE7?/ ZGo ѧo7~8H@=f `N'`}E-:{W7_||ar7O_"%/Mnp{_o=;/{g_Oj{ O}}g$[<$>w^~%0Ug+>ًkic=nzIbs]vV8W'RaZJ!N׮LfO~_?xaʎeVֺ:{Z{?tw.7 -îou}÷UbNq(/&.m޺:ǟI Bl ڼ_gVK'X+Q_ߺ'cCjrhj <\L4Z] f*;{xqcjZ-V)1{WUX` JsM!>xb0FuKϓjK+#BbpFPyۤyp%Q[N7<!w! Wl83#` -MƦ#DC+TiD%H(Qvw";^q@ّ8pc).w6. 98TCEB1.%`@pDg;9@٧0JUϘi-9sX4m @;xH$O6%;|nFda4M( ӽSٙÍY(?bY n -KlgBH%VN̑ #:T0b n#dH*: t("5Zma!^?\_&W]wTåB6^,/\Rsbg>{aR^/OJPzqTgFnY`6B i2!5n=L,|Xm2*rWygp߻럩/]6Jfr sNJ6n"&t(8q1iB #fꛇ4B݃: zy$Y,pm . j a^0`Q\HAl$6mP=DGJ7/5OyHuNLJNx0YXT)Ξoݺ q|(@!ƂZAW^ܪ_ gz+ -HP 0͸D^碵n˪TNY':AV2 oȠB礝!J,\',*ՍD7sPTHa洕ؘ/l!`s"=M{E>=h)Μ -8H 2x9 YOd}/`9t鞨/_,]Q:(0fŌnZ,LNwPKs鞘㡒Iy4Z<|y;jZQ7.rmhxLK?z5sd<,M6haD@^ *C.Jyz\a˯p&248H%llevZcn2!(h(mh}ٗhxĜ9i -gBY5ʂO)pqNAB>&gO*HpytvRԲ ;'B}z(J(ipWeK똔6pJLۛ.Τs񆘨otưt0),/Y$'4a"HWrhy&'$YԟEG'F $6P #,R#T -)MDdryFMȘC@ejdƌ|QtÁ?Ncsqiǯw1la\\ZE:i8 lL = WHCBsL)e"ôChH[Q%#'7vIه h8EcG,N:pl$jz 94bg -:,p) zJcU>UԼ/V^~yF7 -kފ2CXW*6r -`q&;ogcD(.WzlƦ^)anAҹŠܙwU'Pj \@2],s,TD˄EDJҵZs}T-mqJh1 91LNʂIU:G"u`e![q-Bq --7C6E} -DX4n֌(ڙ@ -@8syj, ١I JN;A=nlq ~{Łk>#4/\nRj}':05X.P(%˰!mF%L_bcq 1hKE2\%ױJ'Rn*\XV1X!6P;o049J,'kjqLkET~Gأ{@I.+(98:RD-oo:r囏7?_O]cRqD(5n l_,3;[/_}s?~/u}g}][ϾVxmSN*L+%&Z16Lպՙ#Ν~=~3/+Gwo>Zo4NxPV:R™b8\.Lח6Zk }_G ?ű7+M)2Xx7duME&8J6+j}v~;|^śOgo>E*(hvX -n,$rrⱵSo<ܽ=÷x'o|/O>g_ [Ϟ}gJin5rjrt̹K^v_?~x򕙕 :~G||g}N_/ZZ(; 1qtX_Y_惯{_o?𫯾KϾ_/?o~~?է_|oГ֚46Jk!.ΆDdj bgekG|W~W?O_ӗ?~sO]5`LB5VU[y7>x_}_o~߾|ۿ;౧m_%!=brN1z Jgak=ܫ?|7_xw~߼>_:qN0L7BXʍd&ߘܞ^Z[x썛/\=wd!͊~/AYf5fDcuVċpR(N*vYZغvv3w8|RufWRT(Hp좬nʅ2^Gс ǢT)^_[9w>3H 1G6>s=ۜIWcGzꑷ~և>o+/ߺ;7ֺ84tab+W_xU}[zg~罧w.,U8cZ 5-.(ɹHUjͷ6,o13z}z MI:;wH;8 ލ6/ł0PcP4S6lq{a&KY= z"#v"4nGkLZ BVYJJ ^"I"fsjze=O8qf -Zv\ܤ:H2EJbX !Q -G1%JbPV"jZoY 8>» |rO~sؤs2T+dZ KrXZXZ -Ljȉ"8H@lҁ&Mȸ3shlgg&!.x1]|#tQ ũv۪&RE?0nZ/Z`%>LFX1+i%$ $9#b@L$zsٚYV&E:yЈZ1x*TbEB<>5T mnW.fOaB4 &vD)S7c&PHU& -,@!i.K`$>h iZ=l_ܽo - 恑pQ5A1#@3;j3bZta݊L f܌NɮZń,gxAF=\z2P!Q ̄`4z|dq)Q?<8i9I?S;@Y+$H!1jt[`>_R3RNVHAM}F(lŢT;v\9\>9ѴI1j@Y0 X́@#fp=_mxZ&Խlʄ*.q56[C=Z'E^:fGE;`'hA"&H?LʊɓҊ 蠱pO\φCZ׈7d78EF+ -Ѿ ^3"Gm L8S F3 -kШFÙS'*p$;sn.KG{deF$s.:F4.&tOi!Cl3~2s7cn*:l=tF^.C+Aq> FCv>xܴI],X7 A<c qv26lw'\*"<m)O`ңz`K\T̆ɤP~{X1üS`~͙^NTz+'pe$pQs7u1Ya?oğ.Vp 'J1 @fT\hmHqa!M[LE/:/_31²=3f@VLoARIlf̓qvQ,й'>fS<in1#2._bhJs A**)u15mp4n=/q ն…,% P -O.%_l&mhxL17਼dxT>0nE/%/1 LB!DB*k]/1i2|AAV=&l\ "h3c -K>!Cb"0ח[;{'̈ypcQ4!4\EtXu &؄3sP&HmvڥǬ">LΊpvpmtwI!TebqDJW]Abq>RP[q":bx,)i&8hd$X2K9Y3" ʆ=Ldt/jO=ܐu{E]G**+OY 5ؔ Jиu<+"ll$oAA>ĕNRVLr1/A&Ը;lX+5{ 7hE_ax7)I6tI3"J@jT<89) NRAוz'C0ꩋH!!! @tSC:Ac|dǧ fU"SEpѦPi i#_TmcM( vO3oi9L2 -I&r6 *0@cf׸рGXdLLSFB河\TnXZB2]78 x;">3;[Iu8\ۄV^xgC~")եܚZF*#-  /tb!T:]sKfBc[Aw%2Ԡ@wSW-^й. 31@AN3&ۉ,X}%Al[HO,f%W씢wjDE`֮G*#Ft‚0LIԺ'l!aBJHdpB(-4\"=8$r%׻v,8uZ<~@L05:0a'9ܟF/LG@ fz^!&zPyqA'+DqIXPUi$CnC 8<<ؘ#$fJ/{'vbҀpTrmNӏ!JS1J|r$>6xǗ dEzœ4N <6mN}1@*˕Ua`ÐC<ֹTOv gwehCノPg>O#Bz!?=,,{/ad\,FˤR2P0x dSu25!wBYY>;PioT$t2e7] -gWn(;\ -tv -(΄ ܹōs[GM3cx0WcxDyjCj8(\^F! Y&-=i~qТ3fgҨjGš؈qYR6kQ8 [@m˧fH({E_hp8g XvR*a@+b8f((ΤzVk%n a./&-0B#/py>s-8UG2 )5  M -J(%@" ɄӡZ^pQp@xOCU&9zočpZy8RYDy I@5ςP~u#;{fF ;a f#< -W7T7TLd\pg6/=V?J%QYؾk YIBŅpq ;ri<Ԏ/ A:nm[=6O` d0O -'3;Α`~ -}o_i#§3JO[iK٭;=4ANIͣŋ٥+|y@FH?ۺ4 - $SD (zhJj<"t0 eZd/MϞm ?{ũ.:qO"*Ts69W@1-$|i?:ȍ6X`L؀V܀-,ÃIw -"\~Tkʍ`a%= jڠpaZPAunaΏ[3Jd| /jay؈ `L,3iZSx>b" nL[(,\.,>HUdL)Sx&7)63!!ۯClPYq08a3jCx*ܭW6}/X^s򨐷b&46%fbݴZgřͫ Z'cf3Bhn=FʸXL:N:4NxNu/ӻX#pz`$$PS"Hf;wܱp9`c)7B,*"-$X)='نlz`봄ܜXIܟ!Q_(kE]n4qzq^J.`ǙJ(=Fڈ?ub,MZIcFdR@4xZښpa%?U??rTX_hMo\oЎ`V -Q.)Q[ 4H7oZzbwP7|շ~L8Xb#ظ$vMx]x 4. B>tԤ0ecG~Sm<8Hѓ 0 @B=\4p5EkŒX\P[krߺ6'-Z(eD?jG-䤝zCwh]tHuQK+HdRR[=7zR͈M{$| - L0&Ã3? N r( tG^> Tizg~I\ʋY!?>llTv掳r L We;`»olpN}Qw>WN{ܘ4"T#5ɨMVdu.7/\/Q94z'I3X;0H!T2}zL]+8.u6GD]lt2v8 &LG'$Džj}XW+i!us! fY`q4v OʽIqHBN7ߚp ['erԴZɐ6!>B`n 薁 ҉Fə{7/\\VL4 _X#e¤wݜ!"#zhLZd :2d үRB'Ա+o_KbhRZC؄ :u@f DEοp2gpuШ`AM:0*V8$:#BZ` Fizzp&T\BЧ#E@cyp3R~,roKw5V -;MQbZxnlӡBihj-( =v/~1q= ƜEs:)"B6\]SsT8Ϝ ҕ{_#o78j@56(8f7N)ePPrtK.[ֲXi&g:nJP0IL3?GM+u2Qg= v@d.[Z f٩k',3c6*RK.>s{W.`2#=Sn6s &#fb̂}16<& vwVT0UũQB* -65v -[P ް՞rVlLRj'?^if+`2!Yw`?NIg'AIBIrEPtvwz]G^ؽQ,AdGB0w 3سCFbX;HhͨB/{a6+$xА?6:8ӌ&Ģ;@/ |~8[[:3{}n%;[].69rP B>g & $D;TMp3[ǯ7/ZсG s/H9rc/duǎ ނbj:fXݺßhtXp3}q@jB~:?z|Lf:|NF -{6.?  -V<+&LҒk\0XFq>d 1im'"T_,G۱Q[/Մ s)PmX t:#}L7r kçx\|jPZV_RJu}/lv_y,6x8TQEF!zpa<cWLDɹdp8ݮMm߹|sKN 1/咛M-vʤXh[)'Hr[uÓ.5I6yDGٙ;}a=|Oiɾ~gءw3V\`ײsXT\=h g56Z4{W̨ Yɰ NzXZUHhs+^_vwRM:R>XR;1.f㢍#f7_H njFD H:A!NAڟ,t7N6LPͻߚݾx4w<y/An{z~ R7,^e*ƽT2BouI_KɵhiˈX m<$SLjV\S+Fa\sڵH{Nt ;7`1੒ 2ۻvp1"όJvzyF.Kdcavnv6.Z[\sq5X;&ꝃP5;u4{6\Xڀ „sx%…5*Rw2'aj&$`@&ڈEaVI4VsΖW+JeVjD}uI!|VlbmT v5N8{-^88 aV,f'[-t2}`gPu8wngxyj IczaJuF}ΟdGۧI6Q6: Z$P5#5!th4R?!rrrSNv#E"\tY=u^o/0).:79qψ $'lĿt?ˑL+$ۦ<}" {U!ǐ3ˡ]\]ZJ\]sC5 dDdF2a-)AQVON0?~Ov{n\:9huv-9*Vw"݃WƧ^$#7O8^݇G-`?-E0\9wp؏5WDTryQqbVDm6HC&v0TXr7\<bvP^@+.T֘DGot֮RZCH E0X8 gX9*g#/Ld BPZ)XonTB_Y;c^/H=߿]6|b4c&>7O7L6{jy+ݿo=Vmۿm1o~o}mϿ<G Ss!gH(vY$E+bvIHq1}|~"&:.D?`{FWaqYJm g]GXPyZz0' P7ݘ9r/lևFa>IDk/=* bmÛ;8~7A[[X+YX^9j$ݙVH&ʙι /,f?) Z6;Qsvu*/ieP1~9 lꋤ]\8~sr +! kXo -TH66fA1Q}{\\5o9=ra{EkiԀc]ظ"^R+m"XӍhgܧfxm2碤xӃՏ'|sv6oWl~҇D@@g ϺH6h?^8vn$ --@j"tyjsV5n O^^QA8q҅X"眈>ޓMV{ Am2 %9^ELJVdu%ǧ-H:A֜ Oj0 Q;j{͏~pn.{AzmtR4EhKxy:[cBGޞZZZ?۽VD3Y,Ze(Kda -f;C3. Rƭ,R^:^X9~s;xQ{-o̓Ýﵶ{W|L-&W [Nun~d8f&hq=ؼxҥ҉Z[-\l]ۼGjimV.>-.]#D?ۉm $O{7;1"Xy$ZB*&Hd 6õ? V'6H6:c5֗ -\j+iiNq\TNzMP .1:`kQDx Rb]^D'?&_u8;"(M).GK85 ^ h*0/1FF%ȃ5R)&0hpAʴxicgfrtB-Jt{riq|tI{8_d;G+fs.ՕKݻ bHKX{7u!=}xxm?=~uەՓOwo"W̒Qo߼qwYXLt~vh AϘ:dK(@!%dx$oJ3 -|\RiR9@Lb@mk崏0@mڜEtQa>`RKHv'pNtXSNd -!*HGQ1)\e8B &V2:%  |^I i?Ox_<& GH r>_Tgb\f{ R:8.&Z!6nRMR+łΠh@L,!ެmז.;z\on=|zo_zg߾㋯~Ow>m.xqrլo3x dHgWH$?֐ H~dO.[|0fo|4kJHnWW^%[gS^_M$B|1׽k~{6d{*nD':ah Ҭ^XHsE\tM_qXg!1q>oSF99b%DF +zmWzZƫv$:y/*ZyK׼uPDx+,̺ ӜِPe>zi缸qx1kbp#Yԋ],sZ+c`ꃽ6n"^Xw+^_^U0Zf$&{30OTdWSǣ H!%?oTTkFriW|(Zܫ||\@8kĢ8,,^ۺVZQۏ?:zє VJp>V{|/ش[99^<~vgՕ[|rxxXi)S)'07K=Brɬ][<ƭo%[^D|Kߗ3]秭aY`O$0yj {Nf4/<7yVp_Eh R\93dpE\B `=Y\8/&ťHf`CӬf}ܤXi1 -g!#4ƼLǥ)~V+-=%e@YNE;TUHy0]M%!+Sv(#@ew9Rw#T&z +5DLѱrynkj$T3m1Ф,ʘ~DDH%Ls;cB -tTm!$1!ǣ~R s&8nizmAr:d4CJq!8(s~4)\‡+S}\oD%x::ioLw5na4HDP@Kx]Y l Dt:\Tr@8+2~ ׶vjp5ݿCl" -rϰTu*߿#ka*0dgF@&D3oO>/Nxf ~Tx"0FWS ?+.A֤Xo(U[J\$iHwz}Nf<3^0+wiTܢ[9[ 2)m&e"e@T -L$SVQC^Bu91fZf]0I+E|2@`o)7ʋf-Wxл gT.67Re~Knܴb>"OupI?/#zeH]XA: G c2)شJfclA.<~z -0&&pT 8ak`΁̻pE9K~:iFqhR󨐤嬨H!fu7-Ww|D `ЀxQ.@#O9 uOXtAWQZ5CxF$D*;Ӟ`u,9)ߜ-!$NZ*@݂DP(BT$Lr;b^%5#DD0Y/M*.gdCL4`d8+' B0e9O0ayLn\u^J._9Ϩjn)>kB)r9*C⃄ -)"ZGDի|ek`+E!9i+xoE8AaC<%Ň-RFbz=4 hT#fĕV Z6?9絺4|3Ϲf\dJH8(bJfTXyOX -$G)%30PQ<2F8}fVH4Bt. 5l/Ohun0^ V q=F:|Dp#ke<7=;嘵B41띘 8bEQ33g/Ϳ0zysn< 6< A6Џsg&ӡʌzN!/*8 eʂpzч62mY<DZшj{myČܬ3&0h)xER}1m?R ('ƢV%hFap7vƎ²D&AK\9p@@>un. -9댗u1D,3zKw9Ѽh-j@qZURDe5eރi fuA,EOYsټ0?  +,{՛@s.7h࣭nBN;>$C8s0aýûA<:kl.)B'Z\iF]C0 c\]М `т iKS;@QV7܋8:uvf5c#D[dafglMUqY cQoHyB ̹_haP\fCqŅ;)+tz8"KI)g<yz^yaU0%J}`]x1bp8"W7/xi$Pst}}=Ĝ s!BFYX,H1NU,I!]^"Yhn'HB]5G!"Zi9ϝ&'ì5, LDFu͍) Ӡ@槝ᗧ]3NPhxC܌#Dg m83 HaVWK fb憒2TÌI˥ nX@ J -"| sxCO_ 9ק,: =*BQv8}33S6'b&eIj<(a3ـ/;>stream -iM˲rE45FYˆ2Y}ogy`$EU`$ɋ@ǻZ ^DEV#j TV΃33_ȕ3čLLŒ̓r)5:#F|^\f(ȴ-CDNGXVSV*$\+@Q!+tALF -)XN(Bk¨@1Ov{q?g^!T(rZN;L_Nl Jz<9RJA>Ns/YaBID8Na'bAI<,I%&mϽ8g5| gϝvt3kCNj8=A-C?̏D gggPzNEܲ*n +OKrpydmu],\L <;©Y)Za0vDhNKМ J04lo>wt<,aqd&,DGT( -Tω vwoϿxK͠Hx\X#h%H5jȘ1Yt#\)7!0uA?0 3)hQ9qIj{;6'_UB T` gM^Py0F{7n|'O_yvpgsX8  4"JZe%}3w.n^x{7*xS@/sO[NͿtjnrt7KqU$ٴNρ9="j-hv|~Ig>}{Ov>??ן֓+=4!:Yk5`;"|aIS:Y '7~p?|n.vیs@ -*d}gƭ,O~[ٛ?څF"aBOb[ nY(1lNr]~+nlm.Zl NM;{2~ #!)kHك_9yx{o_V` CZ+yX{]Q~e+r7޽уw_w[7~Ho~oۯ^[X>QAz})޵ʗw߽?{߼ۯOß|OB!c:@0(:Vb*_^}o>k_w/w_?_߽/ubPvvj -HQPU}ycn'no_|x?c_~?J_0 "t3kDqr?ŧW{go[˻_Ϯ_/^'/0ZUՎ[qݻ?΃ջ'_=٧Wͣ~kka5CU`2 Zsζt?nw?o^W7'/oxmJ>}@bThA?zsC{kq뇿/>?W?w;A${XW d1OW?ݓ}to7c}X$Err:%ɔ*!rAv~o}{s'\썽뻣rP %E^l\QT6hw{BRך?_>K}sOOOk7r˭h1 Ѓppz٤&%"%Bn'k?7_Oŷ7/_<<<t[]!Q-SE)FZ0|W'ǥgz_GO>y갓QBx4o J#ތ#DpN<{xԺU|fW_gwx{gz*N -j:+/߸vЊu@t4ӀI!s NB,L51%KB|/RVrud'~oY{_*"FBa`pX'H[ƼyY. -a{?_ӯׯ~Ѩ'! Q>#N7SRE;Wwj<mW@aFKuM5aŰb\[Y8_n$}Qo\_Znv㵌ˌ,J09Q.fHHeY'PRRΎjbzjul4tE1`00 "v8>HlfS~/l|ʻWZ'>7NP"cA\`iPn*/_/ۏݯ޹ŭʠӢقD^"tJ&\kgfR%AN`PjTVtA` H⧦Bs3ű0297sx"epDBdr:/h_(CY/`0u@iu"^PB:QXo.4E-X^^- n7RWK ]9uLOZ=E=5g&~7Bf-B̨ gWoXt!<͉L*Lǁ=4H 4/R$Ԥ!$uNÉR8? -OXHHkL1G'XC%ҥϣdXTZ5`IqyB./v1@&mGkjiSE(iABHSv{ZQX/b4!/Nxp75Rr2L(i[o3$).Kj\Sim<\.c˭Q-LG)#kh.ʼnyxn[s ;bA/gkL"*hf^9xthX-"cHB`.t7Y;xzH~ɽDyQ,(DL#Kۉl9s†5X ! OYB3v3`BAX^/Gca*Ai !ٷ??e  5iZ@͘Y aXPq -4ZNر@ ,.Pa`^$~DX JBbl0cQ$|PHV(u֨*[jq%h~c#r{i|i3妑hM-*B\d ^ -^f<)O'm!ُDØ<4i$L\*\dO nO{i/?dիxӊd \⺟rP*ZmάbP -2a'U1K贒#IZ-)鞔h -Z!0I ky`R|nˤ33>G(m rSNt1^b\0ʉ|;D.d<=, +yajUHd`b4[Pp!z#e4\XJU3s^vNؼY}Rkz9kuR4gґ8Xrre##7!RϷQ.ZHܚ^ ȋs-44^93"\Ӫ;\b`/Mx>n)ש9G؂́Rgi :ŗ';3w~L"'f60,s7m@$D䂟KjҫBS\G+ć#6ripLF7Ӿy=X <7a; /&>Z@-!Ɏ.L"J!}teBi l=$&WHA!x9'jxȌ-ϲ9ė}|rGYCBP*r RVtC <_"#>g_C',0h< O% p>~΁dHZjf6ghypjE6c Y%zLrH$x| /Oj V`“d{ˊG\ 731^=?l<3sa5,Փ u/+ѩXu3Y,ȣ -[I+& s&Lkh¥Zu۬m9斆{PVqy~sQu>_պuvn[IТS+A%ѻn{SBo"r- A|fLd-&cKEHnȴd a~EgXf98%/H`:Sj9ɸ=$xrX IM,621g*kR +@H'ףhq}j4h| @icGM1rgl -nBXCx#Ă y6 -*:V$_x$ |6u3]ր2+BM3.bʁzw@;5m!6,I]61DꬓҤ ;s&H7R뀁6YUѢ@ %?Jwxs`Fj -F2knHFЂDAf,83^9h]|9plTuJ/\ss¢y>޽^㉁ˋQc^k *rn}z0?xBG^6ӮFV_{P^}ܑ~:b@Q~I/12\ [juMȄ^J\nH.Wwƫ$݋d EKx˦|v3dHXR⊍_DÀXʎ\n*cGLc3>nXR׎` ?p@BoJ}k~#vB*ftziR:Pij0)cԏ"ٍ9O@C„= 딓 Haz_Lx\bG4{p17@Oe=ǫo^*cRiGL*) Za9/ez%Z :$nR jhMȮKfYfld!=Jt[HfVdb(^4<|$sx7pͯNkt7Jwqvx|lxi0tB6grVDViNkI{m\g`Db]x/օKlrgS= U*6~~{4H[ʍ|f} W< )M$xuVQظsO/yU*"z|wź \OrKw{{':!!SŠ+G׊kUBkQ۱ C&/8,]j0X0ZAIyR)1&VRAҨ\O/O¦VۉuzvtuÜ5?_9`dV͜ ;#߉,bEsq)J/Z:wwoz;XȚ 1jeËJmu=`@RAPXApX ~>^?NdVVU# .Zw7/=۸~i{ClkVO[w.nc /_|v iZczA^#6 &Hl7_ӻCj{Pl"jH!z\R&]gXMSFˈFtf=Rؐ +.\ucrFꈔsZ*F}(o a$r_(ȕ=*!<҃nЩE. -PPR!gZsxDCXP )^.^,^J 7ZK}Ruaynzp#Ϲx8Rp]Lv);T@ 5AfAb%tbn"(MRksFg=?Lr*$|\!$CO'TDX - rd{C4*1Y ` +sMTm[rŬַq١1ӽ Fux~u7jxRr(l\zc[ǍGF?ظV10UHwZbk|q;peʻͭrfiqefXD*Df ̆R9Jzs7߮.]vT xu7:n]._ d-uRN&c%TRqtÁZvѹ݋/2(@מo[L/DKB6,dkkהP.azm[XaVujc_Ox7{<~lΐ0ُշK.z6ldƴ7{*#y}0h:8AŒ3pBl "ם,+pii iA}`lC&p4, ya ZaOhمʸ(%7sA ҽT - `r>[QZҹIu.ku4pSFabHcfQҊQ]Gr6DCIEVh(.97H%pJ%TP -+bF-m_Bq]*@U&+l%ֹ*W5*hڅGfm͍}z(R\dan<`升 ?̭=vumoZEH7֛NT3 BzO,UN{wbctQH dPYy&[GLE#˥I}\XX+kJv!g̪866XuQ -<sXƓRTޅĢNdz;렚rs!1$Uh~UɎ>G>25A3>K^y6bU$[KP=! :R~Ge0z V=Dpy;aPK-Mɬ3WCZKba aT -=`=X4Ou*\KzR\UC'LVXeE,̄03/`8mԁ5r%$FFs!Wsre%;/ݜ ˪ط5"g`$DSFh -@-CPg8Ĥs -l\cuy[c1&ĥsl ~I+KN<$|aG^ĀI20콍[v<fJqrkxΉm5^V=9 k>2|W9zPl+$k->g!VL|j݀PRi%խ.#97SpQٹg+D*5#ERWkB\~ ``5ͽޅ^ -S惑HULp<:=(`*"-B*ƍ6LܹcA6 - HtRpm rALr lL@2/H+ze||E)+T@źss˥3PڻL_\jCTpaa01{rnij 0@Fp[x L}6B C| <\aÀ>wt+. oKVrʔ"~.X!VH RN-ؘe3Lb(VHmM,nTDŽlwXd}q.glϬG'fcg'!P.Tx@bI*:Gq@q9˜yO`p08a{l`!>&1V!fV"ʶ 䗔(RaTbѧL2[s_b`)o] 4'px[dzd KʕmRlG@p{p {1- pHXϏ5ΧG \$*X 97Q웥; 98Q &{SN|79iCx93T26H/T?{+I函4rw>#2{wm3ÙY,vԮB҃=П$EJ]D4qy0~&eWp]2q9KdWIf2LSTppBq[Fsq^cѝjJ:9®0Aw*n}"?Vq^sNV(l2NI!`ܠ"=|-q-b>&Ē;Q#w3Eę,haO@&WMoW'Ulujx]~}cZj.r>ѧV=BG۟zV!߶N䖒ތ2?O:gyx{Ӌ9aW2ܒ@N@m |[ۈX&/F׿^7Uk_߅;r{'Nޞu廟 \6\Bo/gc{%ZVIir<'6Yo6B0Z`Bo}Z!J;/+whiCT3^VD˗ӛ_~m/^Uwv!]BfTքDJ 3 O -)0ӊ I JnߪE+2け̀`r ->mL8=4y)1cyLkbvWrELʕbp -AvE8y "*JFi gt]J-JDf*[#1 -gV| !Y2y5wFkbvg?;vSoh7?w/ݟWؐrh_hk`뷏,#(OU1g }ϟfq&v例&9;w bX܈u+`mw€UNvx~{pS*ᴹ| 1YwԖ-H!/]WhMP9h&Vwqyw1`~SyDC!\DI dYg|8+^Нx7Gs߿2%\FW;jnXXCƝJc \[7g $֟!REEûqIA)ଙ` GyƆrh;>B!ZK$:g}%ks9UY_R\ Ʒڧljh%ߓcw̞%%X7GVg =}nHy3PZ#󋷿;}t$gFSROiO_z[0ٹ^s<.J]oJWg2h<ؼ16dm m~ nzGoqM}#y3qgz[M-=|{_}/>9xM*I:8|+D*|XBms I;* @Tn*uvE fRkrެjZЄ/;@JYwPGj~W:Kw j⭪J)=#9]S:ڢA %@mP%(drOcjvHZ :vPbp..>f!13f}`F pRmƣ"5wZ͗{/|dFcu.ލ9wY!%:nw 7j?GGQrż98MEpM{8o&ɇ/ {3*(_7cKVXW&nF YpE/ֵHj'Ω TM@H>Gߘ;2i2;Fap\ :&M? 61:%Yom󄎊*L(oz 7o1)*fJtͳ~km!XogӻF L.Vw իr^r,mjEUima6qc@Xp4 oWdBCj:5us^~9Yc9:r %XbR&g-A[=sr/7)ByOIȞ"bOk[Sb\Dn?/@1rVW%BͮV"("SGUIv)hD+RL(^c}Tj)J *_bF하QM/i3#mT(hY0QAv=A̧FN~2:c4)'Y<Җ)H=]@zjΥLLErxH["c7FĴօ(YYi>)֤"(RNK {x w\("LIyizs.=x7y*@n#|$zSM)@V}p?e8w*@ީOzFh]:`lY J5>[^T?-Y^às -4GB|3_rG7_ $rqֹ럂Ĕx׌d}<& 8r5cH%NQ{E:✙߻}Fl0z`Pb}Ez>}Y5eM䘠*Peз{WR=%%&@@aeU B -1ZKtA"hIR}Q>ww~EeOa(Bc$M6O>b՘d<ɏOs!7Q1cNY{Dlѡjs"q#Oؠ$JibNރH@vMN1WQO1c+FHU] -mV+]}N -R -;.㒰h؀`!"`mhS9í,ŻQ]k1&L@Fcp(b0 Ϝ)0U@h7SÙ (5jT4E!@Qrં́YɟkYmtG -5p?^|9Wd SjR`uTZU t@ [Dz{wrONte>%M):'Y,;uP\t@9^D<f-х&-  N$ -`e?]L -h&>fmU \9{U0ªpupyH8U&  -7VU \R񡕮`񍝲|)8s -nL,I Hpt0k~%-0_x* O}K=TĠ -Sb<ș77nvXg>T"6+bn%:C.}Ys( xatv5ثRΌvk2[j|,F'͉Hp"jO -`2{Lߜ~m=)H l[U4{ޝu2O8ӯZ9: Mrv^W1y`J7@uhO=55u(1 ],Fl]tuAS.2W5(Mj -.&r}jN/H3;j^Gz}w_BibB3V9sWh }y|)Ӫ[7vvXk4g4;r #>t=g]U+ x7sJ'dA7Rң=6$`\G -eP8|. S67I!YS}zgeYR ObG*!,Nxw H_$aYHxwT|F5C1X 6g1pmVͣaH%Fo+0-p'ߧUqyCMLMYwl|0}$0oN gbr5*EyRS=$|G+dkSӥwykm{-vE&mt 5k_0R㌶F`u<"kdf-g6WPIx^Y˥ Gczh -`vzzkZ ٩IeGXz|5G{j@O"(LNA\7bp벏{ vb)kAls&3yQ6Z'`N#͙`@{93T+qWEנ97sQo۠ lG:p+u#9&/[wMX <;7' ֕8Gːց)+vEVYXt("p٬=Bfr~y^&TnFp{ۍ\߷J ꗋPz3F9WF;xAY o.'o)h Lv0s:9)L_ڭ#B)7?߼s*qI x$Ge!F7z뭫nUj@&;WB -[i0Yfryr_?5Or0:"q{U79 @dS 8&Is, ZnMPtYEnl!.C>Ĥcc擢 &#uOXc ٙwtTۀ~9D00f3T@n#RW#LǓg7ߧ}uρAëiz엘>PiKBGX{7)]|)fHw6/!K-dP> iIy R 2O>Y#^} TM8BAdLT;"p .hf* ?P-*BIO X\#Yl_`V]ث`t77'=̱޸P/׏ڛo럨eNOOAyZm7V.!%'P)]z qc" eHW`ۛWoJdlw`!#!y3}ykʎ`Js3 sfKO@srp {"mW -r502d-Ov0RMg/۫j}Y$Uw&]>gA3\EUޝ[ˬrA^\v __kVQXv{'u~xxFVPJFc5< &fX293:W.L`n2lNo0y[.1fY4c02Sʞ߻UTid_:-<*(7W+b 'g_?+sG 'nCH5vC 5 4ӬΕs0Btlܖ8W#^_ G2]Y79J-sX]]hEٳ{Ab['ny @ NJOOp?,;N%p+r1J㽪@(Q48f4U>- |;N\k2 :(` Gs5.(2^-.mwڊW -e+L ÛP<JDzMhhɩpNFE*-Pu%6­ !Ԡ;8ads}*SRz+쟎Oޡ\ZcTAIjS~Ej֤N@ZTІwuTۘFڝft0wb@:uv]]ZOaAIRs$d?X}{BiL(w@ـc/%+N6/G8+a(5v:J؟\}mtOApEzHR<;ujaMm$Xgf:Q!=^~qdE; jj.}?=.5A޷>gTUlQD;å6$'T+R exﶏ%5&=^A1{k>hSHG9&O?O=W_$_,yRE0_7 pא=ܪH@4`c+<X \H*LvBm$U C7~aukBiY+Zʆ0[Rg];Cw bwd7)2@wtK:CP|8*;{]S9:)]РI=Cq)lW,yokqT}҆ ^ @wo]}B'UGh1ُi۪P$ξjexSw-$n2zم&6n;9Au''u#S1ZH*ַ1p^!@ 2hN.\?3*a<;ԺN2>QobڏeTMUmkE:pGOJB!I@Up>-I*;]Pl$gOisth)f@ -YSYUI`MqVϣ5*Q!r_,vMSz@c꛿]A _6of>eH}8zWg1ǰ80?.~T`Ro^bV E.>x73qArx_í]p9u;)>*Ӫ ܶjEh:6j(5vEe'71guoO>mi}2SLkIiRcI8z_8;~wHTk!j,m 9kY!F妖]"3O%Kiv`ftEOviUAXw,TBic==*~4UM -FwJwٜ$Or$.ڛ|l~4N o Gy~Բξv' @!Ƴ,ñl}|A8xm8SWGx__. 3Iff''l l.FFuRʸyvi,`/Q?|عX?> oS!gY?8I:^lv}{4W~Jqt:?d - ,|?a=i?3]?}h>Vs|v('kt:|~|pt>}?ÿ>+M160YL;wmg?4=} \mʁ@ -֤:cXg=RJv\!T^`ycDIBT6-ަ*DݕÉ\+C><`%qE~mhRzה?Mp%Gkyno}6\&6JO}Ɲr육f3ZvH*]ɍ5OJBiMDiZKg_|./1_ٝpYkZj(D3"^MJrtp9b6muq>zE^ exwL}\v3FG:9ʭĺ%ݩ.sXf B]r-|"&%=VY*3ak|\;geOIkK8: Lnr'Z f&^"ɛ)SZ5!ݧeIYEbV !ݪiŴ"\LjB bZ ]XVnU*^wk"4hsLjC֚ -RgKw\MTn:"1`1(L7zb+=baE )/F}'Y3!:%P(kJnss!%Ӳ9}tUPpE;,g Y -Xf-ap OvMjHgͺ<9?z}%7oQ#)T?w՗%ho9_ξj㩍`WDdM1؈H,vUޭYaÚA.tQ}T;/Ysؠ@e*O)"F%-v@"b+KȫC Yd8'2#%XIQ)@=]SDn<*?S3ѢC5X!b1d#w~e47`;Ѻ:״-@*"LnT`qr ܣ)h#: ؝z\uN~?Es'Q+G0{Z/}0.eMZc%G5C"l[pYw^í=ƵLt}d>qQE0jz,''&Ŭ@eƭ!ׄzs5m4*jBp -ZVE,21ޡ\h2[g~֭Pn!R21o0zvMơ>@@v?ڧSyLCǘ6p*3LvgEm'CBB9C䔐T"aR'J؀ -=K϶B8u`5=mPۨɑ6 <FZk]Sӓ/ qeqV%d,3>m)-Q>IWo֑9R;J{ -WFkqkIm)<$!A1W2hĥǼ=Fexo$s3;}Y}{iuNh5hO^M.~~IY7YK)9'EmJY&1 8fsm ;h;URHoVpF=T l#<(D)u/BŴg9y€.sC I'E!Y5qqMF(X2pMx )9ǭ"Pέε8*Ք$O=-NGwr}\Tf gQJ <=LR{($jb#:h@V BLۃ{ ťG -њOQ*'k{_׿ꍪLC]KZ@U׆|Q%3~#]5YȺ%UGRᣵ׽Z~Zsee4{-Gwjs6Of E3T -rYfKVf^ U<*R@k}- DhJ &V]Īm!:SK%9TBGyʦg8s i̒C2"VUns \;"hݪHU$F됮Yt$YIM% =HZ9ڰΌ0PѠaKL8$Vݪ^"Rq@6[e me`嬁(bpUڐ|Ta NJܧdw;ў uP4`; LHщ?| ^F{/igL DKМud,2P@4{AHW@O`%7Omw DorLL6br JzB9SoDe6NǠ8w)zO7_O)Hrt @!D+sќTUUnրv.GvWM:H -)ZbDL {3P>zKyFP ,!JwA60`3) "w8֔խ|USݚ2QZG1`ys$**;5#G`){U.xSNM~g*LXOKvU AvY픸6G5 aarB 2C.0A[e@!rvP}Z=i# &ȳ\$&"DOk - iX་(%T;bpN7V_ivwz8c>'dC r5t;WVjߩKuM#4ӻ<a<{9Ifsw]5KZ#{^Y5γ6\6V<﮿A^z9@E=s$Fפ9)~\ݫ7FJkg#\B%"ZY֛*w)wЇB3$ d<XkZ2 -}lL=BjEDNMҬ~TEfWIl$3iLPgg*SCÚ!Zj\W3 +@t@=-K@y‚n ԀB&:BL%gOJť4[b5 mZFݪʟ~>o 9Ǖ'I4HFUp Y a5Dlwx{,hgXL>ōv@v 3G ҂&=-.Lx(PSsf4Oh(oLZC_ԔnQHjx7-ukVVA%3c!4>9snc&X6X}B  -l]3q Qy8|Ƹ*Ɠ[1!ܣ77R9EFBRZ/ͶBWq)~RbbU%(|@9DbBU*lTa׼=CAY_ MDmUdH"0[_՗0#SMF,'E>x35= gY;yfGy:;xA**cڞ@7e 2{PZ}%G|A:U!FTkppٷ|瓳/r=I-+9‚2!U0ѣUrR!122"*K2(1PzwV 4Q?'?i.`79l#@  $Tz pu۸X -v [R1˄C+-#ZBzPrCG9Ȉ,z:}FE @SE+ᏧUys@/#2Gr^MzR=3>zz.Pk1_v5) 6̙5 PAz[F;U"d$0ri -afMpZɱ6cNh;r^\| 02ӓ`3WmڤNпd)Y7MƛWo9|":hf0JKY -}4Jd4  -h]"xŒ65{~e{#01tGͧҶ BXe]Tw@f|S""&`lQ)_tow?#>w+e[U "r QRuNmA& l +9d6cN~ZA@4zS)/=|i/``xgu@C}DΣ~MnMZ0,"-OrnUJl#=LT YqI/hc( .%ȁu-0[%As@U5 9 JˈI&%gdݚײu "TN 8g$ח fm*Myl/(K]:]JiwC vHsI9g)Y״6iK|>* (3ㄱK5Nc.8Bٺ6 Y2ȠHI{Zq7GdՀ\Dz\$PBxo82_'gWkBpF3s쐙₂n]`!k֝8yAxgB@]ٸ7knazo* -@nG%.3| 8^=/ipua-l \:PMea)K<۹yvQ> 0>.p5u'; -5#*%*ȡ~R+)1}5Jpk] -`r*0ct__أڢ.@G AF~IElk"!Y{3fP=!Ե~n?(x"40uO xXsO+SLDL)۬dуR<î*u tV&)2C[17කʃW'. iS^jO!$ ihq};[Si,n](r1(sZeMޞVXx -8^ۄ>1R,`lRNp3FYh>cOxR!\Mڟ|ZxOF;?ڧ~哝^hr,x}"#A\ - 4NY )ȃyiycv+'9v dE,^M͎9@pY=J x 0gNg޺ F*sK}9XkA":U3PPҳ+ Ѻ9rS=sZiߢjA*j*FIulI3A@$ ssӓ4IH尊+Yk%˖%[ٶ,qwwoխ{_έbuMsNx'ΙkU[13:w"@`34t7!t -\cJ:Tr脁B&+Ppz=j&)w' A6d:bbDW u5xa492h娉} -T8|]|̑J#r@>6B1c!'Ã) c2z`vyx -C> -Z- )̆W@@%+9$K8þcbh!?77X'6lu-~ۨӄnYVM8ۙR)6b} @pF$d.8 -(cq# pPaeGϖ#:#@Y{MnjW Q+RIB07`wj\ ^&ڱ3 +sKdPX\N| Z5KYRb-u`IŀJv2`t+ؼΥވ6у+/Z(pS[=b`o"3nd!T jak͟/B4$q`u *j-2M1;[ԘrN - ۯAM:$G gR~gLC!鴋Κ= k|)Pf#zڊI{H͹ȰipM?@9~ 6yLjy ;7:0<0$\^3Pt` c o?d985pjN'uJWֺQ qm!#{@O|PJllARi\-jSVnp71E[ گ ?°hc&M -"Ǒ!-1hH6|,D=dOx$r;v -rUa t֌K`؆o-C>eKݦA&۟wsq{y.hpŘͯ_ĺ f_}qSȘ7zT(&# -ܚ0j7^ߒKW DbF!G:.D]0:TS !kn `؝ n@n:/حx;[Y; -;wPAҧ5.ѧΣLY?'aa.@U=YİwPOc3Ꚇb\a$`3622!6Z4Xw#م 9bY9=x@9qh_aj`M$L(I2O:|y`F$p - tOdcF\ #LňŜLA@CZ|@i@~,#S)Ԑ7ldXI{{DGw9+`ut#CSP ľIdԀh\`2,XAuJk&ơyS! >!G4+h_?qp`t6v+U}2 V'\р L>`?;0[v`CtiW o` ٛDEğAXJ 1$2j7}x >?'ɣ!_4PQK Y\{E3r0)sFL(m/ 1YC̡T}a:'g@&jLCznl{3Ԓ$8y|6&~}zǘQI+2 33S> X -FFp˷Mz M5vAL9#bd2w:r R1Cn:1e&5.??u22Gbof&mtvTw6L>I'ty8冼/QXi߸oM![0R571țUPO{#M2\cmvyPi˦슑JW4.   [h\Qfc!Y,|ip0UE| B(x冓+ \MƄr#Wqd0p%0ɐŜL -gƀ| $>rQF8[`2f*> >?ha[ -{ R[ZxDŲ̤-Cq:D01,X{#@9HZq?X}ψiehCrij02fêwqfz@M ZgPiNt j%mp՟Yw}%Wd&;NXFӈy.Wcbɗ칅"O@fm۸Nr =`N&ÅeW0d3vP;.nf2w%M^I̲eGd cN@e3'e!k<eb R6h^\ɗ d /9naS*? 4wAj>o8oZq369*u=B 3C!1 -vT˥p KʊT[#5L*z|*f -BR6(,r& MOF_gfS#[ɐ1(26HCU ՜mz6\`R\zѫcsnZfhƦLdDP:pbn^bn8y#,%,IH2:aŧ=mLxN'|P dBi=&ET(BJ J/Y:޶V.^_!6cax/M hΥ tg4"\|\OG+|o|pI@X&Z &P^9=>l^ֶږ#Pꆄ>bf4o%#^&UWfu94xY m( -}J+^x3əQ&98 |j.j?([[TKvQ`u[ߒ\DDKÕUAF_ˤ|%&o\%cP~4wpFSj-UB)WFq«vdBrH I9C --:"àSy5#`ᖐ.͟!Kb`eQ Q/V dsIe*>Aٙd[+BF-P} lU.w0 d%mV"" g[L]340_T-,R}=;jӟhf6_cr h6={?3E[\oɶUU))CP},qmheĄhKtX3T^-m_*bgn:֢12:Cfh&q5?eTb@g y_jƟ[JOF@:n -YIPʎ>v’MAs)P'`GEBiٗc\z>RYMW@tShLGH -Υg#X琢^%X\vNs4w3 >5P{ -lp ?=+W|>k3 m@d_*'PJHNZ00N6'fss{Hm} 0ޭn\;|Oc4hR\YEyX/?!;4J ur\jFmNN{{ 'nf [@q5?o #<|01 Rjc}om~Q:[X8eWMĚNMҺ T+MG^~̏XiNmge_z%<ϯl]I8Xhs2;w.9|څH=TX./U߸X[+7wqy٫O|Gil:ŚБlH{t \gW:=]8ܻΜguFKZ# &=,J+x(fkɞKsn gJ#;y1? \ڄ.dDwܟjSMJ*ƛ۹݅c-P &.?^Y:>ok;^S=][DdxmVV.֮LH'|Y.Z`+^+UlF,P\Z`=gb~.ڡ-P1|8hoG*+RqIP_.-Ekx.-@a)t?VD(47dK.sdg/e¹hkW*.r mpheLh9݆/_m aO.@6"ZqPp3J  B3/ IV`&L+')'NB\f6mSI@r'mHmU*-4;.ʽ\˹}7_!TyLczaoeJu*;sΈGPKjkr~ͅ?f tͭXgoz̟y^,l֧⡒Wh1[ ݣϟ}&3{fn|{8&a9&%riiމGC  -d*!`,Ɇ -ٓvXI\b]6\ $_LLQ;P)Tz !IEt2reywZq`>r7p1OfOz=h33Bv6֡~;EnQ4޾tapޮ67 9Kjeev7_؀si கܥ܅@7qzԵPE(E%T\o>,Z(K&V`{U7rsG'cr/9 ^7NPsɂ}F 3l-^P{M/]>Ϊe=R*R]Mwws1pcQ^uTm1fu#omHH{./^1tͳX^͟66˧^Os۸|}닧mG+74 xphΧfNRjsY7b="WRc+Bss,ЀM@qꚒf6ƨun6R~48O h0ěTq-C2x0w|FS͓^*bm)>D)U:ZsrPֶ̜ -ShP5if{Xg*f{sޖo^{{E 94&Cu~4\;g\l̥Ǟzxi dSӧgR3 -֮qx2\>7&~ "@BT;y;$kjb |Ex侙^mGkH0cg3X]mQmH龃Ì2RƄ aAbx8S?߻B~Ύh;#C!p\Z43gOssMno#ͭk^yD_N..Ӆt\^T;SqoP Y2u0#;̱Doϟ9 -z3,2:lLuעv*FssE2tkC $띝)*I5v<!U6.A/-\oߘ޼h+Lv\o[AbS|vYms`bxiaS .ѱ?6tsIC Zmoi; a;`#P~!%0VXJF" -kWxHĻSٙOBʎv?ФH_>zqQ)5i4O`"OE @ږ>U`TR̋Ƹ4,TM dmN;)@@,]LOB۾$p )%Ll&_448cTHDfʩu8oJ|%z'mUh27$84H]vڗ V> -YM3gMV0:$0jBǭ@4?O/!DcǟZpJ0Gn&ngtd"BBjn\E&$tP` 62bRyqM.o])%!#ץTcau,p|՟YtK5;)iյ]Q>?̜SӽRnS\Ii\y\B3ř˄TՂWx!mp H]+̝k^6jn~7; &Q*zf^)ᣑBMvx'X\zrsv9hP;U]ﰩYڲ Xy& U=¹#w#tzhuIKޘ;XrK4@<:hBHCo\)Ξx5Hnfvi<\P^Nぢa.cL-gVMtPnᲕf:!SvFPyL X"ՏշS!l3Y+E/G -X a .݁,gQ.Z{sT6z'"T} =K Q> S\*\TsjmJVbu.BHg"HφK\:bYv&T+n.x oqsqߘIk%\^WxFD&͔7~w n VܚRQʛ"˗1b0T*2^Pg悎䐀ϴTP`FH+ |bevV17b9" /r -v*L6V(΃$j>bFG*˛Rvވim.UkKLjʽS~-TjK0 eU*[5 ^&Nvwt6/UeP{#6eH '%+$ -S&2uh+ t\ V\ƒy"Y'462\E+.XkPR5,u~@h!^fڇ|b̄lX7 *s[`$*F ҁT7= mCY;G8 6*噛;W^P9T6`ـG9@Jfyy5?wN.MQ)DErnIɯ0bccD =d i0#>VuvvDOZ(_}Z$^r8T.S{<~\Pz&iZׄye'xoq C Y*\\>v}Fm9ꘃ4Ql`JIG@TBXƤ"@L_M-] ǏS|W.ӑO@]':z0] ӑJ!f zkФSo3j+c;CߡqܩԻ=BEu_9lƄRr{fΙ /?~׿ѧ/ݟ|tg -I^ygW|o;}jq|@2N&ª.^DŽIg ?x|?y#zW{_7ۯ??Ͼxo&˳taIB&Š9+ʩWs]zp}oBI!-vA+*ѽwx}~ӏ>?>7_xmݩTVPZM޹g|'{=xoӟ+?[3-gwE(fVN?CO {?7o?G_翾]1tS-Ժ;X=|{/_Ko}?/'^|˳>Lp9)9oٽL1v]޼}W'O_~o~#9J0J%!Rrgyvmo>7~o_7T~KP,N9|c&S`͘SRIzK;'.?ĕǞo_O~ow~ }.GFX Ēlm=u=~Ͻ~Ozgßo?g}v#ϔgM.6 g#8ɩ?&ŪRZ^^;~O˫oO?oOoWo~ǟ9x%:Kk{Gp~쑷yWǟ}W_2+LZ )6$Bs_>쿼ß};?՟7ʛoBo d#YNJh:=uҥ||{};L/>oϿO2-Fӡ4+DsSwN9r믿>~O??蓏_}guVܴ⦣/x$EJXnom=coA;~OW_䣯~k'/YJULCFsf7scO?+[_?o/>?/|wo>\i%eZh#!\c9]sϽ o>/>Ͼӟ×|/O?shE =Bh8X)ͭ^{7?_|՟oO>罟'/>߽pcUJ.qK0;Y[0 zG\v|畷淾?y׿|W~ v+d;d+T[\5 1j0r_SOKY>@)ƊvטqYqd6Sջnom{wug{fqku]r_/ .&R1# >vܽ}"T -٭͕3N]އǟ|'Ͻ hPxN@t{‘slM,/8Ow?wzW_yGo>p^Es\LČf5ؔ49'S͵ko?/ujNUNX=6W{%pb~GηՇ|˟}s%s!0+o8}Ż/_zϵoko_z~o>x#$5/d@G0 -3A%؈^(MSd NgÃ%d0=_1霜_9QJ l:Fd%"/n4\.贔TI>S&|9G5s`iN*fKsd9*\|#lUKnߩ2e800a1?CyIɪ|4]ae8IP*6 a2s#؈M M9]pQI@وШᣵhyTGٔJ ǃy7nvpd(mC;L)%YRȻ}ty5=0<4e9i4zż).Zhx!sX3,X0\\g Iт>'b%^VٽmB|Jmń)5f,LJtv - `~a HKb-w qH0EVisj3&BuD1v2 6NjE퍠lN wn0[QG(ʔ!H ޱ`+flА Jy;j1#eACR|Ά)#zF `C:Tt\ lD%S˟6Zwh>qHԑIU+zs:$ q#R2f6Z$8A8!W럲&Mz, -<38hЛ 1ylFPU{Jy$ .j]ÓvRv6be8bE@!ku -hl,R^Ă)2\"iP2#z Jlp --y@ѻX%|iXtxPIfOGpP19Y^=Z:jpXӑZp1SHS-s9TsxcHsPRRn.sÛu^m -j WPtJ(&ih1qz u.6ZcgN`yix -ⲍΉIBv?l1s궼uq31PI/]y͓Ru+@ o&L [NEYܟuxyMˈ/.!kSpRk?Tڤ" /еܟbO);|6yD/628źob ̄Jnp4(Zc!LX}YTlx F1J)>f=4K5/!-2f@d偓˸PAN㌼y욜>0a0NWAh$6v@ңV*¥XF)_c4̠Zu3 ef &X }õoe#X7JyF.<0 -O7TM/a@jq3 c>aU(ӻNPqKM:)OW9Jj,Øcߔip Iۤūs - 6L;q#5na.d"q.ݺ[7DI3n,,X4(>@O9?+N>E [W6/=mec&Sbz!^䗙[trǨu+TkON77N\PR>T^6n{4>}O#|2l>˵SPORŊ[ɛ\و˺ͣ2i?CBnc*/x@+:%<i+xom&M#MX hJT^-08 ȧv&dh0KE3)Oڙ 9 i0>\Y8o LX W.B;?4vZ2L ^i&;%ŒV3L؞Ш/iv6팪wj`"@s}:9DrHLZ3.q)좜_vб}CZפy4vTŪbvHkl6Y&ƛGN; zI;%̔0s3TS3Tńb pAmj!bzWX$AwpIӢst|}z;ᲐHAEC_O=&O6PҀI@VKt?#c-&bq]4WP]9}P4y`ߠǻ\;a vK\_@sJmCy{*r5Xm0}|n`LxK-y'6GgX03#W40ǥrnB~XZCŗ27TWhr1G6dt[*rM8礤Bwq55{IC*)P|87fH.o4;.U:;3i\}d(4ov\s丙Xs#?9U];xy T*Rr`OEK=eg &,bљsYBJ=ilTU^ `+x[o򉎝[L? q#[ a#@mt4SAy1쑪PgRS.$NAPɀUNbcSP7%)O&& Vk !1P_RkOYH0u=Wzޜ?}&c=ĺ; -#OA -e -N&/ǪqN0;mpY^6g(n&ۇDg/>,,d'TgB s#pm6ZF; )2ڊPҽݧqӥ\RS#!+ /\^WIT6G|JрJjh0L@?8.g;V1 ŚD<@N`0)-o\K -.pɗw6:4jƒٕx=',xJ{caG&LŦ`u@/{i G -dR3 '^лŃ 8`3j5n  KA:`t(|B+gηnv=7*Oǧ5~p%4DHEH.?UJZ0Qi=7u^y\bB( -> ch,l!Jx5 LUq -7D:"ip-BJL8o!$=Թ){p™1x~ L: &R0-psNe"L[VVyz -fgR9RZ2s iZ LrE-pu;_rqIRkZ5aZvv]u6HRkg"YpYꙧ97ټ -H-@3zwƭ*B.M;`pH+Y[;q5.f -s -VrHq~A[yQ& NB欸͔zG@I%T*ljɵٽ{_(.>'AV9&sr䠖˔ڰq39&G{?Gr čѨ-Jo*}ef,G] C{a'E#5#i(3#iF;Ezx t|5OlYP }gz~yY03T0>j:(:PqوN8^6Va_2ZKJy3PZibCM:5dDNbg -2MnN7X"+E@#d|ʈ*xHEn13TxFa_G@2U &+1#dd"Pv ]y\lBkD簲pxϚq>¤Xy2j-"X:s.P<墋ːӑ-%P1EF~0;smWV/h{N~zIM$ZayȄ#Rfӌi]BIG8iqɹ5`aq׿˄.IH7[8xuI/+g\gF 7JNd#"ɁY0#Z\;xx싍F]"& ܜy4Hq'x[!I$hԑOchJ{[܌]@- JݴO(`uLlXaۧƾurF@.3Y,ذڋڀlvHq~4IE puhnEA372V*7y#@蝬ə=[4xu0*ja:@ku6ZUlk8.jWjדSl 1Yd\!F ݧ͆*瓝˕{Ϡ$X 4M1@ZKLjDaj3ZA7&󝍻_]'>V^.ȠI ZX.7n|oO¤4^=n&l b8@ᚗKm\X^ &HIT7KJcrsppq 3ŒNR @}7@B:*`i8{vq Th{12 k26a5 "`~2#Py-5NB ۓ.5wg{pbƵՋy 1[HԪZm԰Ioǽ-1';A{t ->Qg8bL7a^1O72#Sv,WXI2_82ZK!fC%8?OʀX< a1 !#~zx`!48HB1цRUK .F)Qz" 5.Ґ3V4dr(qAh%30`¸CY=h(Z}˥paj.B-1)^yr/.]V<|̟E[8b$&(옍nhP6  -_/,6X`QuR|hu.Xٸ-df@to@J47ΘaNJeB);|'tt y!> CVuܜ &(y ;&H"BuVqJ6wCBGEle,XM⠞\{=8Q TԼZ9LO/)T9RNyuVP_n#z~J"5-"@0mS]J[gW̰Jy\-BRJM_ U6DDŽKs= &!z0bԌl7߬04^})I-| ^v`[.^gLonp ^1 (њ N d% JM3&4 =n_9Sm;Y mϬKlg]۽߾pAm(trTynpT`T p |J`6Hv NK8[!iFBE}jN(<<4z~*35=DžۨtrJ, #v!*P 4DZnlepa%XX// -+ :;cT4i#mqM!g@AA)͇j7|{??sH.bo_ҦNCn"LE 5|S"@r3 -1 )2eFl%6&hBf> P/# 2X{ڪ0֎_bm2\ηwhs= b|AC4zxG,Ĉ9Z=Sh0&нb/ᶋMɑQwֆ,@lT+ִf?}lW.C6\ֆC<=\w0#FԘmׇYk/:)騅 -jlZU.aͺA`bI8K1uD:oGe\H#8 LA-ʙ>3+BL:] 2 Q72X"u~%DDn:BE_% EKv.)uN(=-'<|,@ܓc `'RTp -50JΊ3o;؜?5b6J5xCf5ˆ?R:-!BhdtHD#pafƵ|gSԟƥ4ħxѰ;=$@Qo3YЕ ss.\Y:0S2 cy-:V&:)7CLA˓QS\tl b+*m`-M^aa3Qf]p.-bŸ㭩N_Ԋ -l05r)6dG3a'CQl^qXL546x ) d9w+v\ŧ.dgQ -Rjv6o -:;z@_1Qp38!Eۆ> 8!^]a -Q.PY3cNy^2f\9wz-X/M5V.%̟ -}&\4}NLt@7^"D>RV-A &m :'NzA -lk 0NCa#l$V΂]e P9GiM13V+voz{?Dž J rnX*J,ltF_3OX6db @)9pȧιb7Y|;tx<{uBm248YKf4sqxh%ztBϒ3bjVnzt(ӹ.֖,?ټ^v񾘙cM6\CŌ{{s@ZQ,/"@Dd9BnԌԹd:$hf 7D4,X٨iWSdeE9֌5P&(wPle:9xY&|C -L۩@%*V^V4DGS~"fd4JW7TJT q6Ro.>sK^d+GԄtr)ZсME=F-f/ȉ4n@ 6./(i -g _uM @X ٹr֤v*ghSυkZy7s -S[@E%?/$gP J}F+uzH@a'X6~/R V X '[Lo-{Ÿ5pC6rZS*J:#;y19:ԴQQq't[ R2skKSVfܕ +˗Lsw,dSKd |*x`͔o6}3#%l-`:LTi6/.(DAT LmPXސ՞ lN~j;6:jC #dxP`wjHzʈA$xufH͓kn2Ȩy&ӝڍq % -8PaNTxk6y(_kiI X`%ݨʗA y`=^Z=c@OzLN^LI(G.R6Jnu\e IvCD̸"-R\JK&D<5Ffո5g똋''.MT_)6wb];ig^~4Ʌ1]PjEF-织TۍNh1JMm]:89i-2ҲRtnL<W6"5( Y,h|F/7 1nBF\Lk۽{G.2{Q҉y2K^":3ae `] Ntn39(1{ -ٙ;'MCp/}aml#eH -@U"#U9?oDͽ@H|;q 5:9GYW9F-PmTPu^ΧD-Fhs3^?K6pcK &pbp"]˻G/ ?P2>,l#cn6R dVD/Bg~_V?xi΃܁? &OKO?ӣ';D Q?{&T6L6(%7`ON&1hB4/fnc6D` ^:)lx葨P%O_޼X:\T/ηV<&pPN*fp,hTI - TbiyEKKƭK73[gm߉7%_|O?v*(1R0qr %,w~ JSt--22h7hM CY>mw嵻> {%*ஒu*@˻'<+԰ p,X f dcav'&989X\/^ 9?sD'5:\s.Fp@6E_>VGHf:|,3Z0Q_ݿ]`'@ߢT66 V`.D:7^pJ V9Yez h"fܼZ=W;ڹΕonLOa>4J{ ZM`2iE8R}5@`yLDV.}ZGOaYg|r=d‡ˉ/+_\>z-`E.tfϿl/yĂ+] 1ﰁv/NNpa_v| - `?|r /O6[;7nzv5X/-% fv{`mbj&܌T|9/5b^ֹtM^Bbj l0{gJm.USKZmF2'6StlK-⡖M[1U碽\+M}f@8xr_T[(?fK^>(-6n_}>{$PYu7Y„sNFŃeD.&3raCG2yX ~ C+Lh4׮N:|x{bEKKꦘps#̍Wg*.ƦBsxkbn<=z ( پ{H?~4_?UkT:mTnfŠ(N2  V켔W>@NtxǪk[{w-] -"dPO;a;AV0:uCV6vD c%G= -gDLhmRBBo8wtqzbw? -um% {θ5!*!5XΈN:hO$kR0ɓvvAm^_ `:.pɇks7f_.] 889 >{5~ -,9t-ू"7p+%, Ok]T./yN/.N_֪+L؁lb =5gxR,xFT۫Q=|jġ\t:jz>l>I`z:RfS[ҬeZzw6 -MP<,mCbF+;l2?yV[0, 19a'@\TJu7V={<0~s`x X>kt77:w+ݺC_g$R~1=:{ًoT.>O>BF&<[v.ŕlcgvo/VVC'_ztLk}WxqqTmDTvHj|ynl|z}uLqK(EA[o[OVRm$Oz}!/UJE5W -x{GJOy5*sai:XWmzFH1k@iȀ0p!&ft Ɔ&]A;2:TT -VsG…Sۏ֮1R*Fr-l\/j~ty@tX9^WmTDJϱZX=xjښ˟&e -^?W[^~;w*E(dvcOQB30#, Ŝl,oʹ9/紖ś&P=;XH ZAP-׻XZ%\L?ZY55[-pYcv̘[l6PцfqPf 6H)2P.Z%h "(TjTg$P#2HB͘\Q&e)!A -HK1R/ 'YIPwxYdJ#&d3\sHw %bjXB9\ .;bv!\`zZźpņ{vuj$…IM@|~J 9Yk._ zR/ DpMD Zy>Z󅋨\p1il$/ʱR_Nʹ)ի_,t7"rٿq#h.>z\~ޅo\Y9x܅koTW׎{Ǎ+9/ מ|X9zрX ԟiP}/ۿ>p+VZb+kl}GގGHT`Q_YVzxmxnNb1׽jS P 2\qbDM4P4A,)$,.TR|YYz ͥI`[b 54xՂD'=5wS\pP:3*JjbtRg'gtQ\0"t壔':꒡d{Ts`+*oJY;ĴkP nv̂fz墂 -H4^ڴ|c'Bm1wJ81I0fn"{i }~t..Җ#~72B.Ù7v <)R0q;k ))$#% "`6HAʳJgV%`u>4aa6)6Z.ϟٹZO4CzXcYypP&wK!"R8A|!W$)e=T B l‰zm,#ܥTg+q9 QG-$)}jn*`yQ+oW J;7 䋅 shѡ<(e*@z0Wt؈~'g%.8/G3^~A+TJw!\\Ϭ\o\PPPN2JaJLn(<~wMxr;b'Q+WBPqY -f^{ޞ0F_X" I.J5f͙ܲ)nvR%#?^aRBuxBtEӃ}fC"2\tBM.|Loכ]^sx}VW6XY H4A府^eM;`7kr&;>Y4H|( q3rrY hJZAg'LEE/G6?| 'FNln'D5D3ؿ_lavJ`Z%xh.V9xAAH906fwWcU,G+Ѹg\mg@ -)FpVDyU8( -xO0V/ZuAloA)1u h4":`a -= 3fy',x#V]L rls5ZA*XQ0D=n(4@ VlB/ƎƁ_1 -C0AP] ڜ0v"˙T,MW`\F Y'c^7,ZQS/Vr$|$"P4/r ^`1/'&+Fr17"N#:DŽ 1;|1;3j}qS08;f{ 6 -JL68ds2s`OVo4Kdn3f>qj䋆q`#@r8k?=4&ixmN(zDO`t԰a0r6R|TX+hS3ӭݩc6\r~r7onW /=~?O>3}na0` BBce2{?˯}x?yӏ+nof -qMM$3>(:_,\}iz|;?~AW׎!`\&'EN0.$lr*;\,6z Sۏ~zK7H3^D`p~w~j? >FPCq$$ -*,̇d?{zgKWO?}o}?_7-d2BV_~yybͣOWׯ ~?>ɻ?}o͝KB&fy&/6)/Ub㙿O?~/{c~~߹܉"yx\g{^RfNVv8^O\?Pyҗo~lg?zO{osM -'.G#}e -;7:?|qolO>o}_/z㷟^^kŭ?|4;:92B>{;ˋ ????|uQ`&XSa ```0Rךsl;R?z/?}/?{WBn% 84@bR̄ U;fҧ~_}~?޸t.œQS=8u)!@2#N h Ԉm : 'zϮ.<9ZnwZ6](0OSBBP2&S鰜RJ|g:7}zKŸ~'\wz6wI8 Vǡ/w{-p7ޝ~{kwϕ^ "t n*͔4_ jtnW۠<Ѱj0:,^.fkkd%5)~ 22d`^wVHyM\%% uH#- 9\ظ m^ލpF0hr\% L 7d蕾ud?\fu -"-ʲ -$'MljBߌ}׋JQ8 S0q4eWQG+bPF#2n8k=1vdAJjwfHvu>2"22&jC\j]iBM/z#}ѻ+.t/ @E&Y}?iyt Ҋۧ|!ȊTi&7!m -JÃg7 D -@z`TXTaa= sNr3",ۛἊUՙK)VCX5 ڶRrF{9$4UJ<_Er S$$O;^3ks)TժFc5fi ζڹAf 啼8lT0'?)\(V]  -(xVZZm\zFj 5?R"D<4G#ݲO#vG\*D23"/6yTFN3#E*z.fQQ쾠6hŋ*F׳bLOӈ96׏|=xSjC&oUwz/'Ԣޒ;҄m|w[//#}vC\H+<2eY/OXw.ХXLRNq /UwMbUV׬q1g9~..cu4E,%QU@{-"UWRt ׋z?M{y iĝ90}81ͲDq&4~A)D{DY4F0FkVHr!Zi,lZjcLA1q-A$ Z-3֘$m^QҴ[ BYѢ,y!^pCLb5P%Q{7\D^#zJ cd)Sd-Y8B=U,&Liz,šN2u9|9#c+qJSN qڞT?jlS{7Egǥշol QY!TG0{y+٦{dJS4w_z[/`X.M8ÌqVjCPGs'K1]cLi_N0Y0VsAFJc?LV= M -jxϛoEg5v*ΔrR RKlk{K91x5.']a1x!Ah>(o-vo&j,Bts\٪82:ex/+uHg:ij`?W;ZV@n -)@,+7۴9L6u S9g6|W)g)%%Ѿ((E{VAўD 3Xvڀ`^3Ew'NW8^ -,[b˵ xdh_1{#%3&տ*ZPHaDd1ħ*yoWQ8̚P&'r@ tu2yWj=PZYB} =i>03,\ 4piu|ibT )'}C*݋q9AW1e(TO g%W+^!Egʕ9Ͷ=yϿ?gڃz>v Ҩ2EWl0tn[󝇿]|;wb$67* MŴk:*gR8,gqc }itΥ!apm5mbƁѿp'۟@E}<ɛ/FoH;Ng/U3\ I4>}_=M<)h7_ؓk4MRJHDiFU[@vU7۵ç?X+cwdgpYTvGim7ovοGC:|QњK4MS\9sr>яJ==vwg;ʔ'U*ۏE C s9`rS7*TLl={WV<:Yƪ/2[FqΙ\+^g9P^(kskDh]r(ϟ+5tߋcq WvoHWP[[|sχWު}0ԗO}NN㷍ßoɳ6oW/m{=Y^˨Kю>URb).d -Tac$g\缻;Ѽj4!T^AF +uNE++T!LTw^nXkPˌ;y ޑiutOlR[\ư{>)Yy+^ <~4J c*ӛQN4^|Dg}ztퟟ˝'?P{)yǯ~sK2~ȁԺ ̱;yߚCFn_v~:={WEo%+{Y쫿~v9) -Z:~zvt~|fT,nJRҎ.`S8S=|n@fW)֧Qi~kF=W& v׵헥[ZۗP5ZGŋ*Q%k|ou{eu_X Z|MtQɳN6ʚI~Hm֞eR\ޡyH6*7s|=IZ'@WSiZ\m쓥aX R+Λc@o"RZ;\mv_Қo/,+7 -+S 17k39)T7Ys?VkkY2IZpS#wٻ{Fg?ڒ3x_s?U*s잿@vm}y k 4 B5v/_P\~Qz>-?~IV0grjx\~v:LEQʛ?Oӎ:КgmXE6cO@g9z;=fY g}T/ZWVH[]탂[sg>MN,9 i6*1dg9|L}Tm=d1E -F9K }"pN8fV,ZN o>ǖfEDz1TZV\1y&Pw #=Ofle?t\*3u4pfBoQp14zR0JZ -viB#=oRsic=7(uDm9Ju֝힔GZ TЊJh Uџ)ϟ֨`@Fr."u:輹b|mpAM{G/JsDP椱 4uz9ECӽ߁њG_JUkR[2)VەqgvqksdRTi\JC9`Pc׏F'o|fi_çbPj` ׵%$[Ŵ~e|O\ďb>ti;/e 'L|`^9xӇ\CgjNT=]L!BnN^z'+2B;RN[Qf2^~qwDo@_Ln1I!wj>:fu7 !h!"wq}@F1jF+'6#-@S}ᣯ9wd8ëRlփ{'Z0,8úDY=ՙ_)r_J -!D9ޖ7:C=tT7:g/du--[=}K+n-E  ܹ Z/@"j-7Ko,a+ڙ$(>µJ1 f'(1{|iLVXoILs^^WisAeX:p;)kGr}o=ǧ)3UE|SzJ|-8M Ho}UOf^'FVazu!3sHsPYJ1"9ohKiz!&^15E=Fkp A V0/)gޫLtO^WfBy"!)uhQ\OI10{re'EXI>UTl Y -I\T;g MRf^(dr75 (s{jnL5YZ6 4cUw^5chq@lק3ܴ<_uϿ' &=5$]GG<Ӛ{@uc :hM`͓_hj}|B&$U  -j', Me'U6q5zѕ636RY xkdnJðkWAekGRD]6G؞ɅMJ"R^Ru5'Ai@Jk)F03+vҎ;x\ʖ͜Ahd}Z7;O+$i'E~53"mF^43\O:,cqGoAmrfzy 9u\f1Zg&PV I2=~ DS!̉: &4W"Fu;J ew?DBj~."Y^j#J8h]PJ@O+{\0kW q8BhWb09Pހ[E9SPZyalo;m]}s?AmI s5Zg)^NQ.\?(M_矃"INl 30l헂4Gh 'xpq8a἖JQLS'7սYZꂵj[J kʗa`u9Z;W~Ĕ !t{ <.z1!X9m!6S.:9̘CTn?]ɂ6>z^F ]c}&ZFl=-2zg1ab6>ɵ0AF@fTFPD J-&`BF-`BHZ+.Y*Whd~fǹ* -endstream endobj 158 0 obj <>stream -#yn=M!\9B5aIDἳW6(SC*se8JD xT4PP29b-|գ׸7u3Iˋso -49ol]o8rx^)G1*(}$S0\%kс/^21z8^)Z _jѢ#]Pѕo%`cIPtte=άĂu`F TY̟Wd,/ dRfw^le&4>n}^ec`!Bݞ jQUw9~#Iy68;{Bt!٬79ѮNoonNi')//8C[PAj}Gi_/ !19֕yD0(|J ʚrZ4o(7Hyk];9Bn"fڹ^dz$*t.r|\5^6n*+4.h ş4\MR1L #joZo--.%24Vio{G_|-%`Bu AR;RǼ܍d'Y^ -ء J;[P{q.'t%6y8'q{ kP!I!bT^iFzA;BTްࡘr36SjNlŸ#IIEHpGǍgjT"*6=ٯKP,r\ WizrOMe9)W˜pm<ݧfcyEk5sj4zVy Ujύv,E;2,8~eܛB>yO;B(:)lv{_eJ6WpCTV1~z6u^-& E-8m.ʹΣՏ_`=C,ó,e0+Us?ZO)WRgs\Ik5A&0QO cڐ$IH h6eob2ǥޕ{=ˈ{aj#A[8 3,]^1XzepbzaҮ2zmI4q}-fb*bd>(HVl5{kOr_j6TquP9Cpv+9ƊSiʮ=1*Vjl#I9:q0_"Ui{,VioʟxǸsq #e ZhKUT_͈yvY{h6OKܚ 60-vRs-+QqqmMa\I>qrb#E @֜P]^C4DaƄ)oc!xӂ5WkYI0ij=ze\0K`0lSB3xgek"8-}̗rZ3֣FVMBϗIsb=- -80Dlsޞ34CBx8MvtAgI;GZڈ!GGcFFPEk'$С4)SRkb37"$QXN(IF<*v -0gbP -hRT VVbi60 |Jh݂X &?X>)9YC7xwB]j&)#X>/b$ e1~QoQրL j5ꇝoy00)2O `F猕0YXz RǛ@Bάd̹;\XϮG !jAdz̛YNZ]%F1cJXMyE_LB7UVR!"(,)W,y6<<` RJNPeL;ً8C0"$@{1@@GQu1\D,_? :J[R0̤ZNiD T8́eg9A~c?XOWbdpB0MD_1?['0E 4R@JBBbK`5={#D=.1\ЄԪ3B$(TGs1Zխ׿{*sBI 1.xp`W(uSz$On\pp.q%I_E'<Znf.ѕ;A0 X eh^&X&3@xԏ`z-;ϕ#3 BTt^(Wk\sަK}LP5:ʕ M`πB8+*3-)8BT91D(k@2a у lfЗ$mՏ$!ٲ|m3ADe,cAtp#ńQ%9\iS@3'i/'l夀Hw5?}KDt#Ø幙08ׂI,ӘT Y,ʝTʒ%Lhq%>.m/.p` -DԼ7W aj9E26aB㏗2XA;qf~F1R5W2\jI/ LkJB.[ bE'R"b -夢Sk52ʄ2LCy]\nzNd% Q\en^j66q}1NgȐ$8eZɔ&P0%׏*Ӭ0U@h9AG(ɖ.Z(iAECQ'9j@*ImD+.5AB R*YNwKUb<~"Tr x7ʼnn6pN: -0Q Vʋ5 ЍBB -pe9I:m#Ҝ<83QЕR?h7-Q{i.@wbrZ[M訝"/A|7} ( sDHFF gY+ǀKa*UBY+hʁݻ^OLg9$s5Ane' kI!E>`!!y&p'\ r^Y*hMC~BAo&;8`(OSt=Fø$i9)A:_|"?k]uJ!Iz M,mF+oÇzMv0Be_\ c1O*RJa4ii`>J'P)\7I5<L)5 ޛZf=PθirS ֏I{SGQ{] s 1ÕigW\+(੕2~u6bXAP BU7"LcyW75gTbh0m3-Xp㣯 Sb*y@݁=L2+X)@qk O0u Ӡ).TCJOIu!7/f{5[WѬ)"r4>/4KкI5{X^Z(AG^GUQ8#bW1:J -jj j!J4 J{#oХy4"ښbRt>(a#bMo-% a2E5Y[9 -h]qq"E$\1ڧJu?IqT!Veh^b7~0%9+b%>x=QZ|(Ÿk":hAˍWC{[7 -Zh3vH=(:pE} --i2FU:9FXlQ(Jkq^@~@)r>e@mlׂq/Uv_f`iw :5lkaDb)-[KHl=բ).%ՌюQa6Nr"Kuc>]I|5HQ8w5?e$B54׀_p Pq7 ,Z :~mS`ĸZ ^t@3s2DŽ1ȉVցLr^j@lbZ+>:"tQт7K3 7Q#/ Qm 2Ea|@6ω=zC "(*EjE` -, faNcR˳nE+'BJS"ZSh6M'XiBfH{^a\]Me-o?Ϋ \ R3~pBWL`B]I [ hJf5Zd --6}rOP&6εX;/\J{ V9qL"w)),% &$^@bǘ܃qYSKvmbb&˜\CQ4ti -H~LL1-BiIXFKFHu). _%~ .`5h9|([ƨFemPk9e)k3@m*ˢ:`1( F0ː ҅g0VƇ #2 :WDe ~ϰ I`fh7 pfp%Q€ET0ԀYe+YI{"TNlu%"nwEќE :Bȍq -=7z\3[`QI)W% J.Q栳z|,Lmz suMv#u/_KRɢ KxP6͊{\O29zh iV5&Os3js1DYȲUyХy SA.D$2~$ 4q4xg"PRpwA5xTS4T T_JK &K{ycMks|--G0Qv3~JhRr$bLC}?g=@"\Je%Zpw ƂRuc8:_ΪݜoUG\qTվaM!\l^eH\#isQQ6rᓢ5O5pyާ\؃bib+/*;opc - MV$&wPpF,*&3~ֿ*bmN:8̰8a/i%DY=lti D~AzJ\BY)Y(mfL(L1ĥ(O?'$O 0z_z7V/gޮaZYrw1V m ]VDZi}.{#+5H8UD{oMczAd+5wo:G_ RC)f: P,iiw` !gTw9]Mk獜u/Fr3#}Tvd!^d ];DqkIv-3x~zO vC?(ڰhLjPU!L.}{uvxۢ@N')Zb6K|%ZNU҈&`R6~pSF74K5p[sh0eB kx11})& UlMpAr < ¡\"YVlpw1ƀ!f~ ߹09랳z|b<#L!3"PQT&iH}p- -&QXSl%[ỲwkP04URʳ*ȀncBDNԲ -QX 6|BLqL0~2r[i_WSOsb - - =JDo<'ݣ 7IZJ+eEPנ7jy| O*ip,) aq%ɯ͌Aw }F{3H=^7[J3rX\ۘ,bVAڰP;P'~/ Fhqѻ+ɛx/G KYJ`scI J ܁j)MŲ'|YpFQ!"V}Ie(5 A5ѕ񱢗yyL3HdW &@/#dɧ/DlDng=HVZW>Zˉ(f^BMT*_;: -H#lm5).fu;Nw0;yY5Oidi)#,eD\jY 3A9ԎYaq@&i7FE,C"l%BI.V``jX:)Ei~RHk :9aq"D1'5# 7$w0+rHhӼ :ͭl%'6nœBԟ!3ϋ$GX@-saޙ6YӍwZg֓SNnCfp{W]ϩz5[>ZNjwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶvmkwܶ_4}_IVV>9'e?YL ޱ;DZ1j';۝{eMu%v]X$$[ :%%->& 1{Й/ӎ d4ن7K|ϟł?I|!_?4M!lIHv!˧8'|.Xf2T&ēOt> t6Oe>n'rx.Q'OГPOsX J+P.?}1#|F_!~;8@/!ij =MoUHj$XH x6?nտYH&r:qp+3Hlt!'OR+\˲~?Ez1mDfj(ӂ>6"֣`$)7(c sWz9ژ6 r _6C0U&5kôԌPZN6RA2b;Q,~F0s#+%rVh"bq1ըI~=-qP[0Y*qҎ "|XJg'Δ7 rҾj'qs먚k)ƏJ_SѼ(9ɰrJz^!L84z)'R98][kK)~%-P262<&4 J7T7Z.Ե|c7\}57J8Gz5sB;+v\3ZFfPJJ׀]EF,o"r`V([܍j-O6O7)Yìdbyy1b-'׳"l)$(f W b̈+ n1BFQ3Sd56QI-s* +0G&Yq -#IBwte-ˑ#(N舜3PQ(P9s9!9IlʒLIϲ-ɖdK,[ek-??[=gW>hp~/TU\͎TKsaT8ikTY4щgR5K6騱rLNXꆸM98?%#CV*Ա L粝]/B$~Xhpalt"=*٣v$~Z_;3àI;. %\~˨,OuVwBpAyY#YoȍpNtkh"Hf=b %\@c9!뫀y;f2Nx7"RO}D9. y` -n4gCL0%`EDlә%9gdƄ:Il;#i?g;P?DZqmց0V >QJ$^"k 0Έ4"|XϯDŦ\X=ߛu遱wd *aqeHN@ jP!RCBw6ZҜ -Szz TBt>@,>O]6YʛqAeJiɵM27X_-]cD[ -arTD>6eDl$It#+.iXg\X#򂏻$T]hh -c)g8avS NbM-"IJnDŽڜP3؜#>lO1RVWMES!`xz"wL-2ƁAqBL (ƋΙL!"Jɸ&p䜗7RBAlӃg3vq UF=+lޣ.<% oFP9cF˭ -#n,=/U\`lt$Q pPѥ0Wij '!bKu@y)])28_<OLOA3-aɆ`'H:xjJ5/ 1E,Tƒ-$al +q*WX)-*Ӎ(D}r?ۿ`h`^]b#S#q*]McW h0yc1κbj,LADCWL\{5MAq.x] ->R><<5Dc` f5"<15H֠45 3G3"bM K0a &"4[S/S1; sPxC}d;1%l{TvicTiFz=x΁ȮX:̗5h.2=kJR. ^Ǥ6 -*ʝw'mM{QؖZ̉TGDvȮe,5މ: -bmCTa<=B 6u,bl~Ui)S}Bj#Q\>4 >c*XC&P3\JPr-G5;zQ}Эd-dtnZdь+P&ϻ Ήc2]%e4: !東En !UbY{X$PrD} fE'\HI{gy3nr h -j%K]t @+ eXvhp˰ <3c-)A`hzց>i^@mcJ=$eD^"E@%Ճxlu֎7axWvG]PLꝳE/pf<p; U+De_.1>Jad>0\Nus*[DXq -!_X^#tvU)%Z[JT7ѭ7+=MLa"IHh"rD*388|cqct4aE3v4dX+4 +ZcL\x&̕Ü?)_J6̐ק{#g4Xt -Hp2񢊱P[cX6Dfkl[&'8{ؓkDueuw)Dp0\ eqB3Q(Լ1DPʢY2.Dzy7>c8#Is. -<*1yca`GsBۃT!V,AcB+`=˂J^FfBpd+N~T RG ->@ mهg-> - '̸ S|E{jCH,@-0yfzרa8ǹ!_DEj q=d&wbaor-2Jփ|-Ɣҍ-KT7b*Iax4O|[\57*K}k2!œ-c K$f\aU*k`mEED!pDA J ~kS\Kƶ-? ,Y[T -Mc_<"QZK~0!@tXZpzV dj ~@M^tsMGhƅ}I|q`~aH&:fL") h_4 B&ϻ Mc a fKd,B4QB@(=7\#*"a 1uCYQ x Lݢ&t#i`G.e.eBc^-YkA1;`1yK^ML`Ɏ)RZtnG!c4pdaI\'м1FlՍ̑( bז)\D*7Qk[lqUHjb1mxU]g,)}*K/NP6Df)@X Du:$8c̒@JDiSlHO*X0Sy8^H&+3ЏPqP5,Z9^p!Yഋv0HMM<4 fcu#q)1`E@KxVkp-3H.xqoL psNv/_>8ؼB ɈPO5pY?n>L WZD-%Ȁ!VS3c&F_q UE&]J6VBm'OXr@H|*>ty`$ ݃3RJF|er9(hO,`^*+-4ees}ע9$s0N`AI9ցq.H@h -.+8D(ƥ>D-H`G|ru[fk.,9Ȩ'i :dC* bYK݌=# t!<*fclc;H.آ}>, <9Qa"K%fJ]y.8i[Azс;~ъzzJyT\Μ5r< -E/ D y} 8Lt@." $@!"'jK\HK-$_JixQ>DbL2K.Ok 1@!:;;9Ʀ\  -`sNQxc3}LQ5"={nFA_Wswb5*\#BaI~&c~J+6n?#&3|XRf3N<[xbIWTby|y=x`*[o,Ų ֠(h&ؠm]$$A|z,:QPڼ$x -hsj?*|4(&yjS1ERj *e8->!BMҗC/qxiJ\.2fj^4\~GN]߿`hL -4fΎ}52kG=(cl3-yu<$e@=/T\&:3K`F^\P!BOuZKh6K+!V1zTh"|P\ AmA4t#B9T>ȕ<P'tvjH#ʖНb`\z!CW:M\YB+tDX7kP!)MA=7caU!C<1y)L ]$, Q4IO_BEHFM!烆ゆsBu2; ;8# D B!mѴD9n 0 UP k5,tKԌty `j"76$,F6$ -M~L=YcH6v|ԉC.@l1xM ->{^h(D8o9b#8ہHt\lYMS|螳ŌO$!0^" nr8 -3H&BWC˚\-t, (Xs"]Sqڅ\x}/վWw}d.@vD |T'j/xaf_ĄJ,JL~K^:WC|ﰵ3r2>gaYSe)Y%;h?K -cFSX>*tBLqg}d6,=TopW/:F3z106-A0D˸R iK sƩ<0]EY -: G,g]~V&ȔK~zΨi|ށb Ɔd96#2uo8"XqtىCTJl`1_4 V7iX P@~'KΤG1 g@2?uy9S8 -)b7Uݴ:gB61xO%Qbb/(`;k6Λ#̑'9 dhsPE7is 0;k4yX_ -Q%΂AF:q %4i;11s[r$NbaL-rWQ&Ct9Y\3yr/m{(MgĖ@tV@1Hf10 j -n,  OPD{nL#dН "\6@b;;We|5@oKksqpNOhmn0'6~/ι)?D {o -@^i@+~b  p%Xb4Vb|݇Qȧ.HDኤ2pyoD@¬5|a1 Pָ@ lqT EwT ߻hG x+;uO?Q`xςlbdǃ4-C3AiQ(@[VdV$Ohd٢2bjlXfM=U6jx6bBN!x1b+a`%.8c^ -/_F-$1Չ -ec\Ltq"R5(bRJMTqĂƲ[X9mL"⢟3<`BYpS+&`OױD7HApb0U\~0ڽ@Nr I\ * 9; -Ӯ e - I{xCD]^%Ա#@XhqƉGU/ qh/@qcq%[HER&wÅȢȘIk(9LqE7ɋ~ 睑[هqJySX<`fmȬ#ӠЈ;Dr]D|pa8'fc6q+BTTb9pƲpr'zE0u`c-H -0#g S!8e~gͺA ci(Ќ2&a~̹+ D'B@/s#Ĭ C9̪*EbBԃJ U0l/C>ӨT}҉ڑ&0o$푔Q}!U -KX::Ks"&w k_!OZ%$@m &| 8 >2yYpk>"+љ݇Hi!84JQ<9\"X€\n*VɨE/tO\Ch `h-Vܤ 8ӟ7M6C ҃f |GJF$ С`*@ ]䂋4yyh T? րeQf8ԂGX+s6lc&7u`AMn0 -6ΛH`aE/uю~~ .<`L(FJ6+ ρ-8'lq` =1cE! ?nG6X5s߸8;bVc5 R~/e]AB X%[a gLMvP冞DvW{` ]q5/qd+gd'/c|Rd';QM1-̔| -~L>.K%ćl%V}T9@W,ʛ]Ɠ0^Ʊ@@..ʅ|xi -MA[Y 1W,I=RAV7ݠ> X V#TOivIy)V[DqySh *4 ]2WvEgIa]H8DM3?1㘳~CP0S׹g-H< l6|H+ -+;S6':0Έq*I0e`߻z׌"/8J0QZSKțI;BiM+.Z4ъN. @>T%;HVnP-/(zY@#<,=5мSkp(Dl['cibH7FSH(#۸*Cq :*AjERN\@3`?&q4;+Ė0ꈁċxy \%Sp\ƅYg"t<@E+nHFXKKdGāLn#؍%C@Xr4yqB_X<SvW4)\a U!"n98`|~F #|I4T-(Pˤ6y !IdLa)h |yR1h0\Kh] K^DC@dzMC sX S5sIxcbSG.z9g4 -i\n1N8} -މiQ$z!2N=(ȗx&~A`Qɶx*1㠣 -30%7Gg{DJf è - -Ou`tؠtJ;.NNiJ4 -U\L4vMbVаd/.s{ݘNfȍhklenK]F_R&_ٲbjTj7JX+vp)T(ZHil\*`J& fG."肂{\+cX\'24*<S:T/BZ{&WZ&jsAbO᫇+JyލFRm+QlIN]DImׂL8̗!,j7@eAH(=t&?1=dˌ6чgY4n -N4s6T贶~c|BxYUZaa5bɎ_* ҝC2cGgJ+PA3QYKw5&q2({[jlaY|V!PPY:סV6+|u%ф:XRTjL1,XYϴ[Oww[۬}, -#^:b$7+:O@e䘯n!0zg\a΂N`\eWܔ.k{lBd(P$ccqӲnti{36dc=?JԷbj/$@b7$;U_44l$?&+l4;Lw˅) 蠠PA&]ЅLŢrC[T --[&y} 6'WG/i3"70謲yu'38\7vo/ -l(Q WJSoiO̎pu(׷kT^-egTUgtk73<͌!BaM~" -WdzG͝K/'9[t(au)` ^ -83BitܫMՕ[nQ&THLa"b]TE;g3Rm)Hk΃Rc3bLeZ\ZY.76W.v=nFJvx")UYSO b)ίͭίVZJc-R}W6vX۸<d+@\mFW7$8*i.'ݭ{hG 1-[&}|4ƒ]KXkށP]g|yx̏&\*jV~Cp Dyuv|y/7<^<x4aaa镗V4*Q?D-jksOa&TǗ[;O5wV~q9T PoeGRmRJɪ>>^zמWy}7/fSLq-KE+)KJsSFxCbMHmSIg^/r}paʴᬶK7J;=27ʴ{ώNmn<\}uIT -Lq`pbcS^#Vgңuع?@, -S<-wWK7iv|j,ݒ+\\HE"J6l@0t2]]%WJu應6<KK͵+;7_Y>ylIePumxOO Y(@zt%;<<\:ztㅷ7}\YnJ==_;ת0j? a$Ӻ;bmU%Ve2[X.g;Kc -acPf{dYbmz)?ا2D,iݭ-X|^=w>C; KW-.x_dЫ-\?h?3<{7De2좟hu^j< f&2cQԖ=US4M LvO'lX>˶wL-o(3e(omd"FԢ c+-LV6`q%}]`-X?MVGO7N^}/}\_z}9+N]ysoox}:Z42yC68k"a+$bu5mn-OV~l?<+wv󹏂߀--]-W{wX}rz㧱T0:)\Kuҝko%;α֜'&1u ĭGJ}|>J@-.3km?e}e\ Mf#uB[zg2ƺTZjoSG1uJ˟`wxl}n\aM6T0. QDz$׶ +RͧZ[%h(_ݡ5"IWT lto_{%| I" Z87V۸9:~yDsH5*Fmzkrriz49\KTW|L֍jT*#R)joJQc/_m-bXT @V*T>o,^ 7@t=+mDG!J;T[q#l`sXW҉O˯շK6O;+w:9菱t/;?ЖYiTȎʨT* CAZ;O_zm?3[6W/9Ir~/L4p|paUZU={\qUkjum?I+ s|%kwǙN)Zuo׹dU4QH4lnyr/-( W|iqq; +ފ Rnz aL|MHrHC̻CyA#DD}KXNҕ5L{I"ǵ d -L&Srl,'`o qw^z^.T^!,׫*78 >:&oNY}ۼt2 J,L֔ڊXjJ{;(SPM'KNLy74 mߪܪm=+w ? -\A]D+kܔ2@=qmjHxbqGZJgF4%?ZPQn6w_뻘:$jֻt|c-L w >?[o܁HWV/y6%}E*jfZWmaVٸ=>~R.ڣ~"YI-ܐ́=joݟ%9"!#|>`\ -F"BXrPp~Bњq0:f+P*yw']X'x2QBB>,tA,R#0D KwP`)L,1jOru–JgCj/ÒED*:;g -buї"bֳۇb~at *۹uW^Zwֻ =71.2ELͽl gd3d\QJ Nu6@ھ\scSdQ 2TX#7*bbR%L>*T:I}yt~%4e:P 2WDвÚT+9S,J#ey>LJ\TRʶ@k}A9jO;U>RIa|utk>?}7mxp,5`uk_˚ZË2|VY &dz|~c\YT'W|x5SJu: /Uߦn\0A?aSD͎pR LռЭJ*-*"FXQ/RD&l܅ȰRr]mt,1)HfA}*([5f-W2ږ'0Jᢏ RdurƆ 0P -ln=޸ĕ,rdՍr\o N_lmO5̋~:iq5*Ӗ -Zs/:B,Rڂ_p@8#Cڃ\r44;bqGTg\ 멷HEZ(Ci}㬽sI_֗ZWڼ|6R"O`|6RŎPk7^h#.dztc8N7$>S*#[:(ڋ$ln$D}ת>!Sr?ίEE$%-s(Į~ΖQ.Au:<SptT yGf`rA*L-0uh"t"EFez%h؃܂-SR)Jg%t܆/]y"EpAMD;EWÌE[yI:3L{_nG-D-QϦʘwݔO!eB&:͵{'6.J5Zhh=.7}rFZ{-=(Omzb}TqfL;|fP{Dc3&wo?o?~}~|շۛWigzPb讴F[գ+O[o?Cg__W?/|/k*:SG҈HZ}>=>v3OK|O٭|ꣷy?/׿7?ōOsFU1>Ƥ3a1zn_|r794=?WíZcC>D bj-q/C .֏K^|?›͏=?zЋ'"3}2{jm,ՆW^^'Osލޘ߮vT?QHVt3HZsz9]׺+֟|g^ o}?'>;{=*a /*RAڦkէg.}ڳ<7ݯ|ۜwN{ '~*Op&!7CT.LqI'%|x_?{>ޏ~uVm-'B.߸v_G>/}G?_͏?׾O+W!>R25L֏ݿ^x?}[O~/['tz=`*dW.^{};soO~_7w/~ݭ+chWO./?/w?ٯ׏}s7{=Jj,x2{ͣw}~ѧw>տW?/gK`YWjKѵ[^|O>/~K?~/?/?o]GT)`NgT *J~w У| w??w~_~?o_?_~s_쫅 -y3LbIcuƳ_~}?w?㟿۽KT\zHZY^pt7?'_~|/7?ͿO~k~/bեѵ?/x+_ʯ~??o /j) -)hIg+o~cG>o~;Lӟ|+wo^{D̶ʸ2X/v -Kgo|Hz/I*3 h[̈ a3"22\Fzゥ,﫺MUW;W򍐄ĕp3 300\;Κ~'VuuUfĉ8g_O~?;?6:mF+J&+΅;W^_};䗟w7_}w+t4keK\TsJkkw>mp??_/~??䓯~}utO!6UPIi+'/_~O~?|;{wK݌I +DkJ+o7>~O~?~{-))iFpIG^7?~Oӯ_?z2<|@iI n_Ћr'bvxr+o|Ϳ귿o~?_~_|_o_ٺ,:~XNUbɗڋ6{ˋ;w|:y-SJB{0\T.[7z^s`co2t|s_|э{o<|rҪ2j12b\08$2{WlY?q^+O~˷nB-"]Pt \ז^{o~{}_tEh0 3.M;`a'gɝͭ=>w>+?_o^ݨ;jG. FKRFy5)պ[7=}ǿO~K_zƝBXo@fOO& д㒦#z7\o]v|}>˟{|x0YŊ0(P 02;w_y/޽7?_ݷ_}񭧯_?j~y>M]vyL2S>w?&Jo}KOxG?{_w\`%36D49)vBa'h[V^t`;:ŒfP'Lߋ0!$, cE5Q Y79aq6q,4-^Jgv hY̋24M%RlYn_>YUSi\،1x?d6yiZJBT5%˪Ed,MWѺǢD. -"!!JÅ ̧f'hUVKrR2XD#vYn[OWA(gjsV7mtO}.։pr)WSlx  T(+^wHg+.8pv`ΊqoLJ|JAsT!)ӂ! 'JXIsVg] -|,8y[`܊E*%,WSML8_5ORȒHdQ0@Zp̬a:f*TXUD6O&eE)ҊR*'QJH3l̓F/(.RTHWFWX0[<%0ل 0o@v`3SӶ&ߌba< E\"?$qs.Ij."ڴ 6H+{1 -v6{iXHcj֫Ah L HPռ >bVS.\/U?|C9aށY'jP)Lt 2Ȱ~f21rQQT, e?v?s3fxX!m%jE "VHsQ s¼5{X7xC6q$먘0&D)dX f$SE?BamhE$H]Iz75cGA9 RʴRK #fB~6yz>kBlsSy"$+[|Ly&̘/9uI -q'=+93n,=8tʄ 6B(ϛ33s&|F9ENܘ>eAkֆq`|lJHB5"c\LH`!cELa8v0665t5IU a P&t5H*M(ac #ącC(1Ҫ'3;_ -3);tX_QrcJ΃Ai<9qK馝`|gf!'.R}Rvp9RY4Vp%z.ۈLXS xt:-uOYLqI65<,8pQOׇ[׈H} -$RQm0ypzg]X7*BTt Ipk֎c"#p~K`&+Ds -%T\AW1*#BfIMp}xԆVD3C;.u9Qh&a EwѠb|~8{Ιy ZYťYʧ 2\sg',L)7Xf- BHpdq& 1di@\hqjnr $vfi0ig?;2@vﴶouf}4̪T;[ݛ2YBpy j&@P$LB?2nyMU1 s>*V4*P.Pu\H -W U;*Ը/ @r@S@6:3v̂G\ld:7!ZSMgl|Lf@tI<9of"<<\C㌶ssY',x*TI g 2"_L0qS:unָ)yPO/3I!RV_h  eNsH=%= UhxC0%Z}غ@t;u`8*XssX҆Rpy_؀ފwWnPZQ ^ - H3ssy'itcڨY'J`.+>u<9.&2!ln.C;pb@,_ 0PӾpA( jǧhsyݷ]YV2ˑ8h/\g]ҍWtim_} - Je5ڋK@|*jk %hȎINBǥߠ;pevW6r0W H&@Xг=R4ĦpHd} =CgShg-fEeP\VDe13%'7bc L (p0"4_0y\.9m9I V 3x(%P~ŽɅ)nRaEE3F,eLOYOON@UTj+RH:"sLRcuQ\SZ=7a4 INfos kl Z\4T\J\@ ':>*6iB ,%gCYgb PaΊ;x"\)^K:UƽXQmN&:5pZj͹p#dCDp%MkUH(](,3IqR=? `GnB6ʥ}B)z0bJ#好"jS8t-޽ir ݭ7_!/RrZZq'^? ( No[N26m 6GDzZ>/7!d1rjfMZ5pO-'n?oT -[% \z%ĊJ7Tv"2zXPܐQJ 4Ɓ4K@FlnA5Be 0Jz_k" `/myg\Kh )ּt w3fA)"Z@R0NźHF - fh+ץD!)bɓܼd(kpl+凈\CLaR(Eܸ7sX5z$+܍Fpx&<ޘӪVz,rH Tr/U=A/9P;*J0IJjfpM,o3>YJktE}k>w :͹i٤;t Ά #U7| T)o aS\nX2*&^L*9uPskѭMN6m%tR$jtQ)O(N@-s\;ribo xtK=z/Z8)BF -۱; \J04{8nsWZwn^u|4 H)om'ǵ o[Gp!\<0fa6x`&T;[t&=\.͋ByݔHL,Z%;| Ƞ!~$*wRÔ)$ @m[}4ƀʇKRa kH&qvHww6|wyTΕ).o^8yoW_S.5q>l͏`nRi/5wb^.C'E ͫx .2 pV~4RZN2[ dwNȜ adK0%TKHW׮_|Ȋ1>P\PRS6g#L p\\rSKxIm㮐_  _V6P !9PIrzeӊiflްV^}(?ݩߥI;!$p^Ib dza{b6S`RmM)+B)@q)kyEn?zh㽔嵣.;Κ%r1@EF+ZZ9zӏ}EĀ\I{ bx/39ZmRjDy/xPn &8 h^)|2(\zr=!!3h+ꔝ>gD\5Urg=wfF@3ˁHE[ ”?}jH(/ǣm'>& -RLrQcr"Xb^ /;{m+:)e& %*tlsfsNf"j!'wd^rgzjgL(i-HEO/jDy3(NVou_0j;/GhEqӘR;tԐ`,rI v -mbA]hg6r1Q_E QҍBz^ >)~+\zaB(1E4\y>DE@:#a2:*ŵHu|s`!5Ba&fCe>я@+;ڝS.Ly#b4] .xIUL>eAhpiu 8\>5 CD| pq8 -"KsFiM[9/7@bOw ->`Gݸ8cp X"Yw@Dd7By -a&c AՀt ԴܜkY?='8 -l!x(R.mVRKBv -0H)~Nyk|-n8<RL"KԂҝ(/[@ 8l4PKvllqp hp2{ N&=](C:R}\"%s!UOXqZ7xXGmY`6ic)']nmvFm⬘SH5R#PX3^OH8,^OVK/;rPh(#_|o#€ǂZ7nBf r g05nV/lGP*꽵cHH+,m~gλ;ln|+ް qGhJ#d|P)`{&H@fI7xǭo|MgNR!™Bv8ػ=õ/67n/V7NŔ )FdcCٍv!guZK&DFM@6>7ς`rd)$Z޵vgjnPd+[083ns:5AF2pbQ\Ԝc`%R*N*G_[ ˽ŽwЉH\drQ.4R 5R΃HtCtwrkw^Rsåk޿H'IPv#ܻxK{wޥ grg%$ Brԁ9sP2x+dBGEm`@HXTMERnhnK%JtGEk%.љfXqP@d VX? gt!UNT ;bkܻmǚ[Ru |\VWo _2)n:&u<ךLG7q 72Pϒ'4y' r(wD1CFLoo=}ﯿ7?m_#RZKţL{1_9h4xKFxn93;~BB Xɳs33 2o\ ;Յ˽[^چ+n&ᠣT\646d8To:^a496!0 |Pgm$n\&B91ٱ!/A)9? -ԕ Njx 8LEQ.Qy0\R2,2x11R.YJ<<GiM),? -V1[^Lt`{V1!6gf\v`? QCP>Vq.ꅅ/F[VF/0VBLs+lKFJ\BΎnE'dCTw@gf,Xs99n]r]$ν&NDͧ`dځY!yzQѥS~6%dFT .%Lmmq.e7(bO| -"P -Y`Ln(bNDt9 ˂HKՖ;Un(l"TP>,$8Y+ -DH 2&?H7Ck2ىY)#р9sg?}f̔uڊ:0'!kZgrA9g¸\1T 7gkf4W2T>mHpm=?g6:.8FBTh9 t "dnet)Xq ۨTTvVw~|O`*yJ\|@=;1x08³3> gu1BKŭ &Zsv.مõ+<0p9y"Wd6q1bcB!kN܆]j}>Kƌ` gLQ5bLxWrh(E'Xy1eK0#崔hZ{H6D3D_DY]83q9O l$Q -aktIYb.:Ë7Pa(W_38y;~JB歸сj4۱z(UGkGW_pMn}-] pw8e&uIeoAruN<äC؈ U!?mD׬0I-ӿ8.DG,荝xmez͏ JK'Ji5YՖyl!^Gds3gg6V UuRqtnŔR\Lv.2vhf%>ޢպZȵ=Zs$47`qa"w\tef)lB*Lp -WvTx]*.W+7{Z߼!:W*ՀRKv^t ^{qgʳgA;06f Od#e \epP_Die+ ZidhąhN/4zSfTVsSKc |bNB!gZ>6؀,eF.86)*5R0Rsǣ [ڕ'Jk\ŸM` j$xx?[+|=ԬYg ~vy'XR*rT<>_,77n\yr]%~6a1bbT+.~ ]ff/kX'xbkDJ[IMlpZ^-Ezx(ǣ;N\Q\,˹Za\ Wuց[QIƕbwEH-:0ya(;eM;I)@j(X]>l^wP -|_Lh9<~i޻Z6$\vQP2f' bxuÆgcrF);1}3&GAL4)D0ٹ_߾4l%8P݄@ŠZ+ 3nrAp÷1wXfX/_8|Yt+W]Z8e;ȸ@lG@}N?M<܄0BaeV2 \xqx76n}~Bf`ŕ@8n"\"Wa>cW ZE&>;]L{{Qa6ц\ZI-{6h=RfTq zAϔ{ўV.\?Ia$y߹Gf\\Joqun]RC.dڴRpgY1mX/"w<~Gk>P7rB(= |Arr{.N"R]oa=t/`&T@-Vz=9(-^[~R`Z=9nrq{/l_ja^~ޅ.>Z04?/UZ5i;%" P7!Vs޳3ΘH X`fkR=2ڡ.lABTWAFzW^>x\y] fzntp'RĕjbymsY!6hFBӋn/9aqs.l"7|{@.¨t݂8͛hTH +`(bcʒjpmxsg j~nn93 8LVeb_}_l4_l#8P@=j79dV<\kI{9'}ҭw Ëu}$0o2y#j%>vpuŒpep!ޟNLRQhT.Vù%ZK]N݄Foŏ߫ u,T ,|̴AV:)/Ds#1c@7=Tr(DFb&줻r#Liz"<T;.4'ŌMZAD8;ho~KV?>y-nj%58v;_/.|63pi=5]|'o5v{>O^*fy(lD$7cSHe޹vKJ'ۥcQ[ټs㵫{aw{7_W+7 -vzϊ/b.*"5d7 HӆRsҼތ>X̦XWsKBZօ2&7Psހ@@Wjw~}t˽ͣŵk/\|y[+>mokןظ=/|C+P~5޼zsqH:’-H^.*⊟WیRpaMuVixy bEv?\ &ՁFm΢͹XH)l(Tjn/^}6ѡwв "\V#e> "د:(tj5ܘ .=;Ȉ= a%Zh7.С4-.)V(4c0>JI(H'A\xI"<`sANZi'c4#f™Net5ZJV"pz!V^++D8*q>QFꋅUbIK"E`#&Z|ܤwv PRt "Z* .=~ojZ4;70YFK G1> Zr -xm5a\.@\$'kHulnťpv\=)cZ3ig0W/>_7^}K_ܺyxѫ7_m\;xdk'#}uqg]u0r~h͆*N&.VŗWOޮl/i,shrGؠ(np}R)R6.\rhS7@qb};d}43O = %MA@N)k`IpAuYf'|z.C> ;VD T)ǚzc5X5ͷTÁ R%;\v;.U5QzIg | fI!WL'J/1.cb#@5 zm\c@DTWJ̺h@̅m -qs~}tՐK*bSb$Wj/זXe'k|Wz#Cхn#+>#D/B' wS _3 XD]~+O`&PRa#ۻ<<|qKJa)N{w+JEo׫^}+w7d񥷾v\z9ھT^{hu]OwޕޛB&T WFoe;v$lEȹW?]1tՍ3yhXJV7[wXp|/}?H->eVw?t|D/<~GOpYvD4u&,عp+D|sJIVVNYМB893VBՍ 2jxP7{)+xÃK06%10gp#0$xMjB{O3k+׳ ZF -GRhYE9V-4Dk.TpA&VsC:5e׶Trۻ#-7KKWҒ2z 2=Œz%_Y֊|MR׆he T~LH#aih] -ƷaJ$M@M<|="ϸuO\W~B% ƴ/+M2+MeyMWWWi703 $@$,%(-vW$wD$x[TD]ٕy9V=רȩ;k-S30\> $onԁh j|,8m^ɷ7t:LHEL̄`@E<9qAAHT2]S -X -<~f&\dv 6h60NHs^~B.qfKSrfs1{yw0%|[hb 'BfP|/1,gp&iI18%3e<@,-띵l' -)ߕpa25żQ&RS oǨ0'c -iVJq1Jвl@.{"81 >u!!xzkgQ!Hq[}9,0Il -cTA-=?6r*`M@ -#0K(> -|Q(!&g@pR-J)H"(˙` ~~! 2.:>ߒZ\=yS%? NJN# 1Ly !"LJ!qy|1HD )01?:N--yK^tf6tLh WWr[\u^}?U ąPO(,ͻdgGD)g]Oy}dQ<}f !URt+WwL!!ȁx<œ)Pk3s @UF܄V˹v2WZs~$(d*m:{/Tw--pJ`9NTA#Jc2/C>l[.K{ \32LFI t_Od:/%*$%H!h{1rqz.vQNa\,"ęx1K:O 6yY -c* w*8# fK 9 -! !V.CHMfzRO(+2#PnCHF`.P\D("@0 -zA$Ibz]<]+.)0́ڇ_<5w x<1(F8)IUQDQƱ b' -N bpWq̜Ss<>?8-gE::=Y ClfKqÔ8`~ӔYçλ0H"xXj^X:fd -V#}rwAfUi#3g$Γ<HP۲Ή(3%U*I~rܿbp~~)( O *QGzrSK::)λww_>{772"湘Ic6V )w `$ -+XPg<b8kų S$P6J˧cP8#ZP-/ӪIi5AY ŀñbj)4lovto9¨ݽW^8z[=|Ѩe-(#?4'E x+9|*J>^>x߼O~ޤ٬p `m5! 8˵^0AZ;WO}_|ѕfi-#|=賳vB Á@Cm5J*H,Q.fKe:#3g] a} XD%Ubx{{oW}{W_7nnA =Kx rѵvuúqXWǭמ_{'[_xb9¼~ߢ7Q2N0He{•U/]x[y>_w矾?ۯ'?عzfqVRjyqc\KFs/r__{{c K^/♅Sχ<."Q\SRV6HñKo|Ƀos}Wh2opf=) b -h$.-5՗ot?w_[O7oo7r*nOIAI8`}o7_Woʇ_oW฾7fl-ZVI5ENlԄ;;7[{JƧ?W=_|ɵoWyr)mn/tn!PDA(KD="QUS=\ld}Kv7{!,, G緌-͗n|?ѿ~۟} 7!1$d -Ĥ]w6WKys'?[}?|o߼=,ecx E+j}zf+w}+ƍ|~G_;׏~}AZt b$ -aV?nmdw_;}񗟽7^_>>{+}0¾ AʲÒ2bM-x}?<>8ȼr+۟}䣷v}~|q5\;aWӖSNmP~;\чoO~O?~|Ǐ?_4T -&B3Q`B |җno9O}~_? ;?ƕֻw&v2e C F1&vo}P<~m_:7?ۿ/?8O?{߻V߹Qx|ҬpH iAJ֊fզqk>u[{'tO};_C0K |ekH{{_/?}IL2N@ jE/$ƳY˫ꏏJ?|k_Vޏ?[\\\oԫu(jX$ŦʗDt9gnndt'}w>zח_;i?[jt FRE %d&IUb<赝wO^/G~kO^n>9.*!D5P,k)!c;vgv7__~W~7}=-s&BJLmu3 /vo\ۯ}/?~~7^\j~\Qu)%df#JpX'Cm:aVI[+o=ͣyO]:u@tEq9CY1Yt)/j^6q(G_G77o=+f^4W6q$ ´`qaV4|.{Ϋ'?7;ovzWjec0 +4Fe0ez4 Qtsl6Ҷ~ul|o|?˷^~c$u -G4QxQn.[ȫL9%Jv/rsjdKlɲ@s(x윗:3̸gʐ EYuqʙLձ2*ktV˖QA(U ! - !C`zx4F\V+{jT֪[|uR\تiu}&J'`χ,т-O+g u$1X&K ͇"H(J?F/93ʎQIy^/ᬎbf i"F1lZF 䠚b9b -لfj`>3[%p2;hI#c굂9N6z+:ydpԌm?C IDCYlV2eEdW|r{/OZ K(P -R\Fw-S\jeesz>Km.q1H_FdQ¢|#p8{E? -< 1 $6 o8 8Rp 2`ٕs+H'Dx - lpzLeA+͘?RPe&EOτ~_~sO/.APBVU+eB`]Ri8.aL'dNJxyEɭHʉk ,Fm 8! -J1ؘ #aOuY%uD,J1>OP2]4,s!Z֡]3@Ltϟ q1.ϥZ@tVWz sv4>; \!5V/ݾ8 |}'.-F(LJ[{% +Ʌ;qD̢Z5.(Z-93^uJQbfr\\{+Vgl&Ԏ*,U.K7?;([!N=CZ I?nHk|f9Y0V'eܲڣ*g*E-dIR[K:LvZ\vQ+"(9 ]*R³.b.brj>,r,O8@l.HHH,Jٱpk6@ :,"[?.8br ?)sѓW̎܄ήRUH>H}LoJW_ T**`~ ;6ZZqLw%D[ BoZǹT MלVڐ\I8Ct&7V_#i!Lr!ݿj@A)AְYT*Qɟfb\ &b9HeD-oDy+XaC0&Pzdc岘 QM$#ӫ"Ejl1c ^va)"FdjGQlZF9f I9#2=Nm7nGP`p1"61K8=*;sjʁd_Ȏ!PGH'D|f vڹMj RTyt3ϟ=}dZKA$HZT:D; s&:9v@bbbq5,8^#> - -iwcyXxBPjj)ʼnOᥝX̏.Y|!8^:8Ad f֍cpNDF{ DICZ}W-ɒTX^iۨ![،KU(KNrfNa5*+jibsZykxbsݕ׸zT( ޵UA@:;/eW_H\1ʦnvLudT&VFk?LkJ.ȯީm0[+,` 0,2UB~U*mΚ.vS2ݭ;*+!32;W@jۃ2C57Iaǝ_Jrd(MvÌ3>|XE m .C蝋?t;gjrf+|aÍfPtƍG|Ɂ;WҮ+$(1~T'v sP3|iL -7 ;Dt΃Z~*'7Ɓ+.-LoQ6Ja+@|Q9d2VcQB$#P R-.c6e+W:i\q7M ń3B~VJhA#Y]0 m -tq1d'Byۃ훓2b\!\ߨ?*;j~_?yKV.z;۽kɽwY`$OC ײH{@MDdF7.^IV/ȥ^x "^][-6=}~ mc"u++:DJKfZ{A ^/|?yͯ`_z);:BLm:Gor9nlDh/iPm^~~6{Xۇ>a&mnKw47[uL;c*=>,d}⃣_ejiG-oUTr=SX~~ǹ!]ȏڶ> ./ rViqg!Ÿ(>^AuSqy.+wߒֿzj'L.25rܗ؃^DQ΄,MJe0q}LK G>`Bq RAPXAōtUqչ[}r7[zvzV[ qXX3ۗnWw:>ᝁ+Mnlƍ7juxuO@Bj5*%T!Rn5֯V'@^Evƥ; A -ɴL\\JB6n: 󜟄k(;</(]0eZ;\'jy5~h]sniRV"W% !; .X. .ns51 -Pil?,>_z! SKRe/m$⬗ ,Tm / ćh1`BSڎUDnk7 ֒K[v"eR)O$tR_c:Uư~af3}RZ\{'zc5;!bahK4H4/v_KFW~sڅ* g4kכf׷vouKt_ʎVǻW_ іzq Rc&[vu*E/vAv|{'Zqc{ 4wj޼&ڸ;]d ;Eju?nmނ.>ݖzRmܟ& wQo^/'kX]ƍf}h[Ӄ|vwܺد jnc/; ؄\@̲ZdZW^?%t6tKwgDk8 "OWҝ*0ke)aFd& fu/5.cs[saMuZ L1'LD`õN]B һ!9c @$Gp/AJʮbv.L] ZyY4; -l q& tICs9qeW:4a϶vSH9˵[E\+oT_jO۪WNvW__y5^4Ij0ݿf4H:/l_{Qk!.k g& ([R[r!ӏdvvFh Wl]iDb<ͧڽP~v Jf"~,?~[N^<5;Dh7bbm -%Xze -@DPbl&DյUy,aʩ]:x}d2ĥ|[3dU2VZ>Iw.VM2YeRi;>ʡ>Y&1H[1ގLo1B·p`3zA+ѩpvWjZ1fH6\qZi,dJ\0]plPȍ"LOh iTgҫ0@|zE -g{}:q,Tm·9r]fW+o1@$e>~e;LaݗH5BlHG\զ`V:$! ~{@ .frM9ۃb+J$=7 G2)05G; LsWBa  -SB 9`.NJ.`{zyهBs%R1/u03 JX<\P2UЬ_uXgxJ "+.$͸\qȩo1ݗQd\#ԪsnOo9#9hяV5U&7m!79Yn -,L;ͩ&'aY;JMzG:h7db ]輟2ky?f|]9.&DfjRצ5E;fvT  #gDgP{iTa'&ېk؃+Q2(ڪJ1!i\.m旯ƷPnfz{g[wƹ0 -Vޣ @ +Q+ Ʃt2-TkGb> 1QҠZީNWY' 5j('|~HЁY<b R~=;]͍o'AFWjİ5@^Ow 8ܽ -$f҈eV/:3t1-Ι~.@v6 QJ&&Pt6"59IUVݨ}uQ)m -lf.v֝ EQXy[{%(g}); HP?9m#," hoa6MH!"(|`pf_ i߂ \1z.G+B$6CsM 3Ɯ>ϺID5ąi c X&Rdd'H4$~|A2v%Tb>.YgY*VKè7F ҫW:h^, př #e^ cTT 8/f&abs"xILoWy1˒ӣ~σ#ZZVv17t:; 3zNTXO$+޾\I ([JuVIzamYTV9=(N7?Uͬ`mNut3X+;>u6=EP(BX7sk }.HS k\ A܊U6XKZc27Ct&.#/A̹%RZn 0Ź7 -tќƧd +!%s^cvB0 X;3d71GL`7bU'kQ*, ^5w?ƞ "Ңl?'G$3q-}o>c>{Li})8_;Bi^ύaFwn8(mD1vW('0SRa>MMl4.L).݋fKNkzems+zQfTZQ*9&LoLZBH`*ɦ (& c\rNk rPd -ܕT -K0th7w(B*=ʯj=~#9%jvcӅַ;W/\߾V9]醥ŘAlf0e/)O@2PrcEz PЏj^wLZC,Սr1!eQ*f4M2Fʙfe=1#!Wq5˜ 0&&"֢Ӟ([!ҙQmko -F +5ohP\Xv'LfpbJΜ< rx aB0O6/,zb&: 5$^j~to*rf@bz&>$sXhǔk@R 8V^33A$Lc^j)ϭĝXV+& rC . !%#," -$V{E+r3>䩹?Zg1"c*"XU1BKU7\R3' -v!.="ܸ'3X+0Y͏NkK܄ XB{veM5fR)ru6ȝ^DxpleZ;^XR1UYY#lh~u3BM1;k=>'tO)_B0W&8aTO[XgNy_ʋ0 z#]y.==;4Zg=x(<ы(_39Dj.EPfJcL!u!xH/+3nsg|!:>Dآ Iޘ7j[anp1|,W%ƹ:B V#ea՗0d:Yުn ;@qJ`|rtAef6skqgŘ!|$!F1ϸO!qN-*g!ROrL!bv柙 Jrl/Ą_ $taʈshpfKDH;meI8Hy@y?nU+ՌBoqUGe`C,A4{B~j0Z#!Wj"՞+3!.d27uwqg |a6ir3/A'F]/ -T=Ś#BzdbL|HFX6m\;@BoudѺlf^`d:f1)MPНAM(v -@ڹTg\¬Ťf# RA2F) sĴ[5F>% Ac gd+h]ӋRn/ ""V˜4p̻֚'@J7@2&aAWX bbB 0 @ba&ΕdMvCL$8!8?? p|fD\&̕sAsgc|KuB0 -,6%BhJ~̘m"Y!Wh+$8qN(E\ LftZ|nvP(nyPLbKMMn,;*B(g\3e.Fyg ;qSZਖ਼%&%-@\ikڧWz W* x-&9~KCD n5"ʤyQ-FjmU7p>m9K1Ķ;&A\@,&e.H rcG .=u-+ ~7 I [0@$M\bRR*UY9UY]]m5cUf=m6m66o404sX." E*%q?g?ϙX)/3M8Tf h/BM&Mj,|6:wc|!'ϲoFfd࢙׈W[WṗFzOMLo^6LI@6gj{xӋNڝ`_e%VlWS{ɅG33Ԛ}`<5]X,0X}T5f㫏`|sf8=~12E,{(Ent袑\Xz`$cb~2Xr8p3;M,Z{jdz J<۹8ν&ց HTvlf/9f-O`5KТ($lT`U'r/@&¯#ӻ`.~h95 }@M鵙7^n,/Dtd˾C{ /޾Ԟyΐ> @Yfuvd#ny`GG /7' S,qt3jeC/Z]?\|Ĝ-ч߀j4>U|92\ _|Ӌ/ZjlN,7_k(-XUob 35 VpvjCtf{l}bY /$db/ZOe_MΕ&=[j ؘ񕑹?NndPѹ 3+gH,9xnwbfjg(18&ǷXgBGԊ x<kлf L[uRK?~Zg6ٍ[@[]酃亙ȃRmǁcL-Ƨ+Pfne*›H6 1z6R$WO]vY<2"6<!0)=Z)?Cs_@N=IPz퓿3Css@"1Zk^;qWJ-16,>;s{04ښZ9'CMur9 6f.xAКf6/Uv Q .+/TN&_d<~xI36W?o^#1'sg 8~4{/|y&fȩWO/F3ORӿ' -VUr_WcԭcNoXٿoHjq<Ϯn_ٺ%c8KdUxfǼҫ㟆sOxv3jOSnz-TvjL>&sF^nל='v -rrxbiŻ5]ktl%n15ovb衛ǎfgӡQˮ ҋK#;x` WMoH,Ll=&]jd(6y,LJQsWgZtX:yFd@>I@K+^T5'V#g~Eg=S&7'g6/AFWmzHuuh3'ow_sng~ ?JùT vM/!mYUn*t 3q&wNjx8M,%7FgVt7c'6XzrEnTflpmqd%\o\Iv0XF@&sO1/\&*6+䶇s ='Cb$)%Nrr -[j\q4[3gδ]p@-a?.E_ :yFcK㹽+?c1o*v<~W``s۠.}04e^X9Ƕ~{.5 -~'S/zmjė}V|n46 7i ߀XHȂ*$Η_-}b“9^_%srr'qmz,M5~![/9ԞJ,7ٝ7>aacew{uluO&Szٓ k&/3ש#c`gvci%P0!1/^~%']8?gٍvf|w_|+һ#Ys57S_<Ξkgff\:b5] Sk2O>5Mq*+F|Lٍꅙ\@Չ%W -':z: >g<v|J.OSO8d˩fv鷲ߦ^BhO':ɥx88S_Mn^Ζ#`6ʱn"lSϜ=18:[<+ſ^+NK/L`$˫G:뷧YY1  ,<4ƽQ,1韀vr5&[^x| _=vt|zG9;wtwş@-䋾80Tv7:j>Gg -0dm$nLEg=6 v|`8k/3s_7ӟXxǺl˖WyS# >g̀o2Wh̋x|3{Dk\tt1 :ptblft;4lu;ئH4XI.i<2T3_cz 06߮1S5R>z^v7OfvlIᩕ A7ױwOFbdͽI]V9Xk5 -߽῭w7|^tzmnt'>! OH}B@mnt'>! OH}B@mnt'>! OH}B@mnt'>! OH}B@mnt'>! OH}B@mnt'>! OH}B@mnt{O>s{?<;(\>l#g,K6C{Cr|~V|Dd8ߦ'G⑾0?21iEJH?8G/G3\.NJ8όwuLi $GF\ٶaڦaҌUJ:RYƫN*-SʵǂljxckW5?쬍[I:m<˸Y^?\mC -Q*uysuP?"e|vT @ G?.e'C8]AC3?,oOO(Ls]"`A. k哃]!#Cg_.a< 0 >;uF_|\*_gS_? )\Sػցzm|ex:9;)ou |-!S0''Dž=26&m rtV,$|s_yUG-Cuvs:_..Եt1 e W7mm||]E -ր{EOԺ:*e`^nN{[dY@͙f)zj;U>!ISX>keuȪwt -b)sY8.ؾvv>?8*_E_dHkyCH<4NCQB44N8BW'siսkk : : :}}iuv-4*}Ha*.,߄ŀ"K\]n]]L^ 8vڻ:-L\8K -kwcA⠃ ڐmSëb e&q:&O/jtIw'mSBSan. ŒNnB(on!N:c7'u FN8?+=j4 W֗Z-zĕaS۾N*: |[~_n6˚Zyen>0vP*Nanc KW;v6 >l 6 2;QXw׮"wx^etF@/ -㏖!GB|H;8{,gtyTueͫm6LL$Lt0qٷ^Qod} -endstream endobj 18 0 obj [/ICCBased 145 0 R] endobj 5 0 obj <> endobj 36 0 obj [/View/Design] endobj 37 0 obj <>>> endobj 135 0 obj [134 0 R] endobj 159 0 obj <> endobj xref -0 160 -0000000004 65535 f -0000000016 00000 n -0000000162 00000 n -0000038296 00000 n -0000000000 00000 f -0000660814 00000 n -0000000000 00000 f -0000038347 00000 n -0000000000 00000 f -0000047288 00000 n -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000660778 00000 n -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000660884 00000 n -0000660915 00000 n -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000000000 00000 f -0000048496 00000 n -0000661000 00000 n -0000038724 00000 n -0000051489 00000 n -0000048802 00000 n -0000048688 00000 n -0000047349 00000 n -0000047931 00000 n -0000047981 00000 n -0000048570 00000 n -0000048602 00000 n -0000048839 00000 n -0000051565 00000 n -0000051953 00000 n -0000053322 00000 n -0000056798 00000 n -0000122388 00000 n -0000136058 00000 n -0000201648 00000 n -0000267238 00000 n -0000332828 00000 n -0000398418 00000 n -0000464008 00000 n -0000529598 00000 n -0000595188 00000 n -0000661027 00000 n -trailer -<<75CCD106EB1AB944B62EB6E6C5855A27>]>> -startxref -661214 -%%EOF diff --git a/.assets/old_visuals/exegol_logo.jpg b/.assets/old_visuals/exegol_logo.jpg deleted file mode 100644 index d5e89772..00000000 Binary files a/.assets/old_visuals/exegol_logo.jpg and /dev/null differ diff --git a/.assets/old_visuals/exegol_logo.png b/.assets/old_visuals/exegol_logo.png deleted file mode 100644 index 28c1a3ba..00000000 Binary files a/.assets/old_visuals/exegol_logo.png and /dev/null differ diff --git a/.assets/overviews.drawio b/.assets/overviews.drawio deleted file mode 100644 index 5971b3a4..00000000 --- a/.assets/overviews.drawio +++ /dev/null @@ -1,359 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/.assets/rounded_social_preview.png b/.assets/rounded_social_preview.png deleted file mode 100644 index 13f99864..00000000 Binary files a/.assets/rounded_social_preview.png and /dev/null differ diff --git a/.assets/rounded_social_preview.xcf b/.assets/rounded_social_preview.xcf deleted file mode 100644 index 1207e320..00000000 Binary files a/.assets/rounded_social_preview.xcf and /dev/null differ diff --git a/.assets/rounded_social_preview_with_border.png b/.assets/rounded_social_preview_with_border.png deleted file mode 100644 index 4db283a2..00000000 Binary files a/.assets/rounded_social_preview_with_border.png and /dev/null differ diff --git a/.assets/rounded_social_preview_with_border.xcf b/.assets/rounded_social_preview_with_border.xcf deleted file mode 100644 index 0acf9467..00000000 Binary files a/.assets/rounded_social_preview_with_border.xcf and /dev/null differ diff --git a/.assets/social_preview.png b/.assets/social_preview.png deleted file mode 100644 index 32aa1f5e..00000000 Binary files a/.assets/social_preview.png and /dev/null differ diff --git a/.assets/social_preview.xcf b/.assets/social_preview.xcf deleted file mode 100644 index 3102971f..00000000 Binary files a/.assets/social_preview.xcf and /dev/null differ diff --git a/.assets/social_preview_transparent.png b/.assets/social_preview_transparent.png deleted file mode 100644 index dd948b08..00000000 Binary files a/.assets/social_preview_transparent.png and /dev/null differ diff --git a/.assets/social_preview_transparent.xcf b/.assets/social_preview_transparent.xcf deleted file mode 100644 index f16e0e81..00000000 Binary files a/.assets/social_preview_transparent.xcf and /dev/null differ diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 00000000..7d07d70c --- /dev/null +++ b/.gitattributes @@ -0,0 +1 @@ +* text=lf diff --git a/.github/workflows/entrypoint.yml b/.github/workflows/entrypoint.yml deleted file mode 100644 index ff5b96b7..00000000 --- a/.github/workflows/entrypoint.yml +++ /dev/null @@ -1,27 +0,0 @@ -name: Build doc - -on: - push: - paths-ignore: - - ".github/**" - pull_request: - paths-ignore: - - ".github/**" - - -jobs: - build: - name: Build doc - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@master - with: - submodules: true - - name: Set up Python - uses: actions/setup-python@v4 - with: - python-version: "3.12" - - name: Install requirements - run: python -m pip install --user -r ./requirements.txt - - name: Build docs - run: make html diff --git a/.github/workflows/entrypoint_release.yml b/.github/workflows/entrypoint_release.yml new file mode 100644 index 00000000..45903f78 --- /dev/null +++ b/.github/workflows/entrypoint_release.yml @@ -0,0 +1,21 @@ +name: Deploy to Cloudflare Pages +on: [push] +jobs: + deploy: + runs-on: ubuntu-latest + permissions: + contents: read + deployments: write + name: Deploy to Cloudflare Pages + steps: + - name: Checkout + uses: actions/checkout@main + - name: Build + run: npm install && npm run docs:build + - name: Publish + uses: cloudflare/wrangler-action@v3 + with: + apiToken: ${{ secrets.CLOUDFLARE_API_TOKEN }} + accountId: ${{ secrets.CLOUDFLARE_ACCOUNT_ID }} + gitHubToken: ${{ secrets.GITHUB_TOKEN }} + command: pages deploy docs/.vitepress/dist --project-name=exegol-docs diff --git a/.gitignore b/.gitignore index 6ad0b7d6..55e7511a 100644 --- a/.gitignore +++ b/.gitignore @@ -1,112 +1,20 @@ +# Node modules +node_modules/ -# Byte-compiled / optimized / DLL files -__pycache__/ -*.py[cod] -*$py.class - -# C extensions -*.so - -# Distribution / packaging -.Python -env/ -build/ -develop-eggs/ -dist/ -downloads/ -eggs/ -.eggs/ -lib/ -lib64/ -parts/ -sdist/ -var/ -wheels/ -*.egg-info/ -.installed.cfg -*.egg - -# PyInstaller -# Usually these files are written by a python script from a template -# before PyInstaller builds the exe, so as to inject date/other infos into it. -*.manifest -*.spec - -# Installer logs -pip-log.txt -pip-delete-this-directory.txt - -# Unit test / coverage reports -htmlcov/ -.tox/ -.coverage -.coverage.* -.cache -nosetests.xml -coverage.xml -*.cover -.hypothesis/ - -# Translations -*.mo -*.pot - -# Django stuff: -*.log -local_settings.py - -# Flask stuff: -instance/ -.webassets-cache - -# Scrapy stuff: -.scrapy - -# Sphinx documentation -docs/_build/ - -# PyBuilder -target/ - -# Jupyter Notebook -.ipynb_checkpoints - -# pyenv -.python-version - -# celery beat schedule file -celerybeat-schedule +# PyCharm and Python workspace +.idea/ -# SageMath parsed files -*.sage.py +# VitePress build output +docs/.vitepress/dist/ +docs/.vitepress/.temp/ -# dotenv -.env +# VitePress cache +docs/.vitepress/cache/ # virtualenv .venv venv/ ENV/ -# Spyder project settings -.spyderproject -.spyproject - -# Rope project settings -.ropeproject - -# mkdocs documentation -/site - -# mypy -.mypy_cache/ - -# PyCharm and Python workspace -.idea/ - -# Build logs for debugging -.build.log - -# draw.io backup files -*.drawio.bkp -*.drawio.dtmp \ No newline at end of file +# macOS system files +.DS_Store diff --git a/.readthedocs.yaml b/.readthedocs.yaml deleted file mode 100644 index eb9f7a4e..00000000 --- a/.readthedocs.yaml +++ /dev/null @@ -1,24 +0,0 @@ -# .readthedocs.yaml -# Read the Docs configuration file -# See https://docs.readthedocs.io/en/stable/config-file/v2.html for details - -# Required -version: 2 - -# Set the version of Python and other tools you might need -build: - os: ubuntu-22.04 - tools: - python: "3.11" - -# Build documentation in the docs/ directory with Sphinx -sphinx: - configuration: source/conf.py - -# If using Sphinx, optionally build your docs in additional formats such as PDF -formats: all - -# Optionally declare the Python requirements required to build your docs -python: - install: - - requirements: requirements.txt \ No newline at end of file diff --git a/LICENSE b/LICENSE index f288702d..3997b4ea 100644 --- a/LICENSE +++ b/LICENSE @@ -1,674 +1,112 @@ - GNU GENERAL PUBLIC LICENSE - Version 3, 29 June 2007 - - Copyright (C) 2007 Free Software Foundation, Inc. - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. - - Preamble - - The GNU General Public License is a free, copyleft license for -software and other kinds of works. - - The licenses for most software and other practical works are designed -to take away your freedom to share and change the works. By contrast, -the GNU General Public License is intended to guarantee your freedom to -share and change all versions of a program--to make sure it remains free -software for all its users. We, the Free Software Foundation, use the -GNU General Public License for most of our software; it applies also to -any other work released this way by its authors. You can apply it to -your programs, too. - - When we speak of free software, we are referring to freedom, not -price. Our General Public Licenses are designed to make sure that you -have the freedom to distribute copies of free software (and charge for -them if you wish), that you receive source code or can get it if you -want it, that you can change the software or use pieces of it in new -free programs, and that you know you can do these things. - - To protect your rights, we need to prevent others from denying you -these rights or asking you to surrender the rights. Therefore, you have -certain responsibilities if you distribute copies of the software, or if -you modify it: responsibilities to respect the freedom of others. - - For example, if you distribute copies of such a program, whether -gratis or for a fee, you must pass on to the recipients the same -freedoms that you received. You must make sure that they, too, receive -or can get the source code. And you must show them these terms so they -know their rights. - - Developers that use the GNU GPL protect your rights with two steps: -(1) assert copyright on the software, and (2) offer you this License -giving you legal permission to copy, distribute and/or modify it. - - For the developers' and authors' protection, the GPL clearly explains -that there is no warranty for this free software. For both users' and -authors' sake, the GPL requires that modified versions be marked as -changed, so that their problems will not be attributed erroneously to -authors of previous versions. - - Some devices are designed to deny users access to install or run -modified versions of the software inside them, although the manufacturer -can do so. This is fundamentally incompatible with the aim of -protecting users' freedom to change the software. The systematic -pattern of such abuse occurs in the area of products for individuals to -use, which is precisely where it is most unacceptable. Therefore, we -have designed this version of the GPL to prohibit the practice for those -products. If such problems arise substantially in other domains, we -stand ready to extend this provision to those domains in future versions -of the GPL, as needed to protect the freedom of users. - - Finally, every program is threatened constantly by software patents. -States should not allow patents to restrict development and use of -software on general-purpose computers, but in those that do, we wish to -avoid the special danger that patents applied to a free program could -make it effectively proprietary. To prevent this, the GPL assures that -patents cannot be used to render the program non-free. - - The precise terms and conditions for copying, distribution and -modification follow. - - TERMS AND CONDITIONS - - 0. Definitions. - - "This License" refers to version 3 of the GNU General Public License. - - "Copyright" also means copyright-like laws that apply to other kinds of -works, such as semiconductor masks. - - "The Program" refers to any copyrightable work licensed under this -License. Each licensee is addressed as "you". "Licensees" and -"recipients" may be individuals or organizations. - - To "modify" a work means to copy from or adapt all or part of the work -in a fashion requiring copyright permission, other than the making of an -exact copy. The resulting work is called a "modified version" of the -earlier work or a work "based on" the earlier work. - - A "covered work" means either the unmodified Program or a work based -on the Program. - - To "propagate" a work means to do anything with it that, without -permission, would make you directly or secondarily liable for -infringement under applicable copyright law, except executing it on a -computer or modifying a private copy. Propagation includes copying, -distribution (with or without modification), making available to the -public, and in some countries other activities as well. - - To "convey" a work means any kind of propagation that enables other -parties to make or receive copies. Mere interaction with a user through -a computer network, with no transfer of a copy, is not conveying. - - An interactive user interface displays "Appropriate Legal Notices" -to the extent that it includes a convenient and prominently visible -feature that (1) displays an appropriate copyright notice, and (2) -tells the user that there is no warranty for the work (except to the -extent that warranties are provided), that licensees may convey the -work under this License, and how to view a copy of this License. If -the interface presents a list of user commands or options, such as a -menu, a prominent item in the list meets this criterion. - - 1. Source Code. - - The "source code" for a work means the preferred form of the work -for making modifications to it. "Object code" means any non-source -form of a work. - - A "Standard Interface" means an interface that either is an official -standard defined by a recognized standards body, or, in the case of -interfaces specified for a particular programming language, one that -is widely used among developers working in that language. - - The "System Libraries" of an executable work include anything, other -than the work as a whole, that (a) is included in the normal form of -packaging a Major Component, but which is not part of that Major -Component, and (b) serves only to enable use of the work with that -Major Component, or to implement a Standard Interface for which an -implementation is available to the public in source code form. A -"Major Component", in this context, means a major essential component -(kernel, window system, and so on) of the specific operating system -(if any) on which the executable work runs, or a compiler used to -produce the work, or an object code interpreter used to run it. - - The "Corresponding Source" for a work in object code form means all -the source code needed to generate, install, and (for an executable -work) run the object code and to modify the work, including scripts to -control those activities. However, it does not include the work's -System Libraries, or general-purpose tools or generally available free -programs which are used unmodified in performing those activities but -which are not part of the work. For example, Corresponding Source -includes interface definition files associated with source files for -the work, and the source code for shared libraries and dynamically -linked subprograms that the work is specifically designed to require, -such as by intimate data communication or control flow between those -subprograms and other parts of the work. - - The Corresponding Source need not include anything that users -can regenerate automatically from other parts of the Corresponding -Source. - - The Corresponding Source for a work in source code form is that -same work. - - 2. Basic Permissions. - - All rights granted under this License are granted for the term of -copyright on the Program, and are irrevocable provided the stated -conditions are met. This License explicitly affirms your unlimited -permission to run the unmodified Program. The output from running a -covered work is covered by this License only if the output, given its -content, constitutes a covered work. This License acknowledges your -rights of fair use or other equivalent, as provided by copyright law. - - You may make, run and propagate covered works that you do not -convey, without conditions so long as your license otherwise remains -in force. You may convey covered works to others for the sole purpose -of having them make modifications exclusively for you, or provide you -with facilities for running those works, provided that you comply with -the terms of this License in conveying all material for which you do -not control copyright. Those thus making or running the covered works -for you must do so exclusively on your behalf, under your direction -and control, on terms that prohibit them from making any copies of -your copyrighted material outside their relationship with you. - - Conveying under any other circumstances is permitted solely under -the conditions stated below. Sublicensing is not allowed; section 10 -makes it unnecessary. - - 3. Protecting Users' Legal Rights From Anti-Circumvention Law. - - No covered work shall be deemed part of an effective technological -measure under any applicable law fulfilling obligations under article -11 of the WIPO copyright treaty adopted on 20 December 1996, or -similar laws prohibiting or restricting circumvention of such -measures. - - When you convey a covered work, you waive any legal power to forbid -circumvention of technological measures to the extent such circumvention -is effected by exercising rights under this License with respect to -the covered work, and you disclaim any intention to limit operation or -modification of the work as a means of enforcing, against the work's -users, your or third parties' legal rights to forbid circumvention of -technological measures. - - 4. Conveying Verbatim Copies. - - You may convey verbatim copies of the Program's source code as you -receive it, in any medium, provided that you conspicuously and -appropriately publish on each copy an appropriate copyright notice; -keep intact all notices stating that this License and any -non-permissive terms added in accord with section 7 apply to the code; -keep intact all notices of the absence of any warranty; and give all -recipients a copy of this License along with the Program. - - You may charge any price or no price for each copy that you convey, -and you may offer support or warranty protection for a fee. - - 5. Conveying Modified Source Versions. - - You may convey a work based on the Program, or the modifications to -produce it from the Program, in the form of source code under the -terms of section 4, provided that you also meet all of these conditions: - - a) The work must carry prominent notices stating that you modified - it, and giving a relevant date. - - b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - "keep intact all notices". - - c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it. - - d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so. - - A compilation of a covered work with other separate and independent -works, which are not by their nature extensions of the covered work, -and which are not combined with it such as to form a larger program, -in or on a volume of a storage or distribution medium, is called an -"aggregate" if the compilation and its resulting copyright are not -used to limit the access or legal rights of the compilation's users -beyond what the individual works permit. Inclusion of a covered work -in an aggregate does not cause this License to apply to the other -parts of the aggregate. - - 6. Conveying Non-Source Forms. - - You may convey a covered work in object code form under the terms -of sections 4 and 5, provided that you also convey the -machine-readable Corresponding Source under the terms of this License, -in one of these ways: - - a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange. - - b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge. - - c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b. - - d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements. - - e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d. - - A separable portion of the object code, whose source code is excluded -from the Corresponding Source as a System Library, need not be -included in conveying the object code work. - - A "User Product" is either (1) a "consumer product", which means any -tangible personal property which is normally used for personal, family, -or household purposes, or (2) anything designed or sold for incorporation -into a dwelling. In determining whether a product is a consumer product, -doubtful cases shall be resolved in favor of coverage. For a particular -product received by a particular user, "normally used" refers to a -typical or common use of that class of product, regardless of the status -of the particular user or of the way in which the particular user -actually uses, or expects or is expected to use, the product. A product -is a consumer product regardless of whether the product has substantial -commercial, industrial or non-consumer uses, unless such uses represent -the only significant mode of use of the product. - - "Installation Information" for a User Product means any methods, -procedures, authorization keys, or other information required to install -and execute modified versions of a covered work in that User Product from -a modified version of its Corresponding Source. The information must -suffice to ensure that the continued functioning of the modified object -code is in no case prevented or interfered with solely because -modification has been made. - - If you convey an object code work under this section in, or with, or -specifically for use in, a User Product, and the conveying occurs as -part of a transaction in which the right of possession and use of the -User Product is transferred to the recipient in perpetuity or for a -fixed term (regardless of how the transaction is characterized), the -Corresponding Source conveyed under this section must be accompanied -by the Installation Information. But this requirement does not apply -if neither you nor any third party retains the ability to install -modified object code on the User Product (for example, the work has -been installed in ROM). - - The requirement to provide Installation Information does not include a -requirement to continue to provide support service, warranty, or updates -for a work that has been modified or installed by the recipient, or for -the User Product in which it has been modified or installed. Access to a -network may be denied when the modification itself materially and -adversely affects the operation of the network or violates the rules and -protocols for communication across the network. - - Corresponding Source conveyed, and Installation Information provided, -in accord with this section must be in a format that is publicly -documented (and with an implementation available to the public in -source code form), and must require no special password or key for -unpacking, reading or copying. - - 7. Additional Terms. - - "Additional permissions" are terms that supplement the terms of this -License by making exceptions from one or more of its conditions. -Additional permissions that are applicable to the entire Program shall -be treated as though they were included in this License, to the extent -that they are valid under applicable law. If additional permissions -apply only to part of the Program, that part may be used separately -under those permissions, but the entire Program remains governed by -this License without regard to the additional permissions. - - When you convey a copy of a covered work, you may at your option -remove any additional permissions from that copy, or from any part of -it. (Additional permissions may be written to require their own -removal in certain cases when you modify the work.) You may place -additional permissions on material, added by you to a covered work, -for which you have or can give appropriate copyright permission. - - Notwithstanding any other provision of this License, for material you -add to a covered work, you may (if authorized by the copyright holders of -that material) supplement the terms of this License with terms: - - a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or - - b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or - - c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or - - d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or - - e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or - - f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors. - - All other non-permissive additional terms are considered "further -restrictions" within the meaning of section 10. If the Program as you -received it, or any part of it, contains a notice stating that it is -governed by this License along with a term that is a further -restriction, you may remove that term. If a license document contains -a further restriction but permits relicensing or conveying under this -License, you may add to a covered work material governed by the terms -of that license document, provided that the further restriction does -not survive such relicensing or conveying. - - If you add terms to a covered work in accord with this section, you -must place, in the relevant source files, a statement of the -additional terms that apply to those files, or a notice indicating -where to find the applicable terms. - - Additional terms, permissive or non-permissive, may be stated in the -form of a separately written license, or stated as exceptions; -the above requirements apply either way. - - 8. Termination. - - You may not propagate or modify a covered work except as expressly -provided under this License. Any attempt otherwise to propagate or -modify it is void, and will automatically terminate your rights under -this License (including any patent licenses granted under the third -paragraph of section 11). - - However, if you cease all violation of this License, then your -license from a particular copyright holder is reinstated (a) -provisionally, unless and until the copyright holder explicitly and -finally terminates your license, and (b) permanently, if the copyright -holder fails to notify you of the violation by some reasonable means -prior to 60 days after the cessation. - - Moreover, your license from a particular copyright holder is -reinstated permanently if the copyright holder notifies you of the -violation by some reasonable means, this is the first time you have -received notice of violation of this License (for any work) from that -copyright holder, and you cure the violation prior to 30 days after -your receipt of the notice. - - Termination of your rights under this section does not terminate the -licenses of parties who have received copies or rights from you under -this License. If your rights have been terminated and not permanently -reinstated, you do not qualify to receive new licenses for the same -material under section 10. - - 9. Acceptance Not Required for Having Copies. - - You are not required to accept this License in order to receive or -run a copy of the Program. Ancillary propagation of a covered work -occurring solely as a consequence of using peer-to-peer transmission -to receive a copy likewise does not require acceptance. However, -nothing other than this License grants you permission to propagate or -modify any covered work. These actions infringe copyright if you do -not accept this License. Therefore, by modifying or propagating a -covered work, you indicate your acceptance of this License to do so. - - 10. Automatic Licensing of Downstream Recipients. - - Each time you convey a covered work, the recipient automatically -receives a license from the original licensors, to run, modify and -propagate that work, subject to this License. You are not responsible -for enforcing compliance by third parties with this License. - - An "entity transaction" is a transaction transferring control of an -organization, or substantially all assets of one, or subdividing an -organization, or merging organizations. If propagation of a covered -work results from an entity transaction, each party to that -transaction who receives a copy of the work also receives whatever -licenses to the work the party's predecessor in interest had or could -give under the previous paragraph, plus a right to possession of the -Corresponding Source of the work from the predecessor in interest, if -the predecessor has it or can get it with reasonable efforts. - - You may not impose any further restrictions on the exercise of the -rights granted or affirmed under this License. For example, you may -not impose a license fee, royalty, or other charge for exercise of -rights granted under this License, and you may not initiate litigation -(including a cross-claim or counterclaim in a lawsuit) alleging that -any patent claim is infringed by making, using, selling, offering for -sale, or importing the Program or any portion of it. - - 11. Patents. - - A "contributor" is a copyright holder who authorizes use under this -License of the Program or a work on which the Program is based. The -work thus licensed is called the contributor's "contributor version". - - A contributor's "essential patent claims" are all patent claims -owned or controlled by the contributor, whether already acquired or -hereafter acquired, that would be infringed by some manner, permitted -by this License, of making, using, or selling its contributor version, -but do not include claims that would be infringed only as a -consequence of further modification of the contributor version. For -purposes of this definition, "control" includes the right to grant -patent sublicenses in a manner consistent with the requirements of -this License. - - Each contributor grants you a non-exclusive, worldwide, royalty-free -patent license under the contributor's essential patent claims, to -make, use, sell, offer for sale, import and otherwise run, modify and -propagate the contents of its contributor version. - - In the following three paragraphs, a "patent license" is any express -agreement or commitment, however denominated, not to enforce a patent -(such as an express permission to practice a patent or covenant not to -sue for patent infringement). To "grant" such a patent license to a -party means to make such an agreement or commitment not to enforce a -patent against the party. - - If you convey a covered work, knowingly relying on a patent license, -and the Corresponding Source of the work is not available for anyone -to copy, free of charge and under the terms of this License, through a -publicly available network server or other readily accessible means, -then you must either (1) cause the Corresponding Source to be so -available, or (2) arrange to deprive yourself of the benefit of the -patent license for this particular work, or (3) arrange, in a manner -consistent with the requirements of this License, to extend the patent -license to downstream recipients. "Knowingly relying" means you have -actual knowledge that, but for the patent license, your conveying the -covered work in a country, or your recipient's use of the covered work -in a country, would infringe one or more identifiable patents in that -country that you have reason to believe are valid. - - If, pursuant to or in connection with a single transaction or -arrangement, you convey, or propagate by procuring conveyance of, a -covered work, and grant a patent license to some of the parties -receiving the covered work authorizing them to use, propagate, modify -or convey a specific copy of the covered work, then the patent license -you grant is automatically extended to all recipients of the covered -work and works based on it. - - A patent license is "discriminatory" if it does not include within -the scope of its coverage, prohibits the exercise of, or is -conditioned on the non-exercise of one or more of the rights that are -specifically granted under this License. You may not convey a covered -work if you are a party to an arrangement with a third party that is -in the business of distributing software, under which you make payment -to the third party based on the extent of your activity of conveying -the work, and under which the third party grants, to any of the -parties who would receive the covered work from you, a discriminatory -patent license (a) in connection with copies of the covered work -conveyed by you (or copies made from those copies), or (b) primarily -for and in connection with specific products or compilations that -contain the covered work, unless you entered into that arrangement, -or that patent license was granted, prior to 28 March 2007. - - Nothing in this License shall be construed as excluding or limiting -any implied license or other defenses to infringement that may -otherwise be available to you under applicable patent law. - - 12. No Surrender of Others' Freedom. - - If conditions are imposed on you (whether by court order, agreement or -otherwise) that contradict the conditions of this License, they do not -excuse you from the conditions of this License. If you cannot convey a -covered work so as to satisfy simultaneously your obligations under this -License and any other pertinent obligations, then as a consequence you may -not convey it at all. For example, if you agree to terms that obligate you -to collect a royalty for further conveying from those to whom you convey -the Program, the only way you could satisfy both those terms and this -License would be to refrain entirely from conveying the Program. - - 13. Use with the GNU Affero General Public License. - - Notwithstanding any other provision of this License, you have -permission to link or combine any covered work with a work licensed -under version 3 of the GNU Affero General Public License into a single -combined work, and to convey the resulting work. The terms of this -License will continue to apply to the part which is the covered work, -but the special requirements of the GNU Affero General Public License, -section 13, concerning interaction through a network will apply to the -combination as such. - - 14. Revised Versions of this License. - - The Free Software Foundation may publish revised and/or new versions of -the GNU General Public License from time to time. Such new versions will -be similar in spirit to the present version, but may differ in detail to -address new problems or concerns. - - Each version is given a distinguishing version number. If the -Program specifies that a certain numbered version of the GNU General -Public License "or any later version" applies to it, you have the -option of following the terms and conditions either of that numbered -version or of any later version published by the Free Software -Foundation. If the Program does not specify a version number of the -GNU General Public License, you may choose any version ever published -by the Free Software Foundation. - - If the Program specifies that a proxy can decide which future -versions of the GNU General Public License can be used, that proxy's -public statement of acceptance of a version permanently authorizes you -to choose that version for the Program. - - Later license versions may give you additional or different -permissions. However, no additional obligations are imposed on any -author or copyright holder as a result of your choosing to follow a -later version. - - 15. Disclaimer of Warranty. - - THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY -APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT -HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY -OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, -THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR -PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM -IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF -ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - - 16. Limitation of Liability. - - IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS -THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY -GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE -USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF -DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD -PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), -EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF -SUCH DAMAGES. - - 17. Interpretation of Sections 15 and 16. - - If the disclaimer of warranty and limitation of liability provided -above cannot be given local legal effect according to their terms, -reviewing courts shall apply local law that most closely approximates -an absolute waiver of all civil liability in connection with the -Program, unless a warranty or assumption of liability accompanies a -copy of the Program in return for a fee. - - END OF TERMS AND CONDITIONS - - How to Apply These Terms to Your New Programs - - If you develop a new program, and you want it to be of the greatest -possible use to the public, the best way to achieve this is to make it -free software which everyone can redistribute and change under these terms. - - To do so, attach the following notices to the program. It is safest -to attach them to the start of each source file to most effectively -state the exclusion of warranty; and each file should have at least -the "copyright" line and a pointer to where the full notice is found. - - - Copyright (C) - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program. If not, see . - -Also add information on how to contact you by electronic and paper mail. - - If the program does terminal interaction, make it output a short -notice like this when it starts in an interactive mode: - - Copyright (C) - This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. - This is free software, and you are welcome to redistribute it - under certain conditions; type `show c' for details. - -The hypothetical commands `show w' and `show c' should show the appropriate -parts of the General Public License. Of course, your program's commands -might be different; for a GUI interface, you would use an "about box". - - You should also get your employer (if you work as a programmer) or school, -if any, to sign a "copyright disclaimer" for the program, if necessary. -For more information on this, and how to apply and follow the GNU GPL, see -. - - The GNU General Public License does not permit incorporating your program -into proprietary programs. If your program is a subroutine library, you -may consider it more useful to permit linking proprietary applications with -the library. If this is what you want to do, use the GNU Lesser General -Public License instead of this License. But first, please read -. +# Exegol Software License (ESL) - Version 1.0 + +## Preamble + +The Exegol software suite ("Exegol") is developed by Execorp to serve the needs of cybersecurity professionals. While certain elements of the source code, scripts, documentation, or containers may be made publicly accessible, such availability is intended to foster transparency, community trust, and collaboration. + +This public access does not imply a waiver of Execorp's intellectual property rights, nor does it authorize unrestricted or commercial use of the software. + +### License Transition and GPL3 Coexistence + +Exegol is transitioning from the GNU General Public License version 3 (GPL3) to the Execorp Software License (ESL). This transition is governed by the following rules: + +- All code released prior to June 5th, 2025 remains under GPL3 (i.e., [GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007](https://www.gnu.org/licenses/gpl-3.0.en.html)) +- Code released since June 5th, 2025 (the start date of this dual-license mechanism) will be under either: + - The Exegol Software License (ESL) + - or GPL3 (if it contains or is derived from GPL3-licensed code) + +## 1. Definitions + +- **Execorp**: company publishing Exegol +- **Exegol**: all software, scripts, Docker images, documentation, and associated content published by Execorp under this name +- **User**: any individual or legal entity accessing or using Exegol +- **Non-commercial use**: use without direct or indirect purpose of generating revenue or providing third-party services +- **Commercial use**: use of Exegol as a tool within a business context for the user's own operations, such as professional activities, internal training, or security operations +- **Commercial exploitation**: any activity that uses Exegol as a basis for generating revenue or providing services to third parties, including but not limited to maintenance, support, managed services, repackaging, or reselling +- **Subscription**: a monthly or yearly renewed purchase (Pro or Enterprise) that permits commercial use of Exegol under the terms of this license + +## 2. Intellectual property + +Exegol is and remains the exclusive property of Execorp. All rights not expressly granted by this license are reserved. + +The public availability of part of the source code does not confer any right of use, modification, reproduction, or distribution outside the conditions provided by this license. + +## 3. Granted rights + +### 3.1 Non-commercial use + +Execorp grants the user a free, personal, non-exclusive, non-transferable, and revocable license to use Exegol for strictly non-commercial purposes, such as: +- Academic research +- Individual learning +- Participation in cybersecurity competitions (CTF, hackathons) + +### 3.2 Commercial Use and Exploitation + +#### 3.2.1 Allowed Commercial Use (with subscription) +With a valid subscription (Pro or Enterprise), you are permitted to use Exegol in a commercial context for your own business operations (e.g., technical assessments, penetration test, bug bounty, research), such as: +- Using Exegol as part of your professional activities +- Using Exegol in your business or enterprise environment +- Using Exegol for internal training or documentation +- Using Exegol as part of your security operations + +#### 3.2.2 Prohibited Commercial Exploitation +The following activities are strictly prohibited, even with a valid subscription, as they constitute commercial exploitation of Exegol. These activities require a specific written agreement with Execorp: + +- Providing maintenance, support, or managed services on Exegol products +- Repackaging or redistributing Exegol as part of another product or service +- Using Exegol as a dependency in commercial software or services +- Providing Exegol as part of a commercial infrastructure or platform +- Creating derivative works or modifications of Exegol for commercial purposes +- Reselling or sublicensing Exegol in any form + +In simple terms: You may use Exegol commercially for your own business needs with a subscription, but you may not build a business around Exegol itself without a specific agreement. + +Any violation of these prohibitions may lead to legal action and immediate termination of the license. + +### 3.3 Specific limitation for Pro subscription + +An individual user holding a Pro subscription is authorized to activate up to two installations (e.g., two personal machines). Beyond this, an Enterprise subscription is mandatory. + +## 4. Restrictions + +The user is prohibited from: +- Redistributing all or part of Exegol without express authorization from Execorp +- Creating derivative works intended for commercial exploitation +- Modifying Exegol to circumvent usage limitations provided by this license +- Using Exegol to develop a competing product + +Any violation of these restrictions will result in immediate termination of the license, without notice. + +## 5. Contributions + +Users who voluntarily contribute to Exegol (code, documentation, ideas, feedback): +- Grant Execorp an irrevocable, worldwide, free, and unlimited right to use, reproduce, modify, publish, or distribute these contributions, and an exclusive right to commercialize it. +- Accept that certain contributions may be subject to a specific intellectual property rights transfer agreement, established case by case by Execorp + +Users further acknowledge and agree that any contribution proposed for inclusion into any official Exegol project (via pull request or equivalent) may be subject to prior technical or legal review. Execorp reserves the right to contact the contributor to negotiate and formalize a written assignment of rights agreement before the contribution is accepted and merged. + +## 6. No warranty + +Exegol is provided "as is", without any warranty, express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, or absence of errors. The user assumes all risks associated with the use of Exegol. + +## 7. Limitation of liability + +To the fullest extent permitted by applicable law, Execorp shall not be liable for: +- Any direct, indirect, special, incidental, or consequential damages +- Any loss of profits, business interruption, loss of data or customers +- Unlawful use of Exegol by third parties + +## 8. Duration + +This license is granted for the entire duration of applicable legal protection, except in case of early termination for non-compliance with its terms. + +## 9. Termination + +The license is automatically terminated in case of violation of the stated terms. Execorp reserves the right to revoke the license for any fraudulent or abusive use. In case of termination: +- The user must immediately cease all use of Exegol +- Any existing subscriptions will be terminated without refund +- Execorp may pursue legal action for any continued unauthorized use + +## 10. Governing law and jurisdiction + +This license is governed by French law. Any dispute relating to its interpretation or application shall be submitted to the exclusive jurisdiction of the courts of Paris. \ No newline at end of file diff --git a/Makefile b/Makefile deleted file mode 100644 index d0c3cbf1..00000000 --- a/Makefile +++ /dev/null @@ -1,20 +0,0 @@ -# Minimal makefile for Sphinx documentation -# - -# You can set these variables from the command line, and also -# from the environment for the first two. -SPHINXOPTS ?= -SPHINXBUILD ?= sphinx-build -SOURCEDIR = source -BUILDDIR = build - -# Put it first so that "make" without argument is like "make help". -help: - @$(SPHINXBUILD) -M help "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O) - -.PHONY: help Makefile - -# Catch-all target: route all unknown targets to Sphinx using the new -# "make mode" option. $(O) is meant as a shortcut for $(SPHINXOPTS). -%: Makefile - @$(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O) diff --git a/README.md b/README.md index 8c2e4b1c..08f4c6ab 100644 --- a/README.md +++ b/README.md @@ -7,11 +7,6 @@ ___ This repository hosts the source of the documentation for users, contributors, developers (work in progress), and maintainers (work in progress). -Link to the doc: https://exegol.readthedocs.io/. +Link to the doc: [docs.exegol.com](https://docs.exegol.com). -## Branch description - -- main: The main branch is the officiel latest stable version of the exegol project. -- dev: The dev branch is a place for updates related to existing features and minor documentation updates. -- dev-images: This branch is dedicated to the latest news being developed in exegol **image** (nightly). It will be merge in "main" when a stable and official version will be released. -- dev-wrapper: this branch is dedicated to the latest news being developed in exegol **wrapper** (dev). It will be merge in "main" when a stable and official version will be released. +Want to know more about the project? Go to [exegol.com](https://exegol.com) \ No newline at end of file diff --git a/TODO.md b/TODO.md deleted file mode 100644 index d9e5e4b7..00000000 --- a/TODO.md +++ /dev/null @@ -1,7 +0,0 @@ -- tools list -- add in dev doc: https://github.com/containerd/containerd/blob/269548fa27e0089a8b8278fc4fc781d7f65a939b/platforms/database.go#L83-L111 -- TODO 1min video presentation? -- auto-generate tools list? resources list? -- auto-generate command examples and options in exegol-wrapper/actions? -- add screenshots -- requirement for runners : jq, docker, etc. \ No newline at end of file diff --git a/docs/.vitepress/authors.data.ts b/docs/.vitepress/authors.data.ts new file mode 100644 index 00000000..5f7711e9 --- /dev/null +++ b/docs/.vitepress/authors.data.ts @@ -0,0 +1,40 @@ +import { createContentLoader } from 'vitepress' + +export default createContentLoader('../src/**/*.md', { + transform(rawPages) { + const authorSet = new Set() + + rawPages.forEach(page => { + const authors = page.frontmatter.authors + if (authors) { + if (typeof authors === 'string') { + authors.split(',').forEach(author => { + authorSet.add(author.trim()) + }) + } + else if (Array.isArray(authors)) { + authors.forEach(author => { + author.split(',').forEach(individualAuthor => { + authorSet.add(individualAuthor.trim()) + }) + }) + } + } + }) + + //Sort + const uniqueAuthors = Array.from( + new Set(Array.from(authorSet).map(author => author.toLowerCase())) + ).sort((a, b) => a.localeCompare(b)); + + //DEBUG + //console.log('Auteurs trouvés :', uniqueAuthors) + + return uniqueAuthors.map(author => ({ + id: author, + login: author, + html_url: `https://github.com/${author}`, + avatar_url: `https://avatars.githubusercontent.com/${author}?s=64` + })) + } +}) diff --git a/docs/.vitepress/blog.data.ts b/docs/.vitepress/blog.data.ts new file mode 100644 index 00000000..191bb245 --- /dev/null +++ b/docs/.vitepress/blog.data.ts @@ -0,0 +1,13 @@ +export const blogPosts = Object.entries( + import.meta.glob('../../../src/blog/*.md', { eager: true }) + ).map(([path, mod]: any) => { + const url = path.replace('../', '/').replace('.md', '') + return { + ...mod, + url, + title: mod.frontmatter?.title, + date: mod.frontmatter?.date, + description: mod.frontmatter?.description, + } + }) + \ No newline at end of file diff --git a/docs/.vitepress/config.mts b/docs/.vitepress/config.mts new file mode 100644 index 00000000..bdb747d0 --- /dev/null +++ b/docs/.vitepress/config.mts @@ -0,0 +1,432 @@ +import { defineConfig, type DefaultTheme } from 'vitepress' +import { tabsMarkdownPlugin } from 'vitepress-plugin-tabs' +import githubAlertsPlugin from './plugins/githubAlertsPlugin'; +import lineNumberPlugin from './plugins/lineNumbers'; +import detailsPlugin from './plugins/detailsPlugin'; +import { themeImagesPlugin } from './plugins/theme-images' +import { fileURLToPath, URL } from 'node:url' + +type NavItemWithBadge = DefaultTheme.NavItem & { badge?: string } +type SidebarItemWithBadge = DefaultTheme.SidebarItem & { badge?: string } + +// https://vitepress.dev/reference/site-config +export default defineConfig({ + title: "Exegol Docs", + srcDir: 'src', + description: "Official documentation for Exegol", + cleanUrls: true, + lastUpdated: true, + sitemap: { + hostname: 'https://docs.exegol.com', + }, + head: [ + ['script',{ async: '', src: 'https://www.googletagmanager.com/gtag/js?id=G-7WC8L63R1S' }], + [ + 'script', + {}, + `window.dataLayer = window.dataLayer || []; + function gtag(){dataLayer.push(arguments);} + gtag('js', new Date()); + gtag('config', 'G-7WC8L63R1S');` + ], + ['link', { rel: 'apple-touch-icon', sizes: '180x180', href: '/images/apple-touch-icon.png' }], + ['link', { rel: 'icon', href: '/images/favicon.ico' }], + ['link', { rel: 'icon', type: 'image/png', sizes: '32x32', href: '/images/favicon-32x32.png' }], + ['link', { rel: 'icon', type: 'image/png', sizes: '16x16', href: '/images/favicon-16x16.png' }], + ['link', { rel: 'manifest', href: '/images/site.webmanifest' }], + + ], + transformHead: ({ pageData }) => { + const pageTitle = pageData.title ? `${pageData.title} | Exegol Documentation` : 'Exegol Documentation'; + const pageDescription = pageData.description || 'Official documentation for Exegol'; + return [ + ['title', {}, pageTitle], + ['meta', { property: 'og:title', content: pageTitle }], + ['meta', { property: 'og:description', content: pageDescription }], + ['meta', { property: 'og:image', content: 'https://docs.exegol.com/images/Social_preview.png' }], + ['meta', { name: 'twitter:title', content: pageTitle }], + ['meta', { name: 'twitter:image', content: 'https://docs.exegol.com/images/Social_preview.png' }], + ['meta', { name: 'twitter:card', content: 'summary_large_image' }], + ['meta', { name: 'twitter:description', content: pageDescription }] + ]; + }, + themeConfig: { + logo: { + dark: '/images/Exegol_Symbol_DarkVersion.svg', + light: '/images/Exegol_Symbol_LightVersion.svg' + }, + search: { + provider: 'local' + }, + outline: "deep", + docFooter: { + prev: false, + next: false + }, + nav: nav(), + sidebar: { + '/contribute/': { base: '/contribute/', items: sidebarContribute() }, + '/legal/': { base: '/legal/', items: sidebarLegal() }, + '/': { base: '/', items: sidebarMain() } + }, + socialLinks: [ + { icon: 'discord', link: 'https://discord.gg/cXThyp7D6P' }, + { icon: 'linkedin', link: 'https://www.linkedin.com/company/exegol' }, + { icon: 'x', link: 'https://x.com/exegogol' }, + { icon: 'youtube', link: 'https://www.youtube.com/@exegogol' }, + { icon: 'github', link: 'https://github.com/ThePorgs/Exegol' }, + ] + }, + + vite: { + resolve: { + alias: [ + { + find: /^.*\/VPMenuLink\.vue$/, + replacement: fileURLToPath( + new URL('./theme/components/VPMenuLink.vue', import.meta.url) + ) + }, + { + find: /^.*\/VPBadge\.vue$/, + replacement: fileURLToPath( + new URL('./theme/components/Badge.vue', import.meta.url) + ) + }, + { + find: /^.*\/VPSidebar\.vue$/, + replacement: fileURLToPath( + new URL('./theme/components/CustomSidebar.vue', import.meta.url)) + } + ] + } + }, + markdown: { + config(md) { + md.use(tabsMarkdownPlugin); + md.use(githubAlertsPlugin); + md.use(lineNumberPlugin); + md.use(detailsPlugin); + themeImagesPlugin()(md); + } + } +}) + +function nav(): NavItemWithBadge[] { + return [ + { + text: 'About Exegol', + link: 'about', + }, + { + text: 'First install', + link: 'first-install', + }, + { + text: 'FAQ', + link: 'faq', + }, + { + text: 'Others', + items: [ + { + text: 'Landing', + link: 'https://exegol.com/', + }, + { + text: 'Dashboard', + link: 'https://dashboard.exegol.com/', + }, + { + text: 'Blog', + link: '/blog/', + activeMatch: '/blog/' + }, + { + text: 'Contribute', + link: '/contribute/intro', + activeMatch: '/contribute/intro' + }, + { + text: 'Legal', + link: '/legal/summary', + activeMatch: '/legal/summary' + } + ] + }, + { + text: 'Pricing', + link: 'https://exegol.com/pricing', + }, + ] +} + +function sidebarContribute(): SidebarItemWithBadge[] { + return [ + { + text: "About contributions", + link: "intro", + }, + { + text: "Components", + items: [ + { + text: "Images", + link: "images" + }, + { + text: "Wrapper", + link: "wrapper" + }, + { + text: "Resources", + link: "resources" + }, + { + text: "Docs", + link: "docs" + } + ] + }, + { + text: "Miscellaneous", + items: [ + { + text: "Source install", + link: "install", + }, + { + text: "Signing commits", + link: "signing-commits" + }, + { + text: "Maintainers notes", + link: "maintainers-notes" + } + ] + } + ] +} + +function sidebarLegal(): SidebarItemWithBadge[] { + return [ + { + text: "Legal", + items: [ + { + text: "Summary", + link: "summary" + }, + { + text: "Legal Notice", + link: "legal-notice" + }, + { + text: "Terms of Service", + link: "terms-of-service" + }, + { + text: "End User License Agreement", + link: "eula" + }, + { + text: "Privacy Policy", + link: "privacy-policy" + }, + { + text: "Cookie Policy", + link: "cookie-policy" + }, + { + text: "Security Policy", + link: "security-policy" + }, + { + text: "Exegol Software License", + link: "software-license" + }, + { + text: "Open Source Components", + link: "open-source-components" + }, + + ] + } + ] +} +function sidebarMain(): SidebarItemWithBadge[] { + return [ + { + text: "About Exegol", + link: "about" + }, + { + text: "First install", + link: "first-install", + }, + { + text: "Exegol images", + collapsed: false, + items: [ + { + text: "Images", + link: "images/types.md" + }, + { + text: "Tools list", + link: "images/tools.md", + }, + { + text: "My resources", + link: "images/my-resources.md" + }, + { + text: "Credentials", + link: "images/credentials.md" + }, + { + text: "Services", + link: "images/services.md" + } + ] + }, + { + text: "Exegol wrapper", + collapsed: false, + items: [ + { + text: "Features", + link: "wrapper/features.md" + }, + { + text: "Command-line actions", + collapsed: true, + items: [ + { + text: "activate", + link: "wrapper/cli/activate.md", + badge: "pro" + }, + { + text: "build", + link: "wrapper/cli/build.md", + badge: "new" + }, + { + text: "exec", + link: "wrapper/cli/exec.md" + }, + { + text: "info", + link: "wrapper/cli/info.md" + }, + { + text: "install", + link: "wrapper/cli/install.md" + }, + { + text: "remove", + link: "wrapper/cli/remove.md" + }, + { + text: "restart", + link: "wrapper/cli/restart.md" + }, + { + text: "start", + link: "wrapper/cli/start.md" + }, + { + text: "stop", + link: "wrapper/cli/stop.md" + }, + { + text: "uninstall", + link: "wrapper/cli/uninstall.md" + }, + { + text: "update", + link: "wrapper/cli/update.md" + }, + { + text: "version", + link: "wrapper/cli/version.md" + } + ] + }, + { + text: "Advanced configuration", + link: "wrapper/configuration.md" + } + ] + }, + { + text: "Exegol resources", + collapsed: false, + items: [ + { + text: "Resources list", + link: "resources/list.md" + } + ] + }, + { + text: "Dashboard", + badge: "new", + collapsed: true, + items: [ + { + text: "Overview", + link: "dashboard/overview.md" + }, + { + text: "Subscriptions", + link: "dashboard/subscriptions.md" + }, + { + text: "Licenses", + link: "dashboard/licenses.md" + }, + { + text: "Organizations", + link: "dashboard/organizations.md", + badge: "enterprise" + }, + { + text: "Learn", + link: "dashboard/learn.md", + badge: "new" + }, + { + text: "Referral", + link: "dashboard/referral.md", + badge: "pro" + }, + { + text: "Community", + link: "dashboard/community.md", + }, + { + text: "Support", + link: "dashboard/support.md" + }, + { + text: "Settings", + link: "dashboard/settings.md" + } + ] + }, + { + text: "Frequently asked questions", + link: "faq.md" + }, + { + text: "Troubleshooting", + link: "troubleshooting.md" + }, + { + text: "Tips & tricks", + link: "tips-and-tricks.md" + } + ] +} diff --git a/docs/.vitepress/plugins/detailsPlugin.ts b/docs/.vitepress/plugins/detailsPlugin.ts new file mode 100644 index 00000000..6831e2f6 --- /dev/null +++ b/docs/.vitepress/plugins/detailsPlugin.ts @@ -0,0 +1,62 @@ +import type MarkdownIt from 'markdown-it'; +import { ChevronRight } from 'lucide-vue-next'; + +const detailsMarkerRE = /^::: details\s+(.+)$/; + +const detailsPlugin = (md: MarkdownIt) => { + md.block.ruler.before('fence', 'details', (state, startLine, endLine, silent) => { + const start = state.bMarks[startLine] + state.tShift[startLine]; + const max = state.eMarks[startLine]; + const line = state.src.slice(start, max); + + const match = line.match(detailsMarkerRE); + if (!match) return false; + + if (silent) return true; + + const title = match[1].trim(); + const token = state.push('details_open', 'details', 1); + token.markup = ':::'; + token.block = true; + token.info = title; + + state.line = startLine + 1; + return true; + }); + + md.block.ruler.after('details', 'details_close', (state, startLine, endLine, silent) => { + const start = state.bMarks[startLine] + state.tShift[startLine]; + const max = state.eMarks[startLine]; + const line = state.src.slice(start, max); + + if (line.trim() !== ':::') return false; + + if (silent) return true; + + const token = state.push('details_close', 'details', -1); + token.markup = ':::'; + token.block = true; + + state.line = startLine + 1; + return true; + }); + + md.renderer.rules.details_open = (tokens, idx) => { + const title = tokens[idx].info; + return `

+ +
+ +
+ ${title} +
+
+
\n`; + }; + + md.renderer.rules.details_close = () => { + return '
\n'; + }; +}; + +export default detailsPlugin; \ No newline at end of file diff --git a/docs/.vitepress/plugins/githubAlertsPlugin.ts b/docs/.vitepress/plugins/githubAlertsPlugin.ts new file mode 100644 index 00000000..2282fe84 --- /dev/null +++ b/docs/.vitepress/plugins/githubAlertsPlugin.ts @@ -0,0 +1,105 @@ +import type MarkdownIt from 'markdown-it'; + +const markerRE = /^\[\!(TIP|NOTE|INFO|IMPORTANT|WARNING|CAUTION|DANGER|SUCCESS)\]/i; + +const githubAlertsPlugin = (md: MarkdownIt, options?: any) => { + const titleMark = { + tip: "TIP", + note: "NOTE", + info: "INFO", + important: "IMPORTANT", + warning: "WARNING", + caution: "CAUTION", + danger: "DANGER", + success: "SUCCESS" + }; + + const icons = { + note: 'FilePen', + tip: 'CircleHelp', + info: 'Info', + important: 'CircleAlert', + warning: 'TriangleAlert', + caution: 'Ban', + danger: 'Siren', + success: 'CircleCheck' + }; + + md.core.ruler.after("block", "github-alerts", (state) => { + const tokens = state.tokens; + for (let i = 0; i < tokens.length; i++) { + if (tokens[i].type === "blockquote_open") { + const startIndex = i; + const open = tokens[startIndex]; + let endIndex = i + 1; + + while (endIndex < tokens.length && (tokens[endIndex].type !== "blockquote_close" || tokens[endIndex].level !== open.level)) { + endIndex++; + } + + if (endIndex === tokens.length) continue; + + const close = tokens[endIndex]; + const contentIdx = tokens.slice(startIndex, endIndex + 1).findIndex((token) => token.type === "inline"); + const firstContent = tokens[startIndex + contentIdx]; + if (!firstContent) continue; + + const match = firstContent.content.match(markerRE); + if (!match) continue; + + const type = match[1].toLowerCase(); + const remainingContent = firstContent.content.slice(match[0].length); + + let finalTitle = titleMark[type]; + let bodyContent = ''; + if (!remainingContent.trim() || remainingContent.match(/^\s*\n/)) { + // Pas de titre personnalisé, contenu direct ou vide + bodyContent = remainingContent.trim(); + } else { + // Titre personnalisé sur la même ligne + const firstLineEnd = remainingContent.indexOf('\n'); + if (firstLineEnd !== -1) { + finalTitle = remainingContent.slice(0, firstLineEnd).trim(); + bodyContent = remainingContent.slice(firstLineEnd).trim(); + } else { + finalTitle = remainingContent.trim(); + bodyContent = ''; + } + } + + // Si aucun contenu après le titre : supprimer le token + if (!bodyContent) { + tokens.splice(startIndex + contentIdx, 1); // Supprime le token inline vide + } else { + firstContent.content = bodyContent; + } + + open.type = "github_alert_open"; + open.tag = "div"; + open.meta = { + type, + icon: icons[type], + title: finalTitle + }; + close.type = "github_alert_close"; + close.tag = "div"; + } + } + }); + + md.renderer.rules.github_alert_open = function(tokens, idx) { + const { title, type, icon } = tokens[idx].meta; + return `
+
+ <${icon} class="alert-icon" /> + ${title} +
+
\n`; + }; + + md.renderer.rules.github_alert_close = function() { + return '
\n'; + }; +}; + +export default githubAlertsPlugin; \ No newline at end of file diff --git a/docs/.vitepress/plugins/lineNumbers.ts b/docs/.vitepress/plugins/lineNumbers.ts new file mode 100644 index 00000000..5605360a --- /dev/null +++ b/docs/.vitepress/plugins/lineNumbers.ts @@ -0,0 +1,51 @@ +import type MarkdownIt from 'markdown-it' + +export const lineNumberPlugin = (md: MarkdownIt, enable = false) => { + const fence = md.renderer.rules.fence! + md.renderer.rules.fence = (...args) => { + const rawCode = fence(...args) + + const [tokens, idx] = args + const info = tokens[idx].info + + if ( + (!enable && !/:line-numbers($| |=)/.test(info)) || + (enable && /:no-line-numbers($| )/.test(info)) + ) { + return rawCode + } + + let startLineNumber = 1 + const matchStartLineNumber = info.match(/=(\d*)/) + if (matchStartLineNumber && matchStartLineNumber[1]) { + startLineNumber = parseInt(matchStartLineNumber[1]) + } + + const code = rawCode.slice( + rawCode.indexOf(''), + rawCode.indexOf('') + ) + + const lines = code.split('\n') + + const lineNumbersCode = [...Array(lines.length)] + .map( + (_, index) => + `${index + startLineNumber}
` + ) + .join('') + + const lineNumbersWrapperCode = `` + + const finalCode = rawCode + .replace(/<\/div>$/, `${lineNumbersWrapperCode}`) + .replace(/"(language-[^"]*?)"/, '"$1 line-numbers-mode"') + //Disable wrapping when triggered + .replace(' { + const tokens = state.tokens + for (let i = 0; i < tokens.length; i++) { + const token = tokens[i] + if (token.type === 'inline' && Array.isArray(token.children)) { + for (let j = 0; j < token.children.length; j++) { + const child = token.children[j] + if ( + child.type === 'text' && + typeof child.content === 'string' + ) { + // Expression régulière : capture tout texte suivi de "{.caption}" optionnellement précédé d'un espace + const match = child.content.match(/^(.*)\s*\{\.caption\}$/) + if (match) { + const caption = match[1].trim() + const htmlToken = new state.Token('html_block', '', 0) + htmlToken.content = `

${caption}

` + // Insère le token html juste après + tokens.splice(i + 1, 0, htmlToken) + // Supprime le token enfant + token.children.splice(j, 1) + j-- + } + } + } + } + } + }) + + md.renderer.rules.image = (tokens, idx, options, env, self) => { + const token = tokens[idx] + const src = token.attrGet('src') + if (!src) return defaultImageRule(tokens, idx, options, env, self) + + // Parse les attributs Markdown + const attrs = token.attrs || [] + const themeAttr = attrs.find(([key]) => key === 'data-theme') + const theme = themeAttr ? themeAttr[1] : null + + if (!theme || (theme !== 'light' && theme !== 'dark')) { + // Si pas de thème spécifié, utiliser l'image pour les deux thèmes + return defaultImageRule(tokens, idx, options, env, self) + } + + // Si un thème est spécifié, n'inclure que l'image appropriée + return ` +
+ ${token.content} +
+ ` + } + } +} diff --git a/docs/.vitepress/theme/components/Asciinema.vue b/docs/.vitepress/theme/components/Asciinema.vue new file mode 100644 index 00000000..fc93e684 --- /dev/null +++ b/docs/.vitepress/theme/components/Asciinema.vue @@ -0,0 +1,20 @@ + + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/AsideSponsors.vue b/docs/.vitepress/theme/components/AsideSponsors.vue new file mode 100644 index 00000000..d9924971 --- /dev/null +++ b/docs/.vitepress/theme/components/AsideSponsors.vue @@ -0,0 +1,106 @@ + + + + + diff --git a/docs/.vitepress/theme/components/Authors.vue b/docs/.vitepress/theme/components/Authors.vue new file mode 100644 index 00000000..a9ba80a7 --- /dev/null +++ b/docs/.vitepress/theme/components/Authors.vue @@ -0,0 +1,136 @@ + + + + + diff --git a/docs/.vitepress/theme/components/Badge.vue b/docs/.vitepress/theme/components/Badge.vue new file mode 100644 index 00000000..6987e699 --- /dev/null +++ b/docs/.vitepress/theme/components/Badge.vue @@ -0,0 +1,93 @@ + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/BannerSponsor.vue b/docs/.vitepress/theme/components/BannerSponsor.vue new file mode 100644 index 00000000..cfe7043c --- /dev/null +++ b/docs/.vitepress/theme/components/BannerSponsor.vue @@ -0,0 +1,164 @@ + + + + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/BlogList.vue b/docs/.vitepress/theme/components/BlogList.vue new file mode 100644 index 00000000..0f9d64be --- /dev/null +++ b/docs/.vitepress/theme/components/BlogList.vue @@ -0,0 +1,138 @@ + + + + + diff --git a/docs/.vitepress/theme/components/CSVMarkdown.vue b/docs/.vitepress/theme/components/CSVMarkdown.vue new file mode 100644 index 00000000..bd6d9c81 --- /dev/null +++ b/docs/.vitepress/theme/components/CSVMarkdown.vue @@ -0,0 +1,129 @@ + + + + + diff --git a/docs/.vitepress/theme/components/CustomSidebar.vue b/docs/.vitepress/theme/components/CustomSidebar.vue new file mode 100644 index 00000000..310db7af --- /dev/null +++ b/docs/.vitepress/theme/components/CustomSidebar.vue @@ -0,0 +1,136 @@ + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/CustomSidebarGroup.vue b/docs/.vitepress/theme/components/CustomSidebarGroup.vue new file mode 100644 index 00000000..ed42274c --- /dev/null +++ b/docs/.vitepress/theme/components/CustomSidebarGroup.vue @@ -0,0 +1,75 @@ + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/CustomSidebarItem.vue b/docs/.vitepress/theme/components/CustomSidebarItem.vue new file mode 100644 index 00000000..5dd320af --- /dev/null +++ b/docs/.vitepress/theme/components/CustomSidebarItem.vue @@ -0,0 +1,320 @@ + + + + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/Donate.vue b/docs/.vitepress/theme/components/Donate.vue new file mode 100644 index 00000000..fca6397a --- /dev/null +++ b/docs/.vitepress/theme/components/Donate.vue @@ -0,0 +1,70 @@ + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/Donaters.vue b/docs/.vitepress/theme/components/Donaters.vue new file mode 100644 index 00000000..db68b2ff --- /dev/null +++ b/docs/.vitepress/theme/components/Donaters.vue @@ -0,0 +1,348 @@ + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/DonationPricingTable.vue b/docs/.vitepress/theme/components/DonationPricingTable.vue new file mode 100644 index 00000000..cd67802c --- /dev/null +++ b/docs/.vitepress/theme/components/DonationPricingTable.vue @@ -0,0 +1,138 @@ + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/FooterLinks.vue b/docs/.vitepress/theme/components/FooterLinks.vue new file mode 100644 index 00000000..556d597c --- /dev/null +++ b/docs/.vitepress/theme/components/FooterLinks.vue @@ -0,0 +1,51 @@ + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/News.vue b/docs/.vitepress/theme/components/News.vue new file mode 100644 index 00000000..12ff7b82 --- /dev/null +++ b/docs/.vitepress/theme/components/News.vue @@ -0,0 +1,46 @@ + + + diff --git a/docs/.vitepress/theme/components/PageNotFound.vue b/docs/.vitepress/theme/components/PageNotFound.vue new file mode 100644 index 00000000..1cfad21c --- /dev/null +++ b/docs/.vitepress/theme/components/PageNotFound.vue @@ -0,0 +1,100 @@ + + + + + diff --git a/docs/.vitepress/theme/components/Placeholder.vue b/docs/.vitepress/theme/components/Placeholder.vue new file mode 100644 index 00000000..87dabfb8 --- /dev/null +++ b/docs/.vitepress/theme/components/Placeholder.vue @@ -0,0 +1,30 @@ + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/components/VPMenuLink.vue b/docs/.vitepress/theme/components/VPMenuLink.vue new file mode 100644 index 00000000..1a37ee31 --- /dev/null +++ b/docs/.vitepress/theme/components/VPMenuLink.vue @@ -0,0 +1,64 @@ + + + + + diff --git a/docs/.vitepress/theme/components/YouTubeVideo.vue b/docs/.vitepress/theme/components/YouTubeVideo.vue new file mode 100644 index 00000000..c9a4a917 --- /dev/null +++ b/docs/.vitepress/theme/components/YouTubeVideo.vue @@ -0,0 +1,46 @@ + + + + + + \ No newline at end of file diff --git a/docs/.vitepress/theme/composables/sponsors.ts b/docs/.vitepress/theme/composables/sponsors.ts new file mode 100644 index 00000000..28351e63 --- /dev/null +++ b/docs/.vitepress/theme/composables/sponsors.ts @@ -0,0 +1,221 @@ +import { onMounted, onUnmounted, ref } from 'vue' + +interface Sponsors { + special: Sponsor[] + platinum: Sponsor[] + platinum_china: Sponsor[] + gold: Sponsor[] + silver: Sponsor[] + bronze: Sponsor[] + banner: BannerSponsor[] +} + +interface Sponsor { + name: string + categories: string[] + country: string + img: string + url: string + hasDark?: true +} + +interface BannerSponsor { + name: string + url: string + tagline: string + description: string + categories: string[] + country: string + lightTheme: { + primaryColor: string + secondaryColor: string + logo: string + } + darkTheme: { + primaryColor: string + secondaryColor: string + logo: string + } +} + + +const ALL_CATEGORIES = ['intro', 'ad', 'web', 'infra', 'evasion', 'physical', 'intelligence-gathering', 'radio', 'mobile-apps', 'contributing', 'policies'] + +const ALL_COUNTRIES = [ + "AF", "AX", "AL", "DZ", "AS", "AD", "AO", "AI", "AQ", "AG", "AR", "AM", "AW", "AU", "AT", "AZ", "BS", "BH", "BD", "BB", "BY", "BE", + "BZ", "BJ", "BM", "BT", "BO", "BQ", "BA", "BW", "BV", "BR", "IO", "BN", "BG", "BF", "BI", "CV", "KH", "CM", "CA", "KY", "CF", "TD", + "CL", "CN", "CX", "CC", "CO", "KM", "CG", "CD", "CK", "CR", "CI", "HR", "CU", "CW", "CY", "CZ", "DK", "DJ", "DM", "DO", "EC", "EG", + "SV", "GQ", "ER", "EE", "ET", "FK", "FO", "FJ", "FI", "FR", "GF", "PF", "TF", "GA", "GM", "GE", "DE", "GH", "GI", "GR", "GL", "GD", + "GP", "GU", "GT", "GG", "GN", "GW", "GY", "HT", "HM", "VA", "HN", "HK", "HU", "IS", "IN", "ID", "IR", "IQ", "IE", "IM", "IL", "IT", + "JM", "JP", "JE", "JO", "KZ", "KE", "KI", "KP", "KR", "KW", "KG", "LA", "LV", "LB", "LS", "LR", "LY", "LI", "LT", "LU", "MO", "MK", + "MG", "MW", "MY", "MV", "ML", "MT", "MH", "MQ", "MR", "MU", "YT", "MX", "FM", "MD", "MC", "MN", "ME", "MS", "MA", "MZ", "MM", "NA", + "NR", "NP", "NL", "NC", "NZ", "NI", "NE", "NG", "NU", "NF", "MP", "NO", "OM", "PK", "PW", "PS", "PA", "PG", "PY", "PE", "PH", "PN", + "PL", "PT", "PR", "QA", "RE", "RO", "RU", "RW", "BL", "SH", "KN", "LC", "MF", "PM", "VC", "WS", "SM", "ST", "SA", "SN", "RS", "SC", + "SL", "SG", "SX", "SK", "SI", "SB", "SO", "ZA", "GS", "SS", "ES", "LK", "SD", "SR", "SJ", "SZ", "SE", "CH", "SY", "TW", "TJ", "TZ", + "TH", "TL", "TG", "TK", "TO", "TT", "TN", "TR", "TM", "TC", "TV", "UG", "UA", "AE", "GB", "US", "UM", "UY", "UZ", "VU", "VE", "VN", + "VG", "VI", "WF", "EH", "YE", "ZM", "ZW" +]; + +// shared data across instances so we load only once. +const data = ref() + +// Set dataHost to an empty string since images are local +const dataHost = '' + +const viteSponsors: Pick = { + special: [ + { + name: 'Demo1', + categories: ['demo'], + country: 'all', + url: 'https://www.example.com', + img: '/images/sponsors/Logo_demo1.svg', + }, + { + name: 'Advertise', + categories: ['all'], + country: 'all', + url: '/contributing/ads', + img: '/images/sponsors/advertise.svg', + } + ], + gold: [ + { + name: 'Demo2', + categories: ['demo'], + country: 'all', + url: 'https://www.example.com', + img: '/images/sponsors/Logo_demo2.svg', + }, + { + name: 'Demo3', + categories: ['demo'], + country: 'all', + url: 'https://www.example.com', + img: '/images/sponsors/Logo_demo3.svg', + }, + { + name: 'Algosecure', + categories: ['all'], + country: 'FR', + url: 'https://www.algosecure.fr/', + img: '/images/sponsors/algosecure.svg', + }, + { + name: 'EPIEOS', + categories: ['all'], + country: 'all', + url: 'https://epieos.com/', + img: '/images/sponsors/epieos.svg', + } + ], + banner: [ + { + name: 'Fictional Company', + url: 'https://www.example.com', + tagline: 'Your trusted partner in innovation.', + description: "This is a placeholder for impactful text designed to attract and engage users. Showcase your vision, values, and why people should trust and choose your services.", + categories: ['demo'], + country: 'FR', + lightTheme: { + primaryColor: '#e141d999', + secondaryColor: '#8071f199', + logo: '/images/sponsors/logo_light.png' + }, + darkTheme: { + primaryColor: '#ba66ff99', + secondaryColor: '#ff6ee799', + logo: '/images/sponsors/logo_dark.png' + } + } + ] +} + +function toggleDarkLogos() { + if (data.value) { + const isDark = document.documentElement.classList.contains('dark') + data.value.forEach(({ items }) => { + items.forEach((s: Sponsor) => { + if (s.hasDark) { + s.img = isDark + ? s.img.replace(/(\.\w+)$/, '-dark$1') + : s.img.replace(/-dark(\.\w+)$/, '$1') + } + }) + }) + } +} + +export function useSponsor() { + onMounted(() => { + const ob = new MutationObserver((list) => { + for (const m of list) { + if (m.attributeName === 'class') { + toggleDarkLogos() + } + } + }) + ob.observe(document.documentElement, { attributes: true }) + onUnmounted(() => { + ob.disconnect() + }) + + if (data.value) { + return + } + + const mappedSponsors = mapSponsors(viteSponsors).map(sponsorGroup => ({ + ...sponsorGroup, + items: sponsorGroup.items.map(sponsor => ({ + ...sponsor, + categories: sponsor.categories.includes('all') ? [...ALL_CATEGORIES] : sponsor.categories, + country: sponsor.country.includes('all') ? [...ALL_COUNTRIES] : sponsor.country + })) + })) + + data.value = mappedSponsors + toggleDarkLogos() + }) + + return { + data, + } +} + +function mapSponsors(sponsors: Pick) { + return [ + { + tier: 'Special Sponsors', + size: 'big', + items: sponsors['special'], + }, + { + tier: 'Gold Sponsors', + size: 'small', + items: sponsors['gold'], + }, + { + tier: 'Banner Sponsors', + size: 'medium', + items: sponsors['banner'], + }, + ] +} + +const viteSponsorNames = new Set( + Object.values(viteSponsors).flatMap((sponsors) => + sponsors.map((s) => s.name), + ), +) + +/** + * Map Vue/Vite sponsors data to objects and filter out Vite-specific sponsors + */ +function mapImgPath(sponsors: Sponsor[]) { + return sponsors + .filter((sponsor) => !viteSponsorNames.has(sponsor.name)) + .map((sponsor) => ({ + ...sponsor, + img: `${dataHost}${sponsor.img}`, // Use local path + })) +} diff --git a/docs/.vitepress/theme/custom.css b/docs/.vitepress/theme/custom.css new file mode 100644 index 00000000..02f43886 --- /dev/null +++ b/docs/.vitepress/theme/custom.css @@ -0,0 +1,794 @@ +@import url('https://fonts.googleapis.com/css2?family=Poppins:wght@400;500;600;700&display=swap'); +@import url('https://fonts.googleapis.com/css2?family=JetBrains+Mono:wght@400;500&display=swap'); +@import 'lucide-static/font/lucide.css'; + + + +:root { + /* Fonts */ + --font-jetbrains-mono: 'JetBrains Mono'; + + /* Light mode */ + --vp-c-bg: #ffffff; + --vp-c-bg-alt: #fcfcfc; + --vp-c-border: #e4e4e4; + --vp-c-text-primary: #213547; + --vp-c-text-secondary: #374151; + --vp-c-text-emphasis: #0f172a; + --vp-c-text-light: #f9fafb; + --vp-c-text-subtle: #6b7280; + --vp-button-brand: #9ca3b0; + --vp-c-brand: #9ca3b0; + --vp-c-brand-1: #9ca3b0; + --vp-c-brand-light: #9275fa; + --vp-button-brand-bg: #9ca3b0; + --vp-c-divider: #e4e4e4; + --vp-button-brand-hover-bg: #9275fa; + --vp-c-brand-overlay1: #f9fcff; + --vp-c-brand-overlay2: #efe7ff; + --vp-code-bg: hsl(210, 19%, 92%); + --vp-code-color: hsl(0 0% 5%); + --vp-code-block-bg: hsl(0 0% 96%); + --vp-sidebar-bg-color: #ffffff; + --vp-accent: hsl(261, 68%, 95%); + --vp-custom-block-text: hsl(219, 14%, 45%); + --vp-note: 218 9% 50%; + --vp-tip: 329 86% 70%; + --vp-info: 205 86% 70%; + --vp-important: 261 73% 62%; + --vp-warning: 48 96% 53%; + --vp-caution: 24 86% 60%; + --vp-danger: 0 69% 59%; + --vp-success: 142 51% 51%; + --radius: 1rem; + --accent-primary: hsl(261, 73%, 62%); + --accent-overlay: hsl(264, 100%, 98%); + + /* Custom block opacities for light mode */ + --custom-block-bg-opacity: 0.1; + --custom-block-border-opacity: 0.4; + + --badge-pink: hsl(329,86%,70%); + --badge-pink-bg: hsla(329,86%,70%,0.08); + --badge-orange: hsl(24,86%,60%); + --badge-orange-bg: hsla(24,86%,60%,0.08); + --badge-green: hsl(142,51%,51%); + --badge-green-bg: hsla(142,51%,51%,0.08); + --badge-red: hsl(0,69%,59%); + --badge-red-bg: hsla(0,69%,59%,0.08); + --badge-yellow: hsl(48,96%,53%); + --badge-yellow-bg: hsla(48, 96%, 53%, 0.021); + --badge-blue: hsl(205,86%,70%); + --badge-blue-bg: hsla(205,86%,70%,0.08); + --badge-violet: hsl(251,97%,76%); + --badge-violet-bg: hsla(251,97%,76%,0.08); + + --vp-custom-block-font-size: 14px; +} + + .dark { + /* Dark mode */ + --vp-c-bg: #000000; + --vp-c-bg-alt: #0d0d0d; + --vp-c-border: #1c1c1c; + --vp-c-gutter: #1c1c1c; + --vp-c-text-primary: #d1d5db; + --vp-c-text-secondary: #9ca3b0; + --vp-c-text-emphasis: #f9fafb; + --vp-c-text-light: #f9fafb; + --vp-c-text-subtle: #747c8a; + --vp-button-brand: #9ca3b0; + --vp-c-brand: #9ca3b0; + --vp-c-brand-1: #9ca3b0; + --vp-c-brand-light: #9275fa; + --vp-button-brand-bg: #9ca3b0; + --vp-button-brand-hover-bg: #9275fa; + --vp-c-divider: #262626; + --vp-c-brand-overlay1: #0a0415; + --vp-c-brand-overlay2: #16092e; + --vp-plugin-tabs-tab-bg: rgba(101, 117, 133, 0.16); + --vp-code-bg: hsl(0,0%,12%); + --vp-code-color: hsl(216 12% 84%); + --vp-code-block-bg: hsl(0 0% 12%); + --vp-sidebar-bg-color: #000000; + --vp-accent: hsl(261, 68%, 5%); + --vp-custom-block-text: hsl(219, 11%, 65%); + --vp-note: 218 9% 50%; + --vp-tip: 329 86% 70%; + --vp-info: 205 86% 70%; + --vp-important: 261 73% 62%; + --vp-warning: 48 96% 53%; + --vp-caution: 24 86% 60%; + --vp-danger: 0 69% 59%; + --vp-success: 142 51% 51%; + --accent-primary: hsl(261, 73%, 62%); + --accent-overlay: hsl(261 68% 5%); + --radius: 1rem; + + /* Custom block opacities for light mode */ + --custom-block-bg-opacity: 0.03; + --custom-block-border-opacity: 0.4; + + --badge-pink: hsl(329,86%,60%); + --badge-pink-bg: hsla(329,86%,60%,0.15); + --badge-orange: hsl(24,86%,50%); + --badge-orange-bg: hsla(24,86%,50%,0.15); + --badge-green: hsl(142,51%,41%); + --badge-green-bg: hsla(142,51%,41%,0.15); + --badge-red: hsl(0,69%,49%); + --badge-red-bg: hsla(0,69%,49%,0.15); + --badge-yellow: hsl(48,96%,43%); + --badge-yellow-bg: hsla(48,96%,43%,0.15); + --badge-blue: hsl(205,86%,60%); + --badge-blue-bg: hsla(205,86%,60%,0.15); + --badge-violet: hsl(251,97%,76%); + --badge-violet-bg: hsla(251,97%,76%,0.15); +} + + /* Appliquer les styles */ + body { + background-color: var(--vp-c-bg); + color: var(--vp-c-text-primary); + } + + h1, h2, h3, h4, h5, h6 { + color: var(--vp-c-text-emphasis); + } + + p { + color: var(--vp-c-text-secondary); + } + + li { + color: var(--vp-c-text-secondary); + } + + a { + color: var(--vp-c-text-primary)!important; + } + + a:hover { + color: var(--vp-c-text-emphasis)!important; + } + + + code { + background-color: var(--vp-code-bg); + padding: 2px 8px; + border-radius: 4px; + color: var(--vp-code-color); + font-family: var(--font-jetbrains-mono), monospace; + font-size: .875em; + } + +.name.clip { + background: linear-gradient(90deg, var(--vp-c-brand-light), var(--vp-c-brand)); + -webkit-background-clip: text; + -webkit-text-fill-color: transparent; + } + + .vp-doc :not(pre) > code { + font-family: var(--font-jetbrains-mono), monospace; + } + +/* CUSTOM BLOCK CSS */ + +.custom-block { + font-size: var(--vp-custom-block-font-size); + padding-top: calc(1 * var(--vp-custom-block-font-size)); + padding-left: calc(1 * var(--vp-custom-block-font-size)); + padding-right: calc(1 * var(--vp-custom-block-font-size)); + display: flex; + flex-direction: column; + background-color: transparent !important; +} + +.custom-block-icon { + display: flex; + align-items: flex-start; + margin-top: 0.1em; +} + +.custom-block-content { + min-width: 0; +} + +.vp-doc .custom-block p { + margin: 0; + line-height: 1.8; + padding: 0; + color: var(--vp-custom-block-text); +} + +.vp-doc .custom-block p:not(:last-child) { + margin-bottom: 0.3em; +} + +.custom-block-title { + font-weight: 600; + color: var(--vp-c-text-1); + line-height: 1.2; + min-height: 1.2em; + display: flex; + align-items: center; +} + +.custom-block-title .alert-icon { + width: 16px; + height: 16px; + vertical-align: middle; + margin-right: 8px; +} + +/*SUCCESS BLOCK CSS*/ + +.custom-block.success { + border: 1px solid hsl(var(--vp-success)/var(--custom-block-border-opacity)); + color: var(--vp-custom-block-text); + background-color: hsl(var(--vp-success)/var(--custom-block-bg-opacity)) !important; + border-radius: var(--radius); +} + +.success .alert-icon { + color: hsl(var(--vp-success)); +} + +.success.custom-block p { + color: var(--vp-custom-block-text); +} + +.custom-block.success a { + color: var(--vp-c-success-1); +} + +.custom-block.success a:hover { + color: var(--vp-c-success-2); +} + +/* DETAILS BLOCK CSS - STYLE ÉPURÉ */ +.custom-block.details { + border: 1px solid var(--vp-c-border); + background: var(--vp-c-bg); + border-radius: var(--radius); + color: var(--vp-c-text-primary); + box-shadow: none; + transition: border-color 0.2s; + margin: 0.5rem 0; + padding: 0; + display: block; +} + +.custom-block.details summary { + cursor: pointer; + padding: 0.9rem 1.2rem; + display: flex; + align-items: center; + gap: 0.7rem; + font-weight: 500; + color: var(--vp-c-text-emphasis); + background: none; + border-radius: var(--radius); + user-select: none; + outline: none; + transition: background 0.2s; + margin-bottom: 0; + flex-direction: row; +} + +.custom-block.details summary .custom-block-icon { + display: flex; + align-items: center; + justify-content: center; + margin-right: 0.2em; +} + +.custom-block.details summary .alert-icon { + transition: transform 0.2s; + color: var(--vp-c-text-emphasis); + width: 1em; + height: 1em; + stroke-width: 2.2; + opacity: 0.7; + margin: 0; +} + +.custom-block.details[open] summary { + border-bottom-left-radius: 0; + border-bottom-right-radius: 0; +} + +.custom-block.details summary:hover { + background: none; +} + +.custom-block.details summary::-webkit-details-marker { + display: none; +} + +.custom-block.details .custom-block-content-wrapper { + overflow: hidden; + transition: max-height 0.35s cubic-bezier(0.4, 0, 0.2, 1); + max-height: 0; +} + +.custom-block.details[open] .custom-block-content-wrapper { + max-height: 1000px; +} + +.custom-block.details .custom-block-content { + padding: 0 1.2rem 1rem 2.1rem; +} + +.custom-block.details .custom-block-content > *:first-child { + margin-top: 0.5em; +} + +.custom-block.details .custom-block-content > *:last-child { + margin-bottom: 0.5em; +} + +.custom-block.details .custom-block-content p, +.custom-block.details .custom-block-content ul, +.custom-block.details .custom-block-content ol { + margin-top: 0.5em; + margin-bottom: 0.5em; +} + +.custom-block.details p { + margin: 0; + line-height: 1.8; + color: var(--vp-c-text-secondary); +} + +.custom-block.details p:not(:last-child) { + margin-bottom: 0.75em; +} + +.dark .custom-block.details { + background: var(--vp-c-bg); + border-color: var(--vp-c-border); +} + +/* CAUTION BLOCK CSS */ +.custom-block.caution { + border: 1px solid hsl(var(--vp-caution)/var(--custom-block-border-opacity)); + color: var(--vp-custom-block-text); + background-color: hsl(var(--vp-caution)/var(--custom-block-bg-opacity)) !important; + border-radius: var(--radius); +} + +.caution .alert-icon { + color: hsl(var(--vp-caution)); +} + +.caution.custom-block p { + color: var(--vp-custom-block-text); +} + +/* WARNING BLOCK CSS */ +.custom-block.warning { + border: 1px solid hsl(var(--vp-warning)/var(--custom-block-border-opacity)); + color: var(--vp-custom-block-text); + background-color: hsl(var(--vp-warning)/var(--custom-block-bg-opacity)) !important; + border-radius: var(--radius); +} + +.warning .alert-icon { + color: hsl(var(--vp-warning)); +} + +.warning.custom-block p { + color: var(--vp-custom-block-text); +} + +/* TIP BLOCK CSS */ +.custom-block.tip { + border: 1px solid hsl(var(--vp-tip)/var(--custom-block-border-opacity)); + color: var(--vp-custom-block-text); + background-color: hsl(var(--vp-tip)/var(--custom-block-bg-opacity)) !important; + border-radius: var(--radius); +} + +.custom-block.tip code { + background-color: var(--vp-code-bg); + color: var(--vp-code-color); +} + +.tip .alert-icon { + color: hsl(var(--vp-tip)); +} + +.tip.custom-block p { + color: var(--vp-custom-block-text); +} + +/* INFO BLOCK CSS */ +.custom-block.info { + border: 1px solid hsl(var(--vp-info)/var(--custom-block-border-opacity)); + color: var(--vp-custom-block-text); + background-color: hsl(var(--vp-info)/var(--custom-block-bg-opacity)) !important; + border-radius: var(--radius); +} + +.info .alert-icon { + color: hsl(var(--vp-info)); +} + +.info.custom-block p { + color: var(--vp-custom-block-text); +} + +/* NOTE BLOCK CSS */ +.custom-block.note { + border: 1px solid hsl(var(--vp-note)/var(--custom-block-border-opacity)); + color: var(--vp-custom-block-text); + background-color: hsl(var(--vp-note)/var(--custom-block-bg-opacity)) !important; + border-radius: var(--radius); +} + +.note .alert-icon { + color: hsl(var(--vp-note)); +} + + +.note.custom-block p { + color: var(--vp-custom-block-text); +} + +/* IMPORTANT BLOCK CSS */ +.custom-block.important { + border: 1px solid hsl(var(--vp-important)/var(--custom-block-border-opacity)); + color: var(--vp-custom-block-text); + background-color: hsl(var(--vp-important)/var(--custom-block-bg-opacity)) !important; + border-radius: var(--radius); +} + +.important .alert-icon { + color: hsl(var(--vp-important)); +} + + +.important.custom-block p { + color: var(--vp-custom-block-text); +} + +/* DANGER BLOCK CSS */ +.custom-block.danger { + border: 1px solid hsl(var(--vp-danger)/var(--custom-block-border-opacity)); + color: var(--vp-custom-block-text); + background-color: hsl(var(--vp-danger)/var(--custom-block-bg-opacity)) !important; + border-radius: var(--radius); +} + +.danger .alert-icon { + color: hsl(var(--vp-danger)); +} + + +.danger.custom-block p { + color: var(--vp-custom-block-text); +} + + +/* CODE WRAP */ + +.vp-doc [class*='language-'] pre, .vp-doc [class*='language-'] code { + white-space: pre-wrap; + background-color: var(--vp-code-block-bg); +} + +/* EXTENDED MEDIUM-ZOOM-IMAGES */ + +.medium-zoom-overlay { + z-index: 900; +} + +.medium-zoom-image { + border-radius: .25rem; + display: block; + margin-left: auto; + margin-right: auto; + z-index: 999; +} + +/* NO ZOOM */ + +.no-zoom { + pointer-events: none; + cursor: default; +} + +.no-zoom[data-zoomable] { + pointer-events: none !important; +} + +img.no-zoom { + transform: none !important; +} + +/* SCROLLBAR */ + +::-webkit-scrollbar { + width: 4px; + height: 4px; +} + +::-webkit-scrollbar-track { + background: None; +} + +::-webkit-scrollbar-thumb { + background: #888; + border-radius: 10px; +} + +::-webkit-scrollbar-thumb:hover { + background: #555; +} + +/* TITLES */ + +.vp-doc h1 { + font-family: Poppins, Poppins Fallback; + font-weight: 500; +} + +/* FOOTER TITLES */ +.title { + color: var(--vp-c-text-emphasis) !important; +} + +/* SIDEBAR */ + +.VPSidebarItem.level-1.is-link > .item > .link:hover > .text { + color: var(--vp-c-text-emphasis) !important; +} + +.VPSidebarItem.level-1.is-active > .item .link > .text { + color: var(--vp-c-text-emphasis) !important; +} + +.VPSidebarItem.level-2.is-link > .item > .link:hover > .text { + color: var(--vp-c-text-emphasis) !important; +} + +.VPSidebarItem.level-2.is-active > .item .link > .text { + color: var(--vp-c-text-emphasis) !important; +} + +.VPSidebarItem.level-3.is-link > .item > .link:hover > .text { + color: var(--vp-c-text-emphasis) !important; +} + +.VPSidebarItem.level-3.is-active > .item .link > .text { + color: var(--vp-c-text-emphasis) !important; +} + +.VPSidebarItem.level-0 h2{ + color: var(--vp-c-text-primary) !important; + font-weight: 750 !important; + font-size: 16px !important; +} + + +.VPSidebarItem.level-1 .text { + color: var(--vp-c-text-secondary) !important; +} + + + + /* PAGER */ + .pager-link:hover { + background-color: var(--vp-accent); + } + +/* CUSTOM BLOCK CSS */ +.vp-doc .custom-block p code { + background-color: var(--vp-code-bg); + padding: 4px 8px; + border-radius: 4px; + color: var(--vp-code-color); + font-family: var(--font-jetbrains-mono), monospace; + font-size: .875em; +} + +/* PLUGIN TABS */ +.plugin-tabs { + border: 1px solid var(--vp-c-border); + border-radius: var(--radius); + background-color: var(--vp-c-bg-alt); +} + +/* Navbar */ + +.VPFlyout span{ + color: var(--vp-c-text-primary) !important; +} + +.VPFlyout.active .text { + color: var(--vp-c-text-primary) !important; +} + +.VPFlyout:hover .text { + color: var(--vp-c-text-emphasis)!important; +} +.VPMenu{ + background-color: var(--vp-c-bg-alt) !important; + border-radius: var(--radius) !important; +} + +/* Pagers */ + +.pager-link { + border-radius: var(--radius) !important; +} + +.pager-link:hover { + border-color: #5535c9 !important; +} + +/*search */ + +@media (min-width: 768px) { + .DocSearch-Button { + border: 1px solid var(--vp-c-border) !important; + } +} + +.search-bar:focus-within { + border: 1px solid var(--vp-c-text-secondary) !important; +} + +/* link in code */ + +.vp-doc a:hover { + color: var(--vp-c-text-emphasis) !important; +} + +/* UL */ + +.vp-doc ul{ + margin: 0 !important; +} + +/* TABLEAU GLOBAL STYLE */ +.vp-doc table { + width: 100%; + border-collapse: separate; + border-spacing: 0; + font-size: 14px; + color: var(--vp-c-text-1); + overflow: hidden; + margin: 0 auto 2rem auto; + border-radius: var(--radius); + background: transparent; + border: 1px solid var(--vp-c-border); + display: table; +} + +.vp-doc th, +.vp-doc td { + text-align: left; + background-color: var(--vp-c-bg); + white-space: pre-wrap; + border: 0px; + word-break: keep-all; + vertical-align: middle; + transition: background-color 0.2s ease; + height: 100%; + color: var(--vp-c-text-secondary); +} + +.vp-doc th { + color: var(--vp-c-text-secondary); + font-weight: 600; + text-transform: capitalize; +} + +.vp-doc tr:nth-child(2n) { + background-color: var(--vp-c-bg); +} + +.vp-doc thead tr:first-child th:first-child { + border-top-left-radius: var(--radius); +} +.vp-doc thead tr:first-child th:last-child { + border-top-right-radius: var(--radius); +} +.vp-doc tbody tr:last-child td:first-child { + border-bottom-left-radius: var(--radius); +} +.vp-doc tbody tr:last-child td:last-child { + border-bottom-right-radius: var(--radius); +} + +.vp-doc .centered-button { + text-align: center; + vertical-align: middle; +} + +.vp-doc .download-button { + gap: 6px; + padding: 6px 12px; + color: var(--vp-c-text-1); + border: none; + background: none; + cursor: pointer; +} + +.vp-doc .download-icon { + width: 16px; + height: 16px; + color: var(--vp-c-text-secondary); +} + +.vp-doc .download-icon:hover{ + color: var(--vp-c-text-primary); + transition: color 0.2s ease; +} + +.vp-doc table td:first-child, +.vp-doc table th:first-child { + width: fit-content; + min-width: 100px; + white-space: nowrap; + overflow: hidden; + text-overflow: ellipsis; + color: var(--vp-c-text-secondary); +} + +.custom-block-body { + padding-top: 0.2em; +} + +/* FOOTER */ + +.VPLastUpdated{ + color: var(--vp-c-text-subtle) !important; +} + +/* LOGO */ +.VPImage { + height: 38px !important; +} + +/* GLOBAL TITLE */ + +.title { + font-size: 18px !important; +} + +/* Theme Images */ +.theme-image { + position: relative; + display: inline-block; +} + +.theme-image img { + max-width: 100%; + height: auto; +} + +.light-theme-image { + display: block; +} + +.dark-theme-image { + display: none; +} + +html.dark .light-theme-image { + display: none; +} + +html.dark .dark-theme-image { + display: block; +} + +/* CAPTION IMG FRAMES */ + +.caption { + text-align: center; + color: var(--vp-c-text-subtle); + font-size: 14px; +} \ No newline at end of file diff --git a/docs/.vitepress/theme/index.ts b/docs/.vitepress/theme/index.ts new file mode 100644 index 00000000..aa677be2 --- /dev/null +++ b/docs/.vitepress/theme/index.ts @@ -0,0 +1,102 @@ +// https://vitepress.dev/guide/custom-theme +import { h, onMounted, nextTick, watch } from 'vue' +import type { Theme } from 'vitepress' +import { useRoute } from 'vitepress' +import { useMediaQuery } from '@vueuse/core' +import DefaultTheme from 'vitepress/theme' +import { enhanceAppWithTabs } from 'vitepress-plugin-tabs/client' +import mediumZoom from 'medium-zoom' +import Asciinema from './components/Asciinema.vue' +import CSVTable from './components/CSVMarkdown.vue' +import YouTubeVideo from './components/YouTubeVideo.vue' +import CustomSidebarItem from './components/CustomSidebarItem.vue' +import BlogList from './components/BlogList.vue' + +import { + CircleHelp, + CircleAlert, + CircleCheck, + FileText, + GitPullRequest, + LayoutDashboard, + TriangleAlert, + FilePen, + Ban, + Info, + Siren, + Store, + Newspaper, + Scale, +} from 'lucide-vue-next' + +import 'lucide-static/font/lucide.css' +import './custom.css' + +const isMobileorTablet = useMediaQuery('(max-width: 1279px)') + +// Mapping des icônes pour la navbar +const navIcons = { + Contribute: GitPullRequest, + Legal: Scale, + Dashboard: LayoutDashboard, + Landing: Store, + Blog: Newspaper +} + +export default { + extends: DefaultTheme, + Layout: () => { + return h(DefaultTheme.Layout, null, {}) + }, + enhanceApp({ app, router, siteData }) { + app.component('VPSidebarItem', CustomSidebarItem) + app.component('BlogList', BlogList) + enhanceAppWithTabs(app) + + + // Fournir le mapping d'icônes à l'application + app.provide('nav-icon-map', navIcons) + + + app.component('Asciinema', Asciinema) + app.component('markdownTable', CSVTable) + app.component('YouTubeVideo', YouTubeVideo) + + + // Lucide icons for pages + app.component('Newspaper', Newspaper) // Blog page + app.component('Scale', Scale) // Legal page + app.component('GitPullRequest', GitPullRequest) // Contribute page + app.component('LayoutDashboard', LayoutDashboard) // Dashboard link + app.component('Store', Store) // Landing page link + + // Lucide icons for callout / alerts + app.component('CircleHelp', CircleHelp) // TIP Callout + app.component('CircleAlert', CircleAlert) // IMPORTANT Callout + app.component('CircleCheck', CircleCheck) // SUCCESS Callout + app.component('TriangleAlert', TriangleAlert) // WARNING BLOCK + app.component('FilePen', FilePen) // NOTE BLOCK + app.component('Ban', Ban) // CAUTION BLOCK + app.component('Info', Info) // INFO BLOCK + app.component('Siren', Siren) // DANGER BLOCK + + }, + + setup() { + const route = useRoute() + + const initZoom = () => { + const margin = isMobileorTablet.value ? 0 : 150 + mediumZoom('.main img', { background: 'var(--vp-c-bg)', margin }) + } + + onMounted(() => { + initZoom() + }) + + watch( + () => route.path, + () => nextTick(() => initZoom()) + ) + } +} satisfies Theme diff --git a/docs/.vitepress/theme/style.css b/docs/.vitepress/theme/style.css new file mode 100644 index 00000000..f4fe65b8 --- /dev/null +++ b/docs/.vitepress/theme/style.css @@ -0,0 +1,140 @@ +/** + * Customize default theme styling by overriding CSS variables: + * https://github.com/vuejs/vitepress/blob/main/src/client/theme-default/styles/vars.css + */ + +/** + * Colors + * + * Each colors have exact same color scale system with 3 levels of solid + * colors with different brightness, and 1 soft color. + * + * - `XXX-1`: The most solid color used mainly for colored text. It must + * satisfy the contrast ratio against when used on top of `XXX-soft`. + * + * - `XXX-2`: The color used mainly for hover state of the button. + * + * - `XXX-3`: The color for solid background, such as bg color of the button. + * It must satisfy the contrast ratio with pure white (#ffffff) text on + * top of it. + * + * - `XXX-soft`: The color used for subtle background such as custom container + * or badges. It must satisfy the contrast ratio when putting `XXX-1` colors + * on top of it. + * + * The soft color must be semi transparent alpha channel. This is crucial + * because it allows adding multiple "soft" colors on top of each other + * to create a accent, such as when having inline code block inside + * custom containers. + * + * - `default`: The color used purely for subtle indication without any + * special meanings attached to it such as bg color for menu hover state. + * + * - `brand`: Used for primary brand colors, such as link text, button with + * brand theme, etc. + * + * - `tip`: Used to indicate useful information. The default theme uses the + * brand color for this by default. + * + * - `warning`: Used to indicate warning to the users. Used in custom + * container, badges, etc. + * + * - `danger`: Used to show error, or dangerous message to the users. Used + * in custom container, badges, etc. + * -------------------------------------------------------------------------- */ + +:root { + --vp-c-default-1: var(--vp-c-gray-1); + --vp-c-default-2: var(--vp-c-gray-2); + --vp-c-default-3: var(--vp-c-gray-3); + --vp-c-default-soft: var(--vp-c-gray-soft); + + --vp-c-brand-1: var(--vp-c-indigo-1); + --vp-c-brand-2: var(--vp-c-indigo-2); + --vp-c-brand-3: var(--vp-c-indigo-3); + --vp-c-brand-soft: var(--vp-c-indigo-soft); + + --vp-c-tip-1: var(--vp-c-brand-1); + --vp-c-tip-2: var(--vp-c-brand-2); + --vp-c-tip-3: var(--vp-c-brand-3); + --vp-c-tip-soft: var(--vp-c-brand-soft); + + --vp-c-warning-1: var(--vp-c-yellow-1); + --vp-c-warning-2: var(--vp-c-yellow-2); + --vp-c-warning-3: var(--vp-c-yellow-3); + --vp-c-warning-soft: var(--vp-c-yellow-soft); + + --vp-c-danger-1: var(--vp-c-red-1); + --vp-c-danger-2: var(--vp-c-red-2); + --vp-c-danger-3: var(--vp-c-red-3); + --vp-c-danger-soft: var(--vp-c-red-soft); +} + +/** + * Component: Button + * -------------------------------------------------------------------------- */ + +:root { + --vp-button-brand-border: transparent; + --vp-button-brand-text: var(--vp-c-white); + --vp-button-brand-bg: var(--vp-c-brand-3); + --vp-button-brand-hover-border: transparent; + --vp-button-brand-hover-text: var(--vp-c-white); + --vp-button-brand-hover-bg: var(--vp-c-brand-2); + --vp-button-brand-active-border: transparent; + --vp-button-brand-active-text: var(--vp-c-white); + --vp-button-brand-active-bg: var(--vp-c-brand-1); +} + +/** + * Component: Home + * -------------------------------------------------------------------------- */ + +:root { + --vp-home-hero-name-color: transparent; + --vp-home-hero-name-background: -webkit-linear-gradient( + 120deg, + #bd34fe 30%, + #41d1ff + ); + + --vp-home-hero-image-background-image: linear-gradient( + -45deg, + #bd34fe 50%, + #47caff 50% + ); + --vp-home-hero-image-filter: blur(44px); +} + +@media (min-width: 640px) { + :root { + --vp-home-hero-image-filter: blur(56px); + } +} + +@media (min-width: 960px) { + :root { + --vp-home-hero-image-filter: blur(68px); + } +} + +/** + * Component: Custom Block + * -------------------------------------------------------------------------- */ + +:root { + --vp-custom-block-tip-border: transparent; + --vp-custom-block-tip-text: var(--vp-c-text-1); + --vp-custom-block-tip-bg: var(--vp-c-brand-soft); + --vp-custom-block-tip-code-bg: var(--vp-c-brand-soft); +} + +/** + * Component: Algolia + * -------------------------------------------------------------------------- */ + +.DocSearch { + --docsearch-primary-color: var(--vp-c-brand-1) !important; +} + + diff --git a/source/_static/css/custom.css b/docs/src/_static/css/custom.css similarity index 100% rename from source/_static/css/custom.css rename to docs/src/_static/css/custom.css diff --git a/docs/src/about.md b/docs/src/about.md new file mode 100644 index 00000000..d4e62562 --- /dev/null +++ b/docs/src/about.md @@ -0,0 +1,38 @@ +# About Exegol + +Exegol is a comprehensive cybersecurity environment designed by offensive security experts, for fellow hackers, with its community. It solves the common pain points of traditional security distributions by providing a modular and reliable toolkit that's made for the field. + +Have you ever: +- Struggled to keep your distro running smoothly after a few months? +- Wasted hours installing and configuring tools instead of doing actual security work? +- Felt limited by outdated or lacking tools in traditional security distributions? +- Been frustrated and limited by the monolithic design of other solutions? + +Exegol addresses these challenges. + +## Core components + +Exegol combines several key components working together: + +- **Docker images**: pre-configured environments with carefully selected tools +- **Python wrapper**: a unified interface to manage all Exegol components easily, similarly to how Virtual Machines would be managed, but in a simple command-line interface. +- **Offline resources**: curated collection of tools that you may need to use on a target machine (e.g., enumeration and exploitation scripts such as LinPEAS, WinPEAS, LinEnum, PrivescCheck, SysinternalsSuite, etc.). They're updated monthly, managed by the wrapper, and shared with every container (at `/opt/resources`). +- **History & credentials**: a utility to manage credentials obtained during an engagement, and a dynamic history of hundreds of commands ready to be used + +## Key benefits + +- **Time-Saving**: Deploy ready-to-use environments in seconds +- **Reliability**: Tested and maintained by security professionals +- **Flexibility**: Works on top of your host OS. Supports Linux, macOS, and Windows. +- **Customization**: Adapt environments to your specific needs +- **Community-Driven**: Built with and for the security community + +## Tiers + +Exegol has a free Community offer, as well as paid tiers: Pro and Enterprise. Check it out at [exegol.com/pricing](https://exegol.com/pricing). +Note the Enterprise tier includes everything from the Pro tier, and more. Wherever the Pro badge is present, Enterprise users may enjoy the feature as well. + + + + + diff --git a/docs/src/assets/Exegol_Symbol_DarkVersion.svg b/docs/src/assets/Exegol_Symbol_DarkVersion.svg new file mode 100644 index 00000000..5495f5ef --- /dev/null +++ b/docs/src/assets/Exegol_Symbol_DarkVersion.svg @@ -0,0 +1,21 @@ + + + + + + + + + + + + + \ No newline at end of file diff --git a/docs/src/assets/Exegol_Symbol_LightVersion.svg b/docs/src/assets/Exegol_Symbol_LightVersion.svg new file mode 100644 index 00000000..85584a82 --- /dev/null +++ b/docs/src/assets/Exegol_Symbol_LightVersion.svg @@ -0,0 +1,21 @@ + + + + + + + + + + + + + \ No newline at end of file diff --git a/docs/src/assets/blog/bhusa2023.png b/docs/src/assets/blog/bhusa2023.png new file mode 100644 index 00000000..5784df24 Binary files /dev/null and b/docs/src/assets/blog/bhusa2023.png differ diff --git a/docs/src/assets/blog/kali_lincox_dark.png b/docs/src/assets/blog/kali_lincox_dark.png new file mode 100644 index 00000000..1edc7775 Binary files /dev/null and b/docs/src/assets/blog/kali_lincox_dark.png differ diff --git a/docs/src/assets/blog/kali_lincox_light.png b/docs/src/assets/blog/kali_lincox_light.png new file mode 100644 index 00000000..97619833 Binary files /dev/null and b/docs/src/assets/blog/kali_lincox_light.png differ diff --git a/docs/src/assets/blog/marcello_statement.png b/docs/src/assets/blog/marcello_statement.png new file mode 100644 index 00000000..d11a96be Binary files /dev/null and b/docs/src/assets/blog/marcello_statement.png differ diff --git a/docs/src/assets/blog/offsec_catalog.png b/docs/src/assets/blog/offsec_catalog.png new file mode 100644 index 00000000..483c29aa Binary files /dev/null and b/docs/src/assets/blog/offsec_catalog.png differ diff --git a/source/assets/contributors/github_add_gpg_key.png b/docs/src/assets/contributors/github_add_gpg_key.png similarity index 100% rename from source/assets/contributors/github_add_gpg_key.png rename to docs/src/assets/contributors/github_add_gpg_key.png diff --git a/source/assets/contributors/github_homepage_settings.png b/docs/src/assets/contributors/github_homepage_settings.png similarity index 100% rename from source/assets/contributors/github_homepage_settings.png rename to docs/src/assets/contributors/github_homepage_settings.png diff --git a/source/assets/contributors/github_new_gpg_key.png b/docs/src/assets/contributors/github_new_gpg_key.png similarity index 100% rename from source/assets/contributors/github_new_gpg_key.png rename to docs/src/assets/contributors/github_new_gpg_key.png diff --git a/source/assets/contributors/gpg_preferences_gitkraken.png b/docs/src/assets/contributors/gpg_preferences_gitkraken.png similarity index 100% rename from source/assets/contributors/gpg_preferences_gitkraken.png rename to docs/src/assets/contributors/gpg_preferences_gitkraken.png diff --git a/source/assets/contributors/gpg_proof.png b/docs/src/assets/contributors/gpg_proof.png similarity index 100% rename from source/assets/contributors/gpg_proof.png rename to docs/src/assets/contributors/gpg_proof.png diff --git a/source/assets/desktop.png b/docs/src/assets/desktop.png similarity index 100% rename from source/assets/desktop.png rename to docs/src/assets/desktop.png diff --git a/source/assets/exegol_resources/resources_list.csv b/docs/src/assets/exegol_resources/resources_list.csv similarity index 100% rename from source/assets/exegol_resources/resources_list.csv rename to docs/src/assets/exegol_resources/resources_list.csv diff --git a/source/assets/faq/docker_desktop_disk_image_location.png b/docs/src/assets/faq/docker_desktop_disk_image_location.png similarity index 100% rename from source/assets/faq/docker_desktop_disk_image_location.png rename to docs/src/assets/faq/docker_desktop_disk_image_location.png diff --git a/source/assets/gh_pipelines.png b/docs/src/assets/gh_pipelines.png similarity index 100% rename from source/assets/gh_pipelines.png rename to docs/src/assets/gh_pipelines.png diff --git a/source/assets/install/macOS_resources_req.png b/docs/src/assets/install/macOS_resources_req.png similarity index 100% rename from source/assets/install/macOS_resources_req.png rename to docs/src/assets/install/macOS_resources_req.png diff --git a/source/assets/install/macOS_xquartz_config.png b/docs/src/assets/install/macOS_xquartz_config.png similarity index 100% rename from source/assets/install/macOS_xquartz_config.png rename to docs/src/assets/install/macOS_xquartz_config.png diff --git a/source/assets/install/windows_dockerdesktop_wsl_config.png b/docs/src/assets/install/windows_dockerdesktop_wsl_config.png similarity index 100% rename from source/assets/install/windows_dockerdesktop_wsl_config.png rename to docs/src/assets/install/windows_dockerdesktop_wsl_config.png diff --git a/source/assets/installed_tools/lists/ad_3.1.0_amd64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.0_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.0_amd64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.0_amd64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.0_arm64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.0_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.0_arm64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.0_arm64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.1_amd64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.1_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.1_amd64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.1_amd64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.1_arm64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.1_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.1_arm64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.1_arm64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.2_amd64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.2_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.2_amd64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.2_amd64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.2_arm64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.2_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.2_arm64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.2_arm64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.3_amd64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.3_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.3_amd64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.3_amd64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.3_arm64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.3_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.3_arm64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.3_arm64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.4_amd64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.4_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.4_amd64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.4_amd64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.4_arm64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.4_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.4_arm64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.4_arm64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.5_amd64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.5_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.5_amd64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.5_amd64.csv diff --git a/source/assets/installed_tools/lists/ad_3.1.5_arm64.csv b/docs/src/assets/installed_tools/lists/ad_3.1.5_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/ad_3.1.5_arm64.csv rename to docs/src/assets/installed_tools/lists/ad_3.1.5_arm64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.0_amd64.csv b/docs/src/assets/installed_tools/lists/full_3.1.0_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.0_amd64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.0_amd64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.0_arm64.csv b/docs/src/assets/installed_tools/lists/full_3.1.0_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.0_arm64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.0_arm64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.1_amd64.csv b/docs/src/assets/installed_tools/lists/full_3.1.1_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.1_amd64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.1_amd64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.1_arm64.csv b/docs/src/assets/installed_tools/lists/full_3.1.1_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.1_arm64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.1_arm64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.2_amd64.csv b/docs/src/assets/installed_tools/lists/full_3.1.2_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.2_amd64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.2_amd64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.2_arm64.csv b/docs/src/assets/installed_tools/lists/full_3.1.2_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.2_arm64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.2_arm64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.3_amd64.csv b/docs/src/assets/installed_tools/lists/full_3.1.3_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.3_amd64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.3_amd64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.3_arm64.csv b/docs/src/assets/installed_tools/lists/full_3.1.3_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.3_arm64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.3_arm64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.4_amd64.csv b/docs/src/assets/installed_tools/lists/full_3.1.4_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.4_amd64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.4_amd64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.4_arm64.csv b/docs/src/assets/installed_tools/lists/full_3.1.4_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.4_arm64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.4_arm64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.5_amd64.csv b/docs/src/assets/installed_tools/lists/full_3.1.5_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.5_amd64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.5_amd64.csv diff --git a/source/assets/installed_tools/lists/full_3.1.5_arm64.csv b/docs/src/assets/installed_tools/lists/full_3.1.5_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/full_3.1.5_arm64.csv rename to docs/src/assets/installed_tools/lists/full_3.1.5_arm64.csv diff --git a/source/assets/installed_tools/lists/latest_nightly_amd64.csv b/docs/src/assets/installed_tools/lists/latest_nightly_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/latest_nightly_amd64.csv rename to docs/src/assets/installed_tools/lists/latest_nightly_amd64.csv diff --git a/source/assets/installed_tools/lists/latest_nightly_arm64.csv b/docs/src/assets/installed_tools/lists/latest_nightly_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/latest_nightly_arm64.csv rename to docs/src/assets/installed_tools/lists/latest_nightly_arm64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.0_amd64.csv b/docs/src/assets/installed_tools/lists/light_3.1.0_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.0_amd64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.0_amd64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.0_arm64.csv b/docs/src/assets/installed_tools/lists/light_3.1.0_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.0_arm64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.0_arm64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.1_amd64.csv b/docs/src/assets/installed_tools/lists/light_3.1.1_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.1_amd64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.1_amd64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.1_arm64.csv b/docs/src/assets/installed_tools/lists/light_3.1.1_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.1_arm64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.1_arm64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.2_amd64.csv b/docs/src/assets/installed_tools/lists/light_3.1.2_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.2_amd64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.2_amd64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.2_arm64.csv b/docs/src/assets/installed_tools/lists/light_3.1.2_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.2_arm64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.2_arm64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.3_amd64.csv b/docs/src/assets/installed_tools/lists/light_3.1.3_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.3_amd64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.3_amd64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.3_arm64.csv b/docs/src/assets/installed_tools/lists/light_3.1.3_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.3_arm64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.3_arm64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.4_amd64.csv b/docs/src/assets/installed_tools/lists/light_3.1.4_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.4_amd64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.4_amd64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.4_arm64.csv b/docs/src/assets/installed_tools/lists/light_3.1.4_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.4_arm64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.4_arm64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.5_amd64.csv b/docs/src/assets/installed_tools/lists/light_3.1.5_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.5_amd64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.5_amd64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.5_arm64.csv b/docs/src/assets/installed_tools/lists/light_3.1.5_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.5_arm64.csv rename to docs/src/assets/installed_tools/lists/light_3.1.5_arm64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.0_amd64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.0_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.0_amd64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.0_amd64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.0_arm64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.0_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.0_arm64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.0_arm64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.1_amd64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.1_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.1_amd64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.1_amd64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.1_arm64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.1_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.1_arm64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.1_arm64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.2_amd64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.2_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.2_amd64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.2_amd64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.2_arm64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.2_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.2_arm64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.2_arm64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.3_amd64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.3_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.3_amd64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.3_amd64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.3_arm64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.3_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.3_arm64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.3_arm64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.4_amd64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.4_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.4_amd64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.4_amd64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.4_arm64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.4_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.4_arm64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.4_arm64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.5_amd64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.5_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.5_amd64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.5_amd64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.5_arm64.csv b/docs/src/assets/installed_tools/lists/osint_3.1.5_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.5_arm64.csv rename to docs/src/assets/installed_tools/lists/osint_3.1.5_arm64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.0_amd64.csv b/docs/src/assets/installed_tools/lists/web_3.1.0_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.0_amd64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.0_amd64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.0_arm64.csv b/docs/src/assets/installed_tools/lists/web_3.1.0_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.0_arm64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.0_arm64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.1_amd64.csv b/docs/src/assets/installed_tools/lists/web_3.1.1_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.1_amd64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.1_amd64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.1_arm64.csv b/docs/src/assets/installed_tools/lists/web_3.1.1_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.1_arm64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.1_arm64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.2_amd64.csv b/docs/src/assets/installed_tools/lists/web_3.1.2_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.2_amd64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.2_amd64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.2_arm64.csv b/docs/src/assets/installed_tools/lists/web_3.1.2_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.2_arm64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.2_arm64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.3_amd64.csv b/docs/src/assets/installed_tools/lists/web_3.1.3_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.3_amd64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.3_amd64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.3_arm64.csv b/docs/src/assets/installed_tools/lists/web_3.1.3_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.3_arm64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.3_arm64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.4_amd64.csv b/docs/src/assets/installed_tools/lists/web_3.1.4_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.4_amd64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.4_amd64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.4_arm64.csv b/docs/src/assets/installed_tools/lists/web_3.1.4_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.4_arm64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.4_arm64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.5_amd64.csv b/docs/src/assets/installed_tools/lists/web_3.1.5_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.5_amd64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.5_amd64.csv diff --git a/source/assets/installed_tools/lists/web_3.1.5_arm64.csv b/docs/src/assets/installed_tools/lists/web_3.1.5_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/web_3.1.5_arm64.csv rename to docs/src/assets/installed_tools/lists/web_3.1.5_arm64.csv diff --git a/docs/src/assets/installed_tools/nightly.csv b/docs/src/assets/installed_tools/nightly.csv new file mode 100644 index 00000000..c484617b --- /dev/null +++ b/docs/src/assets/installed_tools/nightly.csv @@ -0,0 +1,3 @@ +Image tag,Version,Arch,Build date,Tools list +nightly,dd8dab7f,amd64,"2025-05-21T23:09:45Z",[download]() +nightly,dd8dab7f,arm64,"2025-05-21T22:41:28Z",[download]() diff --git a/source/assets/installed_tools/releases_amd64.csv b/docs/src/assets/installed_tools/releases_amd64.csv similarity index 85% rename from source/assets/installed_tools/releases_amd64.csv rename to docs/src/assets/installed_tools/releases_amd64.csv index 237d5f31..487cfcd6 100644 --- a/source/assets/installed_tools/releases_amd64.csv +++ b/docs/src/assets/installed_tools/releases_amd64.csv @@ -1,9 +1,4 @@ Image tag,Version,Build date,Tools list -full,3.1.6,2025-03-20T03:56:44Z,:download:`full_3.1.6_amd64.csv ` -ad,3.1.6,2025-03-20T03:11:46Z,:download:`ad_3.1.6_amd64.csv ` -osint,3.1.6,2025-03-20T03:07:31Z,:download:`osint_3.1.6_amd64.csv ` -light,3.1.6,2025-03-20T03:07:16Z,:download:`light_3.1.6_amd64.csv ` -web,3.1.6,2025-03-20T03:06:56Z,:download:`web_3.1.6_amd64.csv ` osint,3.1.5,2024-10-18T11:13:54Z,:download:`osint_3.1.5_amd64.csv ` full,3.1.5,2024-10-18T11:10:19Z,:download:`full_3.1.5_amd64.csv ` ad,3.1.5,2024-10-18T10:59:04Z,:download:`ad_3.1.5_amd64.csv ` diff --git a/source/assets/installed_tools/releases_arm64.csv b/docs/src/assets/installed_tools/releases_arm64.csv similarity index 85% rename from source/assets/installed_tools/releases_arm64.csv rename to docs/src/assets/installed_tools/releases_arm64.csv index a476766a..bb724aba 100644 --- a/source/assets/installed_tools/releases_arm64.csv +++ b/docs/src/assets/installed_tools/releases_arm64.csv @@ -1,9 +1,4 @@ Image tag,Version,Build date,Tools list -full,3.1.6,2025-03-20T03:17:22Z,:download:`full_3.1.6_arm64.csv ` -ad,3.1.6,2025-03-20T03:17:06Z,:download:`ad_3.1.6_arm64.csv ` -osint,3.1.6,2025-03-20T03:16:36Z,:download:`osint_3.1.6_arm64.csv ` -light,3.1.6,2025-03-20T03:11:55Z,:download:`light_3.1.6_arm64.csv ` -web,3.1.6,2025-03-20T03:11:39Z,:download:`web_3.1.6_arm64.csv ` osint,3.1.5,2024-10-18T10:57:14Z,:download:`osint_3.1.5_arm64.csv ` full,3.1.5,2024-10-18T10:54:27Z,:download:`full_3.1.5_arm64.csv ` ad,3.1.5,2024-10-18T10:35:55Z,:download:`ad_3.1.5_arm64.csv ` diff --git a/.assets/logo_round.png b/docs/src/assets/logo_round.png similarity index 100% rename from .assets/logo_round.png rename to docs/src/assets/logo_round.png diff --git a/source/assets/maintainers/gha_deployment/step_1.png b/docs/src/assets/maintainers/gha_deployment/step_1.png similarity index 100% rename from source/assets/maintainers/gha_deployment/step_1.png rename to docs/src/assets/maintainers/gha_deployment/step_1.png diff --git a/source/assets/maintainers/gha_deployment/step_2.png b/docs/src/assets/maintainers/gha_deployment/step_2.png similarity index 100% rename from source/assets/maintainers/gha_deployment/step_2.png rename to docs/src/assets/maintainers/gha_deployment/step_2.png diff --git a/source/assets/maintainers/gha_deployment/step_3.png b/docs/src/assets/maintainers/gha_deployment/step_3.png similarity index 100% rename from source/assets/maintainers/gha_deployment/step_3.png rename to docs/src/assets/maintainers/gha_deployment/step_3.png diff --git a/docs/src/assets/overviews-dark.png b/docs/src/assets/overviews-dark.png new file mode 100644 index 00000000..b0550c79 Binary files /dev/null and b/docs/src/assets/overviews-dark.png differ diff --git a/docs/src/assets/overviews-light.png b/docs/src/assets/overviews-light.png new file mode 100644 index 00000000..866aaacf Binary files /dev/null and b/docs/src/assets/overviews-light.png differ diff --git a/source/assets/overviews_structure.png b/docs/src/assets/overviews_structure.png similarity index 100% rename from source/assets/overviews_structure.png rename to docs/src/assets/overviews_structure.png diff --git a/source/assets/overviews_techs.png b/docs/src/assets/overviews_techs.png similarity index 100% rename from source/assets/overviews_techs.png rename to docs/src/assets/overviews_techs.png diff --git a/source/assets/sponsors/capgemini.png b/docs/src/assets/sponsors/capgemini.png similarity index 100% rename from source/assets/sponsors/capgemini.png rename to docs/src/assets/sponsors/capgemini.png diff --git a/source/assets/sponsors/hackthebox.png b/docs/src/assets/sponsors/hackthebox.png similarity index 100% rename from source/assets/sponsors/hackthebox.png rename to docs/src/assets/sponsors/hackthebox.png diff --git a/source/assets/troubleshooting/dd_default_disk_size.png b/docs/src/assets/troubleshooting/dd_default_disk_size.png similarity index 100% rename from source/assets/troubleshooting/dd_default_disk_size.png rename to docs/src/assets/troubleshooting/dd_default_disk_size.png diff --git a/source/assets/troubleshooting/dd_shrink.png b/docs/src/assets/troubleshooting/dd_shrink.png similarity index 100% rename from source/assets/troubleshooting/dd_shrink.png rename to docs/src/assets/troubleshooting/dd_shrink.png diff --git a/docs/src/blog/exegol-goes-pro.md b/docs/src/blog/exegol-goes-pro.md new file mode 100644 index 00000000..23d62277 --- /dev/null +++ b/docs/src/blog/exegol-goes-pro.md @@ -0,0 +1,170 @@ +--- +title: Exegol goes Pro +date: 2025-05-30 +author: Charlie and Mathieu +description: Learn about our story, philosophy, vision and values. Past and future. A statement on our transition to a sustainable model, and the lessons we learned from others. +sidebar: false +--- + +# Exegol goes Pro + +## How it started + +Exegol began in 2020 as an answer to a personal frustration. I, Charlie, was fed up with the state of ethical hacking environments. + +Kali Linux was the most widely adopted solution — the "industry standard," as they say. But it was giving me a hard time. Every `apt upgrade` and tool install felt like a leap of faith, often breaking things and throwing my machine into dependency hell. Tools were outdated. The design itself felt rigid: an ISO to install either as a single/dual boot or in a VM. It wasn't enough for me. + +Sure, there were Docker and OVA versions, but they clearly weren't the primary focus of Offensive Security, and it showed. The other alternatives — Parrot, BlackArch — weren't solving the core issues. They offered different tools or base distros, but followed the same monolithic design philosophy. + +![](/assets/blog/kali_lincox_dark.png){data-theme="dark"} +![](/assets/blog/kali_lincox_light.png){data-theme="light"} +Just teasing, we have a huge respect for what Kali brought to the community{.caption} + +As a professional, I needed something more flexible. Different engagements demanded different environments. I had trainings, labs, CTF events — I couldn't afford a single system that just evolved over time. It would become unstable, unpredictable, and frankly, a security risk. + +I needed isolation and structure, but without the hassle. + +Virtual machines? Too heavy and bloated. +The answer seemed to be containers. + +So I created a simple Dockerfile — initially based on Kali (now Debian-based) — and went further with the right customizations, inspired by [Thibaud Robin](https://www.linkedin.com/in/thibaud-robin/)'s [docker-kali-light](https://github.com/thibaudrobin/docker-kali-light) project: BloodHound and Neo4j properly installed and initialized, Responder configured, Impacket set up, and more. A pet project was born. + +Then came a Makefile, because typing `docker run` with a thousand flags was a pain. That Makefile quickly evolved into a Python wrapper for better flexibility and multi-container management. + +Around that time, my employer tasked me with building a pentesting team from scratch. What began as my solo tool became a shared asset. I open-sourced it, shared it with my direct circle, and then... COVID hit. + +## Lockdown + +2020 into 2021. Covid. Lockdown. I was stuck in a tiny apartment with not much else to do. Exegol became my escape — and my window to the outside world. + +More importantly, it became my bridge to a growing ecosystem. People started using it. Talking about it. Contributing. The Discord server expanded organically. What began as a solution to my personal frustration was resonating with other hackers facing similar challenges. + +How many times have I heard "Oh, awesome! I was just about to create something like this!". + +In early 2022, [Mathieu](https://www.linkedin.com/in/mathieu-calemard-du-gardin-005803b4/) (aka [Dramelac](https://x.com/Dramelac_)) joined and completely refactored the Python wrapper. Together, we really dove deep into it and expanded on what existed, and what could be added. We presented at Black Hat Europe Arsenal that December, then again in Asia and the US in 2023. What a thrill! + +![](/assets/blog/bhusa2023.png) +Mathieu (left) and I (right) at Black Hat US 2023{.caption} + +We kept pushing — endless nights and weekends. We were... *committing* (pun intended). Documentation, multiple image types, resources, a comprehensive CI/CD pipeline, on-prem runners for cross-architecture support, all major operating systems supported, shell logging, a full GUI desktop environment — the list kept growing. + +What started as a simple Dockerfile had evolved into a complete ecosystem. A modular, cross-platform hacking environment that saves practitioners time and lets them focus on what they do best: hack things. + +Other contributors joined the adventure, such as **[Alexis Martin (aka qu35t)](https://x.com/QU35T_TV)** who took on a major role in image development and Discord support. + +## The wake-up call + +By the end of 2023, something was wrong. + +My job had evolved significantly over the years, but I wasn't fulfilled anymore. What really drove me were the *extras* — the things I did outside of work. + +In four years, I had given ~25 talks worldwide ; participated in dozens of CTFs ; created [The Hacker Recipes](https://thehacker.recipes) (200k+ users/year) ; built Exegol (thousands of users worldwide). + +But this pace wasn't sustainable. I was exhausted. + +I shared these feelings with Mathieu. And the conversation quickly became "What about Exegol?". By mid-2024, we faced a harsh reality: our creation would inevitably die if things didn't change. + +We lacked sufficient contributors ; budget for hiring developers and investing further ; time, as our priorities would be shifting eventually. This project was costing us both time and money, it couldn't go on and on like this. + +While this work meant everything to us, we were spending considerable time and money on something that didn't pay the bills. + +## Searching for sustainability + +Every avenue for keeping things alive was explored and considered. Donations? Our niche is too small. Sponsorships/ads? Same problem. Certifications, trainings? Developing Exegol should stay our main focus. + +Even with The Hacker Recipes' 200k users, monetization attempts confirmed these weren't viable paths (but I made my peace with it. THR is knowledge I won't put behind a paywall. And it may very well live on contributions and few of my time and money). + +We noticed something else. Open-source initiatives often thrived when attached to professional software offerings. + +The more we considered it, the clearer it became: this wake-up call might be exactly what Exegol needed. + +## From risk to opportunity + +Perhaps this challenge could be a blessing in disguise. I've always tried to find silver linings in difficult situations, and this time was no different. + +If we could build a company around Exegol, it wouldn't just survive — it could thrive! No longer a side venture, it would become our primary focus. + +So in June 2024, we took the leap. + +In the last 12 months, Mathieu and I quit our jobs, founded the company, and developed a model we hope will be sustainable: paid tiers for professionals and enterprises, while maintaining a free offering. + +It's a leap of faith. There's a risk no one cares. But if they -you- do care, the possibilities are endless, and this gives us the chance to realize the vision we've always had — for all of us. + +## Free, and Open-Source + +When people hear "open source," they often think "free." But these are fundamentally different concepts, usually combined in a single acronym: FOSS (Free and Open-Source). + +We're keeping most of our code open source because we believe in **Transparency**, **Trust** and **Community**. + +Yes, having open-source code means people *could* bypass license checks. There's no technical challenge there. But we see this as a risk worth taking to truly live by our values, not just preach them. + +We trust our users will understand: if we can't maintain a sustainable model, the hundreds of improvements we envision will never materialize. It's on us to keep delivering value, but we hope you'll join us in supporting this initiative. + +Our model recognizes the real value in the work: +- **Community tier** remains free for learners, the curious, and CTF players +- **Pro and Enterprise tiers** for commercial use, premium features, and direct support + +But here's where we're different: value flows back to those who create it, by recognizing what truly matters and organizing around it. Our users are our center. + +Contributions — whether code, documentation, testing, or helping others on Discord — will be eligible for **subscription discounts up to 100%**. Because open source shouldn't mean "you work, I use" all the time. It should foster collaboration. + +You're not just users. You're **community members** who can choose to support financially as customers, and/or contribute directly and be recognized for that. + +## Learning from others + +We're not the first to walk this path. The security community has seen various approaches to sustainability — some successful, others less so. Each story taught us something valuable. + +### The success stories + +**[Metasploit](https://metasploit.com/)** started as HD Moore's passion project in 2003, a Perl-based framework that revolutionized exploit development. When [Rapid7](https://www.rapid7.com/) acquired it in 2009, and maintained a robust free version while building Metasploit Pro for enterprises. They respected the community that made Metasploit great while creating a sustainable business model. Twenty years later, it's still the de facto standard for exploitation frameworks. Users win with continuous updates, Rapid7 wins with revenue, and the security community wins with a tool that keeps evolving. *Lesson: hybrid free/paid models can work when done right.* + +**[BloodHound](https://bloodhound.readthedocs.io/)** represents what we consider the gold standard. When [Rohan Vazarkar](https://twitter.com/cptjesus), [Will Schroeder](https://twitter.com/harmj0y), and [Andy Robbins](https://twitter.com/_wald0) unveiled it at DEF CON 24 in 2016, it transformed Active Directory security. The creators were part of Veris Group's ATD, later acquired by Coalfire. Former Veris Group members then founded [SpecterOps](https://specterops.io/), which retained the BloodHound project. It has since balanced community and commercial interests. The Community Edition remains powerful and free, while the [Enterprise version](https://specterops.io/bloodhound-enterprise) adds features that make sense for larger organizations. When they refactored the community version to share a codebase with Enterprise, they added features. The community got APIs, a client-server model, and better performance. *Lesson: another example of a successful hybrid free/paid model, when done right.* + +**[PingCastle](https://www.pingcastle.com/)** tells a more recent success story. [Vincent Letoux](https://twitter.com/vletoux) created this AD assessment tool in 2018, offering it free for most users while requiring licenses for commercial use or advanced features (iirc). It quickly became essential for AD security assessments. When [Netwrix](https://www.netwrix.com/) acquired it in 2024, it validated the model — create real value, build sustainably, and good things follow. The tool continues to evolve under corporate ownership while maintaining its community roots. *Lesson: ~~Frenchies for the win~~ another example.* + +### The cautionary tales + +**[CrackMapExec](https://github.com/byt3bl33d3r/CrackMapExec)** breaks our hearts because it came so close to getting it right. Marcello "[@byt3bl33d3r](https://twitter.com/byt3bl33d3r)" created this Swiss Army knife for pentesting in 2015. By 2020, when he announced Porchetta Industries, we were excited. His [blog post](https://web.archive.org/web/20201119013651/https://blog.porchetta.industries/2020/11/17/And-Now-For-Something-Completely-Diffrent/) could have been written by us — same frustrations, similar vision, same hope for sustainability. + +![](/assets/blog/marcello_statement.png) +A statement from Marcello we can't disagree with{.caption} + +The model seemed clever: paying subscribers got new features first, then they'd release to the public. Partnership with Kali Linux. Community involvement. But something went wrong in execution. The codebases diverged — one for subscribers, one for the public. Community contributions sat unmerged for months. Development became fragmented. When Martial "[mpgn](https://twitter.com/mpgn_x64)", the principal contributor, stepped away in September 2023, the project crumbled within weeks. The community scrambled to fork it as [NetExec](https://github.com/Pennyw0rth/NetExec), but the damage was done. Unclear revenue distribution between contributors created additional friction. Porchetta Industries shut down after barely two years. *Lesson: vision without proper execution kills projects.* + +**[HackTricks](https://book.hacktricks.xyz/)** shows another path, with its own trade-offs. Carlos Polop built an incredible resource — a living encyclopedia of pentesting techniques. It became the go-to reference for students, CTF players, and professionals. Around 2023, facing the same sustainability challenges we all face, he put premium content behind a paywall and launched certifications. It works financially, but at a cost. The free version, while still useful, suffers from quality issues — copy-pasted content, inaccuracies, poor structure. It's a goldmine buried under organizational chaos. *Lesson: when you shift focus away from your core offering to pursue other revenue streams, the quality of what made you valuable in the first place can suffer.* + +### The complex legacy + +**[Impacket](https://github.com/fortra/impacket)** deserves a special mention. Created by [Core Security](https://www.coresecurity.com/) in the early 2000s, it's been the backbone of Windows network attacks for two decades. Through acquisitions — Core Security to HelpSystems to [Fortra](https://www.fortra.com/) — it survived. But "survived" might be generous. The library remains incredibly powerful, essential to tools we all use daily. Yet the community increasingly discusses forks or alternatives because development feels sluggish, pull requests languish, and responsiveness suffers. It lives on, probably sustained by revenue from Fortra's commercial tools like [Core Impact](https://www.coresecurity.com/core-impact) and [Cobalt Strike](https://www.cobaltstrike.com/). But is survival enough? *Lesson: free tools can persist through commercial ecosystems, but without active investment, they risk becoming relics.* + +**[Kali Linux](https://www.kali.org/)** was born from BackTrack in 2013. [Offensive Security](https://www.offsec.com/) built it into *the* pentesting distribution, and still manages to maintain it, probably thanks to a large catalog of certifications (OSEP, OSED, and more), generating a steady revenue stream. + +![](/assets/blog/offsec_catalog.png) +OffSec's catalog preview{.caption} + +OffSec clearly is a training/certs company that happens to maintain the biggest hacking distribution around. However, despite a huge number of users (and probably contributors as well), it feels like Kali is missing out on R&D. Had they invested in making Kali truly great perhaps Exegol wouldn't have been necessary, at least not in this form. *Lesson: when your core product becomes a means to an end rather than the end itself, investing in innovation for the core product becomes indirect, and harder to justify. It may allow for a sustainable model, but it's probably not compatible with keeping your main focus on the initial thing.* + +## Our path forward + +These stories shaped our thinking. We see patterns in the successes: transparency, community alignment, sustainable revenue, maintaining focus. We see patterns in the failures too. + +Our model synthesizes these lessons: +- Like Metasploit and BloodHound, we'll maintain strong free and paid versions — but unlike CME, we'll mostly keep them aligned. +- Like PingCastle, we'll be clear about licensing and value, and we won't let paid features diminish the free experience (on the contrary). +- Like all of them, we need sustainable revenue — but unlike some mentioned before, Exegol itself remains our north star, not certifications or training. While we don't rule out this path entirely, it won't be our top priority. + +We're building the best possible hacking environment, period. The business model needs to serve that goal. + +## SIGCONT + +This is our turning point. We're all-in. + +Like Tony Stark, we started building Exegol "in a cave with a box of scraps." + +We believe there's more to it. + +Unlike Tony Stark, we're not in a fantasy, with unlimited resources. + +We need you. + +*— Charlie & Mathieu* diff --git a/docs/src/blog/index.md b/docs/src/blog/index.md new file mode 100644 index 00000000..0e7d07b2 --- /dev/null +++ b/docs/src/blog/index.md @@ -0,0 +1,14 @@ +--- +title: Blog +titleTemplate: :title | Exegol Docs +sidebar: false +aside: false +lastUpdated: false +--- + +# Blog + +Welcome to our blog where we share updates, insights, and stories about Exegol's journey. + + + diff --git a/docs/src/contribute/docs.md b/docs/src/contribute/docs.md new file mode 100644 index 00000000..8b3b4e6e --- /dev/null +++ b/docs/src/contribute/docs.md @@ -0,0 +1,157 @@ +# Contributing to the Documentation + +The Exegol documentation is built using VitePress. This guide will help you contribute to the documentation. + +## Getting started + +1. Fork the [Exegol-docs](https://github.com/ThePorgs/Exegol-docs) repository +2. Checkout the `dev` branch +3. (optional) create a new branch in your fork, if you plan on working on different topics +4. Create your content using this guide +5. Make sure the content builds fine with `npm install && npm run docs:dev` +6. Stage, Commit, and Push your changes +7. Submit a Pull Request (https://github.com/ThePorgs/Exegol-docs/compare) + +## Documentation Structure + +The documentation is organized into several sections: + +- General + - About Exegol + - Getting started + - Frequently Asked Questions + - Troubleshooting + - Tips & tricks +- Exegol components + - Images + - Wrapper + - Resources + - Dashboard +- Contributing notes +- Legal documents + +All documentation files are stored in the `/docs/src` folder. + +## Writing Style + +When writing documentation, maintain the following tone & voice: + +* **Professional and Authoritative**: Content should maintain a professional tone, suitable for a technical audience. +* **Instructional and Informative**: Writing should aim to educate the reader, with clear instructions and explanations. +* **Impersonal and Objective**: Avoid directly addressing the reader or using personal pronouns. Use passive constructions or neutral phrasing. + +## Markdown Features + +The documentation supports several markdown features: + +### Code Blocks + +Use triple backticks to delimit code blocks, specifying the language after the first set of backticks: + +```python +print('hello world') +``` + +### Tabs + +```markdown +::: tabs +== Tab 1 +Content for tab 1 + +== Tab 2 +Content for tab 2 +::: +``` + +### Callouts + +The documentation uses GitHub-flavored alerts for callouts: + +> [!NOTE] +> Additional information that can almost be ignored, but may be interesting to know. + +> [!TIP] +> Useful suggestions and recommended practices. Something you'd tell a friend. + +> [!INFO] +> A thing that should probably be told users. + +> [!IMPORTANT] +> Essential information that requires attention. An emphasized note. + +> [!WARNING] +> Potential risks or issues to be aware of. Moderate risk. + +> [!CAUTION] +> Important considerations that need careful attention. High risk. + +> [!DANGER] +> Critical warnings about potentially harmful situations. Critical information. + +> [!SUCCESS] +> Indicates a positive outcome or achievement. + +```markdown +> [!NOTE/TIP/INFO/...] (Optional) title +> Content +``` + +### Images and Links + +- Links: `[title](link)` +- Images: `![](path/to/image)` +- Images with caption: + +```markdown +![](path/to/image) +Some caption{.caption} +``` + +### Theme-specific Images + +You can specify different images for light and dark themes using the `data-theme` attribute: + +```markdown + +![Description](./image.png) + + +![Description](./image.png){data-theme="light"} + + +![Description](./image.png){data-theme="dark"} +``` + +> [!TIP] +> If there are spaces in the image path, either spaces need to be URL-encded (`%20`), or the following structure can be used (recommended): `![]()` + +### YouTube Videos + +To embed a YouTube video: + +```markdown + +``` + + +### Quotes + +> "Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author." +> +> _(Author, date, [source](#))_ + +```markdown +> "Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author." +> +> _(Author, date, [source](#))_ +``` + +### Others + +| Block | Description | +|--------------------------------------------------------------------|---------------------------------------------------------| +| [Links](https://vitepress.dev/guide/markdown#links) | Internal links (to other articles, or to anchor points) | +| [Tables](https://vitepress.dev/guide/markdown#github-style-tables) | Tables (like this one) | +| [Emojis](https://vitepress.dev/guide/markdown#emoji) | Emojis :tada: | + diff --git a/docs/src/contribute/images.md b/docs/src/contribute/images.md new file mode 100644 index 00000000..22727493 --- /dev/null +++ b/docs/src/contribute/images.md @@ -0,0 +1,291 @@ +# Contributing to Docker Images + +The Docker images are the heart of the Exegol project. They contain a carefully curated selection of tools, configurations, aliases, history commands, and various customizations prepared in multiple images adapted for different uses: web hacking, Active Directory, OSINT (Open Source INTelligence), etc. + +## Getting started + +1. Fork the [Exegol-images](https://github.com/ThePorgs/Exegol-images) repository +2. Follow the [Installation Guide](/contribute/install) to set up your development environment +3. Checkout the `dev` branch +4. (optional) create a new branch in your fork, if you plan on working on different topics +5. Create your content using this guide +6. Make sure your changes work locally +7. Stage, Commit, and Push your changes +8. Submit a Pull Request (https://github.com/ThePorgs/Exegol-images/compare) + +## Tools + +When adding a new tool to an image (or modifying a tool install function), follow these steps: + +1. Identify which package your tool installation function should go into in the [packages](https://github.com/ThePorgs/Exegol-images/tree/main/sources/install) directory. + +2. Create an installation function following this structure: + +```bash +function install_yourtool() { + colorecho "Installing yourtool" + # tool install commands [...] + add-aliases yourtool + add-history yourtool + add-test-command "yourtool.py --help" + add-to-list "yourtool,https://link.to/the/tool,description" +} +``` + +### Required Components + +Your installation function should include: + +- `colorecho "Installing yourtool"` - For progress logging +- `catch_and_retry ` - For commands that might fail due to network issues. Note: Most standard Internet-involved commands (git, wget, curl, go, etc.) are already transparently wrapped with `catch_and_retry`. You probably won't need that. +- `add-aliases yourtool` - If your tool needs aliases. You will need to create the aliases file in `/sources/assets/shells/aliases.d/` named after your tool. Example: + ```bash + alias tool.py='python3 /opt/tools/yourtool/tool.py' + ``` +- `add-history yourtool` - For command examples. Create a history file in `/sources/assets/shells/history.d/` named after your tool. Example: + ```bash + yourtool.py --user "$USER" --password "$PASSWORD" --target "$TARGET" + yourtool.py --mode enum --user "$USER" --target "$TARGET" + yourtool.py --mode unauthenticated + ``` +- `add-test-command "testcommand"` - For CI/CD unit tests. The command must return 0 if successful. If `--help` doesn't work, try using grep: `yourtool.py --help|& grep 'Usage:'` +- `add-to-list "yourtool,https://link.to/the/tool,description"` - For tools list export. Format is CSV with 3 columns: name, link, description. No comma allowed in description. + +### Code Check Whitelisting + +If your tool doesn't need aliases or history commands, add a whitelist comment at the beginning of the function: + +```bash +# CODE-CHECK-WHITELIST=add-aliases +# CODE-CHECK-WHITELIST=add-aliases,add-history +``` + +### Installation Standards + +Follow these standards when installing tools: + +- Use virtual environments for Python tools with access to system site-packages with `--system-site-packages` +- Install tools in `/opt/tools/` or place binaries in `/opt/tools/bin/` +- Use `--depth 1` with git clone to save space +- Use `asdf` for managing tool versions (currently only for Go) + +### Installation Methods + +::: tabs + +== Python (pipx) +```bash +# From GitHub +pipx install --system-site-packages git+https://github.com/AUTHOR/REPO + +# From local sources +git -C /opt/tools/ clone --depth 1 https://github.com/AUTHOR/REPO +pipx install --system-site-packages /opt/tools/yourtool/ +``` + +== Python (venv) +```bash +git -C /opt/tools/ clone --depth 1 https://github.com/AUTHOR/REPO +cd /opt/tools/yourtool || exit +python3 -m venv --system-site-packages ./venv/ +source ./venv/bin/activate +pip3 install -r requirements.txt +deactivate +add-aliases yourtool +``` + +== APT +Add the package to the appropriate `install_*_apt_tools()` function in the package file. + +== Go +```bash +go install -v github.com/AUTHOR/REPO@latest +asdf reshim golang +``` + +== Ruby +```bash +function install_yourtool() { + colorecho "Installing yourtool" + rvm use 3.0.0@yourtool --create + gem install yourtool + rvm use 3.0.0@default + add-aliases yourtool + add-history yourtool + add-test-command "yourtool --help" + add-to-list "yourtool,https://github.com/AUTHOR/REPO,description" +} +``` + +== Compile Sources +```bash +function install_yourtool() { + colorecho "Installing yourtool" + git -C /opt/tools/ clone --depth 1 https://github.com/AUTHOR/REPO + cd /opt/tools/yourtool + ./configure + make + ln -s "/opt/tools/yourtool/bin/yourtool" "/opt/tools/bin/yourtool" + add-history yourtool + add-test-command "yourtool --help" + add-to-list "yourtool,https://github.com/AUTHOR/REPO,description" +} +``` + +== Download Binary +```bash +function install_yourtool() { + colorecho "Installing yourtool" + local URL + URL=$(curl --location --silent "https://api.github.com/repos/AUTHOR/REPO/releases/latest" | grep 'browser_download_url.*somestring.*tar.xz"' | grep -o 'https://[^"]*') + curl --location -o /tmp/tool.tar.xz "$URL" + tar -xf /tmp/yourtool.tar.xz --directory /tmp + rm /tmp/yourtool.tar.xz + mv /tmp/yourtool* /opt/tools/yourtool + ln -s "/opt/tools/yourtool/bin/yourtool" "/opt/tools/bin/yourtool" + add-history yourtool + add-test-command "yourtool --help" + add-to-list "yourtool,https://github.com/AUTHOR/REPO,description" +} +``` + +::: + +### Temporary Fixes (tempfix) + +Sometimes tools have issues that need temporary fixes. Here are two approaches: + +::: tabs + +== Git (checkout) +```bash +function install_TOOL() { + [...] + # git -C /opt/tools/ clone --depth 1 https://github.com/REPO/TOOL.git + local temp_fix_limit="YYYY-MM-DD" + if check_temp_fix_expiry "$temp_fix_limit"; then + git -C /opt/tools/ clone https://github.com/REPO/TOOL.git + git -C /opt/tools/TOOL checkout 774f1c33efaaccf633ede6e704800345eb313878 + fi + [...] +} +``` + +== Git (merge PRs) +```bash +function install_TOOL() { + [...] + git -C /opt/tools/ clone --depth 1 https://github.com/REPO/TOOL.git + local temp_fix_limit="YYYY-MM-DD" + if check_temp_fix_expiry "$temp_fix_limit"; then + git config --local user.email "local" + git config --local user.name "local" + local PRS=("111" "222" "333") + for PR in "${PRS[@]}"; do git fetch origin "pull/$PR/head:pull/$PR" && git merge --strategy-option theirs --no-edit "pull/$PR"; done + fi + [...] +} +``` + +::: + +### Multi-architecture Support + +Exegol images are built for both AMD64 and ARM64 systems. When possible, ensure your tool installation works on both architectures: + +```bash +if [[ $(uname -m) = 'x86_64' ]] +then + # command for AMD64 +elif [[ $(uname -m) = 'aarch64' ]] +then + # command for ARM64 +else + criticalecho-noexit "This installation function doesn't support architecture $(uname -m)" && return +fi +``` + +### Testing Your Changes + +Before submitting a pull request, test your installation locally: + +```bash +# Build the local image +exegol install "testimage" "full" --build-log "/tmp/testimage.log" + +# Create and start a container for the tests +exegol start "testcontainer" "testimage" + +# Run the tests (from the container) +cat /.exegol/build_pipeline_tests/all_commands.txt | grep -vE "^\s*$" | sort -u > /.exegol/build_pipeline_tests/all_commands.sorted.txt +python3 /.exegol/build_pipeline_tests/run_tests.py +cat /.exegol/build_pipeline_tests/failed_commands.log +``` + +## My-resources + +The my-resources feature allows users to customize their Exegol environment with personal configurations, tools, and scripts. When contributing to my-resources, follow these guidelines: + +### Documentation + +Any new feature or service added to my-resources must be documented in the following places: + +1. Add a description in the [my-resources documentation](/images/my-resources) +2. Include examples and usage instructions +3. Document any dependencies or prerequisites +4. Add any relevant configuration options + +### Code + +The my-resources functionality is primarily managed through the `load_supported_setup.sh` script. When contributing code: + +1. Follow the existing logging pattern: + ```bash + wrapper_verbose "Your message" # For user-visible messages + logger_verbose "Your message" # For log file only + ``` + +2. Use the appropriate logging levels: + - `wrapper_info` / `logger_info` - General information + - `wrapper_verbose` / `logger_verbose` - Detailed information + - `wrapper_warning` / `logger_warning` - Warning messages + - `wrapper_error` / `logger_error` - Error messages + - `wrapper_success` / `logger_success` - Success messages + +3. Structure your code following these patterns: + ```bash + function deploy_your_feature() { + wrapper_verbose "Deploying your feature" + + # Check if feature directory exists + if [[ -d "$MY_SETUP_PATH/your_feature" ]]; then + # Handle existing setup + logger_verbose "Processing existing setup" + # Your code here + else + # Create new setup + logger_verbose "Creating new setup" + mkdir -p "$MY_SETUP_PATH/your_feature" + # Your code here + fi + } + ``` + +4. Use the standard paths: + - `$MY_ROOT_PATH` - Root my-resources directory (`/opt/my-resources`) + - `$MY_SETUP_PATH` - Setup directory for user customization (`/opt/my-resources/setup`) + +5. Handle errors gracefully: + ```bash + if ! your_command; then + wrapper_error "Failed to execute your_command" + return 1 + fi + ``` + +6. Add your new function to the main execution flow in `load_supported_setup.sh` + +## Additional Resources + +- [Credentials](/images/credentials) - For tools requiring credentials +- [Ports & Services](/images/services) - For tools that open ports or run services \ No newline at end of file diff --git a/docs/src/contribute/install.md b/docs/src/contribute/install.md new file mode 100644 index 00000000..f871c433 --- /dev/null +++ b/docs/src/contribute/install.md @@ -0,0 +1,153 @@ +# Installation for contributors + +While we recommend regular users to install Exegol using `pipx` for simplicity and isolation (see [First install](/first-install)), contributors and developers should install from sources. Here's why and how. + +## Requirements + +Before starting, ensure you have all the requirements from the [First install](/first-install) guide (git, python3, docker). + +## Why install from sources? + +When contributing to Exegol, installing from sources provides several advantages: + +1. **Direct code access**: you can modify the code directly and test your changes immediately +2. **Branch switching**: easily switch between release and development branches +3. **Auto-update feature**: the wrapper knows how to self-update when installed from sources +4. **Development tools**: access to development dependencies and testing frameworks +5. **Version control**: direct integration with Git for contributing changes + +## Installation steps + +### 1. Fork Exegol + +1. Go to [github.com/ThePorgs/Exegol](https://github.com/ThePorgs/Exegol) +2. Click the "Fork" button in the top-right corner +3. Select your GitHub account as the destination +4. Wait for the fork to complete + +This creates your own copy of the repository where you can make changes without affecting the original project. + +### 2. Clone your fork + +Clone your fork of the Exegol repository: + +```bash +# Replace YOUR_USERNAME with your GitHub username +git clone "https://github.com/YOUR_USERNAME/Exegol" && cd Exegol + +# Add the upstream repository to easily keep your fork in sync +git remote add upstream "https://github.com/ThePorgs/Exegol" +``` + +### 3. Virtual environment + +For development, we recommend using a [virtual environment](https://docs.python.org/3/library/venv.html) to isolate dependencies: + +```bash +# Create a virtual environment +python3 -m venv .venv + +# Activate it +source .venv/bin/activate +``` + +Then, install both the runtime and development dependencies: + +```bash +# Install runtime dependencies +pip3 install -r requirements.txt +``` + +Deactivate the virtual environment when done: + +```bash +deactivate +``` + +### 4. Finalize setup + +You can now run Exegol with the following command: + +```bash +# On Linux +sudo /path/to/Exegol/venv/bin/python3 /path/to/Exegol/exegol.py + +# On macOS, Windows +/path/to/Exegol/venv/bin/python3 /path/to/Exegol/exegol.py +``` + +To make this version of Exegol accessible system-wide, you can create an alias or symbolic link, and name it `exegol-dev` so that it can coexist with the production/official version: + +```bash +# Create a symbolic link, from the Exegol directory +sudo ln -s "$(pwd)/exegol.py" "/usr/local/bin/exegol-dev" +``` + +For security reasons on Linux, we recommend running Exegol with `sudo` rather than adding your user to the docker group. You can create an alias for convenience: + +```bash +# For bash +echo "alias exegol-dev='sudo -E $(which exegol-dev)'" >> ~/.bash_aliases +source ~/.bashrc +``` + +Once this is done, you can have both the pipx installation (for regular use) and the source installation (for development) at the same time. Here's how to manage them: + +```bash +# Regular install +exegol version + +# Source install +exegol-dev version +``` + +## Development workflow + +### Branch management + +Create a new branch for each feature or fix. This branch will be used for your local development and will be pushed to your fork when you stage, commit, and push your changes: + +```bash +git checkout -b type/description +``` + +Branch naming conventions (preferred, not mandatory): +- `feat/` - new features (e.g., `feat/add-toolxyz`) +- `fix/` - bug fixes (e.g., `fix/toolxyz-install`) +- `docs/` - documentation updates (e.g., `docs/update-install-guide`) +- `refactor/` - code refactoring (e.g., `refactor/install-scripts`) +- `perf/` - performance improvements (e.g., `perf/clean-up-artefactxyz`) + +### Keeping your fork updated + +To keep your development branch in sync with upstream changes: + +```bash +# Fetch latest changes from upstream +git fetch upstream + +# Make sure you're on your development branch +git checkout feat/your-feature-name + +# Merge upstream dev branch into your development branch +git merge upstream/dev + +# If there are conflicts, resolve them and then +git add . +git commit -m "Merge upstream dev" +``` + +### Commit signing + +We strongly recommend signing your commits when contributing to Exegol. While it's a strict requirement for internal contributors, we prefer signed commits from external contributors as well. See our [Signing Commits](/contribute/signing-commits) guide for detailed instructions. + +### Submitting changes + +1. Push your changes to your fork: + ```bash + git push origin feat/your-feature-name + ``` + +2. Create a Pull Request from your fork's branch to the upstream repository's `dev` branch +3. Wait for review and address any feedback +4. Once approved, your changes will be merged into the development branch \ No newline at end of file diff --git a/docs/src/contribute/intro.md b/docs/src/contribute/intro.md new file mode 100644 index 00000000..f63d4174 --- /dev/null +++ b/docs/src/contribute/intro.md @@ -0,0 +1,34 @@ +# Introduction to Contributing + +Welcome to the Exegol contribution guide! This section will help you understand how to contribute to the Exegol project. + +## Our Philosophy + +We are strong advocates of open-source principles. We strive to keep the majority of our code open and accessible—not just because it's the right thing to do, but because we believe in transparency, collaboration, and the power of community. + +However, sustaining high-quality open-source software is not effortless. It requires time, skill, and long-term commitment. Too often, open-source is treated as a free resource to be consumed without acknowledgment or contribution. This mindset is not sustainable. + +Our model is built to support a healthier, more respectful open-source ecosystem—one where contributors are recognized as essential. Users can give back in two ways: by contributing directly (creating a virtuous cycle of "I use, I contribute"), or by funding the work that keeps the project alive. Either path helps ensure that open-source creators are valued for the real work they do. + +Open-source can't thrive if we ignore the human effort behind it. If you benefit from the tools we build, we invite you to be part of that effort—by writing code, sharing knowledge, reporting issues, or subscribing. That's how we keep building, together. + +We value all contributions, whether they're code improvements, documentation updates, bug reports, or feature suggestions. Every contribution helps make Exegol better for everyone. + +## Legal summary + +Before contributing to Exegol, please be aware of the legal considerations. + +- **Intellectual Property**: Exegol is the exclusive property of Execorp; Public availability of source code does not waive intellectual property rights ; All rights not expressly granted are reserved +- **By contributing, you**: Grant Execorp an irrevocable, worldwide, free, and unlimited right to use your contributions; Accept that certain contributions may require a specific intellectual property rights transfer agreement; Acknowledge that contributions may be subject to technical and legal review +- **Limited use**: Non-commercial use is free and includes academic research, individual learning, and cybersecurity competition; Commercial use requires a valid subscription (Pro or Enterprise). + +For more details, please review our [Software License](/legal/software-license) and other [Legal Documents](/legal/summary). + +## How to contribute + +Exegol is made up of several components that you can contribute to. Once your Exegol instance is [installed properly for developpers](/contribute/install), follow the contribution notes for the component you want to bring changes to. + +- [Images](/contribute/images) - The core Docker images containing tools and configurations +- [Wrapper](/contribute/wrapper) - The command-line interface for managing most components +- [Resources](/contribute/resources) - Additional resources and tools +- [Docs](/contribute/docs) - This documentation site \ No newline at end of file diff --git a/docs/src/contribute/maintainers-notes.md b/docs/src/contribute/maintainers-notes.md new file mode 100644 index 00000000..6d58ba4a --- /dev/null +++ b/docs/src/contribute/maintainers-notes.md @@ -0,0 +1,235 @@ +--- +icon: shield-check +--- + +# Maintainers Notes + +This document provides technical details and processes for Exegol maintainers. It complements the [contributors](/contribute/intro) documentation. + +## Build and Release Processes + +### Wrapper Release Process + +>[!SUCCESS] +> The wrapper documentation must be aligned with the wrapper features. +> The docs PR can be merged once the wrapper is released. + +#### Preparation Steps + +1. Update project and submodules: + - Point exegol-images and exegol-resources submodules to latest master + - Keep base reference up to date + +```bash +# Update wrapper repo +git pull + +# Update submodules +git -C exegol-docker-build checkout main +git -C exegol-docker-build pull +git -C exegol-resources checkout main +git -C exegol-resources pull +``` + +> [!NOTE] Important +> Don't forget to **reload and commit** any **submodule update** at this step! + +2. Local Testing & Build: + - Run mypy type checking + - Execute tests and build distribution + +```bash +# Type checking +mypy exegol.py --ignore-missing-imports --check-untyped-defs + +# Test and build +python3 setup.py clean test && \ + (rm -rf Exegol.egg-info && python3 -m build --sdist) || \ + echo "Some tests failed, check your code and requirements before publishing!" +``` + +> [!WARNING] +> **Requires** [build](https://packaging.python.org/en/latest/tutorials/packaging-projects/#generating-distribution-archives) package installed! + +>[!SUCCESS] +> Exegol can only be published through a **source** build distribution because of the source code files for building local images. + +3. Configuration Review: + - Review exegol.config.ConstantConfig variables + - Change version number (remove alpha/beta tag) + - Review exegol.utils.imgsync.spawn.sh version + - Must contain: `# Spawn Version:2` (without alpha/beta letter) + - Review documentation on Exegol-docs/dev-wrapper + - Review README.md + - Create PR (or put it out of draft mode) + +> [!NOTE] Important +> The Pull-Request must be **already** created and **NOT** be in draft state before pushing the latest stable version. + +#### Release Process + +1. After PR review and merge to master: + - Create and push a signed tag + - Example for version 4.3.5: + ```bash + git checkout master + git pull + git tag -s 4.3.5 -m '4.3.5' + git push --tags + ``` + +2. Post-release: + - Create new GitHub release with version tag + - Update dev branch: + ```bash + git checkout dev + git merge master --ff-only + git push + ``` + - Update version to next beta (x.y.zb1) + - Update tests.test_exegol.py version number to next version build + - Commit updates + +### Images Release Process + +>[!SUCCESS] +> The images documentation must be aligned with the images features. +> Ensure documentation PR is ready before release. + +#### Release Steps + +1. Prepare dev branch: + - Create PR `dev -> main` named `Release X.Y.Z` (or `Release X.Y.ZbI`) + - PR comment must indicate all major changes + - Ensure all pre-release workflows pass + - Get maintainer approval + +2. Merge process: + ```bash + git checkout main + git pull --all + git checkout dev + git pull --all + git merge --ff-only main + git push + ``` + +3. Create and push tag: + ```bash + git tag "X.Y.Z" + git push origin --tags + ``` + +4. Create GitHub release: + - Point to created tag + - Name as "Exegol images X.Y.Z" + - Generate release notes + - Set as latest release + +## CI/CD Pipeline + +The Exegol project uses a private CI/CD pipeline for continuous integration and deployment. The pipeline handles: + +- Building and testing on multiple architectures +- Automated testing of installed tools +- Documentation updates +- Image building and publishing +- Resource management + +### Pipeline Components + +1. **Wrapper Pipeline** + - Handles Python package builds + - Runs tests on commits and PRs + - Publishes to PyPI + - Manages version control and releases + +2. **Images Pipeline** + - Builds AMD64 and ARM64 images + - Runs tool installation tests + - Exports tools list to documentation + - Manages Docker image publishing + - Handles multi-architecture builds + +3. **Documentation Pipeline** + - Builds documentation on commits and PRs + - Manages branch synchronization + - Handles ReadTheDocs integration + - Automatically updates tool lists + +4. **Resources Pipeline** + - Automatically updates resources (monthly) + - Exports resource lists to documentation + - Manages offline resource distribution + +### Pipeline Management + +The CI/CD pipeline is hosted in a private repository for enhanced security and control. This allows for: + +- Better access control +- Customized runner configurations +- Optimized resource allocation +- Enhanced security measures + +#### Runner Requirements + +The pipeline requires runners with specific capabilities: + +- Architecture support: AMD64 and ARM64 +- Minimum disk space: ~100GB +- Docker support +- Sufficient CPU and RAM resources + +#### Common Pipeline Issues + +1. **Disk Space Issues** + ``` + You are running out of disk space. The runner will stop working when the machine runs out of disk space. Free space left: 62 MB + ``` + Solution: Clean up old images and build artifacts + +2. **Authentication Issues** + - Ensure proper token configuration + - Check runner permissions + - Verify secret management + +## Pull Request Management + +When handling pull requests, maintainers may need to synchronize contributor forks. This can be done using: + +```bash +git clone "git@github.com:USER/FORK" "dest_dir" +cd dest_dir +git remote add upstream "git@github.com:ThePorgs/REPO" +git fetch upstream +git checkout "TARGET_FORK_BRANCH" +git merge --no-edit upstream/"ORIGIN_BRANCH" +# Resolve conflicts if any +git push +``` + +### PR Review Guidelines + +1. **Code Quality** + - Check for proper error handling + - Verify type hints and documentation + - Ensure backward compatibility + - Review test coverage + +2. **Documentation** + - Verify documentation updates + - Check for proper formatting + - Ensure all new features are documented + - Validate code examples + +3. **Security** + - Review for potential security issues + - Check for proper input validation + - Verify authentication mechanisms + - Ensure no sensitive data is exposed + +4. **Performance** + - Check for resource usage + - Verify build times + - Review memory consumption + - Test on different architectures diff --git a/docs/src/contribute/resources.md b/docs/src/contribute/resources.md new file mode 100644 index 00000000..1e6309e9 --- /dev/null +++ b/docs/src/contribute/resources.md @@ -0,0 +1,69 @@ +# Contributing to Resources + +The Exegol resources repository contains additional resources and tools that security experts need to use on target machines (e.g. enumeration scripts, webshells, etc.). +These resources are managed by the Wrapper, and shared with every Exegol container on your machine. +On the repository, they are automatically downloaded and updated using a script called `update-resources.sh`. + +## How it works + +The `update-resources.sh` script is responsible for downloading and maintaining various security tools and resources +Here's how it works: + +1. The script creates a structured directory hierarchy for different types of resources: + - Windows tools + - Linux tools + - macOS tools + - Webshells (PHP, ASPX, JSP) + - ... + +2. For each tool, the script should: + - Download the latest version from the official source + - Place it in the appropriate directory + - Add an entry to `resources_list.csv` with the tool's name, link, and description using the `add-to-list` instruction + +3. The script maintains a list of tools including: + - System utilities (Sysinternals, PEASS suite) + - Enumeration tools (LinEnum, Linux Smart Enumeration) + - Exploitation tools (Mimikatz, JuicyPotato) + - Network tools (Chisel, Rustscan) + - ... + +## Automated updates + +The resources are automatically updated through a GitHub Actions workflow that: +1. Runs monthly to check for new versions of tools +2. Executes the `update-resources.sh` script +3. Creates a new branch with the updated resources +4. Opens a Pull Request for maintainers to review + +This ensures that Exegol users always have access to the latest versions of security tools. + +## Getting started + +1. Fork the [Exegol-resources](https://github.com/ThePorgs/Exegol-resources) repository +2. Checkout the `dev` branch +3. (optional) create a new branch in your fork, if you plan on working on different topics +4. Create your content using this guide +5. Make sure your changes work locally +6. Stage, Commit, and Push your changes (including `update-resources.sh` and the new resources) +7. Submit a Pull Request (https://github.com/ThePorgs/Exegol-resources/compare) + +## Adding new tools + +To add a new tool to the resources: + +1. Create a new function in `update-resources.sh` following the existing pattern +2. Add the tool's download logic and directory structure +3. Use the `add-to-list` function so that the tool is added automatically to the documentation later on +4. Add your new function to the `add_resources` function +5. Test your changes locally by running the script + +Example of adding a new tool: +```bash +function add_new_tool() { + info "Downloading New Tool" + chkfs "./category/new_tool/" + wget -O ./category/new_tool/tool.exe "https://example.com/tool.exe" + add-to-list "New Tool,https://example.com/tool,Description of the tool" +} +``` diff --git a/docs/src/contribute/signing-commits.md b/docs/src/contribute/signing-commits.md new file mode 100644 index 00000000..ea6956ef --- /dev/null +++ b/docs/src/contribute/signing-commits.md @@ -0,0 +1,194 @@ +--- +icon: key +--- + +# Signing commits + +To make the project as secure as possible, signed commits are now required to contribute to the project. Using signatures for commits on GitHub serves several important purposes: + +- **Authentication**: it verifies the authenticity of the commit, ensuring that it was indeed made by the person claiming to have made it. +- **Integrity**: it ensures that the commit hasn't been tampered with since it was signed. Any changes to the commit after it has been signed will invalidate the signature. +- **Trust**: this ensures that all contributions come from trusted sources. +- **Visibility**: on GitHub, signed commits are marked with a "verified" label, giving users and collaborators confidence in the commit's origin and integrity. + +GitHub offers [an official documentation](https://docs.github.com/fr/authentication/managing-commit-signature-verification/signing-commits) on the matter that can be followed to setup and sign commits properly. Exegol's documentation will sum it up briefly and link to it whenever it's needed. + +While **SSH (+ FIDO2)** is preferred since it offers better multi-factor signing capabilities (knowledge + hardware possession factors), people that don't have the required hardware can proceed with GPG or SSH. + +::: tabs +== GPG + +Generating a GPG key can be done by following GitHub's official documentation on the matter ([generating a new GPG key](https://docs.github.com/en/authentication/managing-commit-signature-verification/generating-a-new-gpg-key)). TL;DR, the commands look something like this: + +```bash +# for the email, indicate your public email (ID+Name@users.noreply.github.com) from https://github.com/settings/emails +gpg --quick-generate-key "YOUR_NAME " ed25519 sign 0 +gpg --list-secret-keys --keyid-format=long +gpg --armor --export $KEYID +``` + +Once the GPG key is generated, it can be added to the contributor's GitHub profile. Again, GitHub's documentation explains how to achieve that ([adding a GPG key to your GitHub account](https://docs.github.com/en/authentication/managing-commit-signature-verification/adding-a-gpg-key-to-your-github-account)). + +Once the GPG key is generated and associated to the GitHub account, it can be used to sign commits. In order to achieve that, the contributor must configure `git` properly on his machine ([telling git about your GPG key](https://docs.github.com/en/authentication/managing-commit-signature-verification/telling-git-about-your-signing-key)). + +TL;DR: the commands look something like this to set it up for `git` CLI: + +```bash +gpg --list-secret-keys --keyid-format=long +git config --global user.signingkey $KEYID + +# (option 1) configure locally on a specific repo +cd /path/to/repository && git config commit.gpgsign true + +# (option 2) configure for all git operations +git config --global commit.gpgsign true +``` + +To set it up on IDEs, proper official documentations can be followed (e.g. [GitKraken](https://help.gitkraken.com/gitkraken-client/commit-signing-with-gpg/#configure-gpg-in-gitkraken), [PyCharm](https://www.jetbrains.com/help/pycharm/set-up-GPG-commit-signing.html#enable-commit-signing)). + +== SSH + +Generating an SSH key can be done by following GitHub's official documentation on the matter ([generating a new SSH key](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent)). TL;DR, the commands look something like this: + +```bash +# for the email, indicate your public email (ID+Name@users.noreply.github.com) from https://github.com/settings/emails +ssh-keygen -t ed25519 -C "YOUR_NAME " +``` + +Once the SSH key is generated, the public part can be added to the contributor's GitHub profile. Again, GitHub's documentation explains how to achieve that ([adding a new SSH key to your GitHub account](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/adding-a-new-ssh-key-to-your-github-account)). + +Once the SSH key is generated and associated to the GitHub account, it can be used to authenticate and sign commits. In order to achieve that, the contributor must configure `ssh` and `git` properly on his machine ([telling git about your SSH key](https://docs.github.com/en/authentication/managing-commit-signature-verification/telling-git-about-your-signing-key#telling-git-about-your-ssh-key)). + +TL;DR: the commands look something like this: + +>[!SUCCESS] +> The `git` client version must be 2.34 or later. + +```bash +# if setting up for the first time, configure git +git config --global user.name "YOUR_NAME" +# for the email, indicate your public email (ID+Name@users.noreply.github.com) from https://github.com/settings/emails +git config --global user.email "ID+Name@users.noreply.github.com" + +git config --global gpg.format ssh +# replace the public key path if needed, below is an example +git config --global user.signingkey "$HOME/.ssh/id_ed25519.pub" + +# configure git to sign commits and tags by default +git config --global commit.gpgsign true +git config --global tag.gpgsign true + +# verify commits locally, associate SSH public keys with users +mkdir -p ~/.config/git +echo "$(git config --get user.email) $(cat ~/.ssh/id_ed25519.pub)" | tee ~/.config/git/allowed_signers +git config --global gpg.ssh.allowedSignersFile "$HOME/.config/git/allowed_signers" +``` + +The SSH connection can then be tested as follows ([testing your SSH connection](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/testing-your-ssh-connection)). + +```bash +# load the SSH agent into the current shell +eval "$(ssh-agent -s)" + +# test the SSH authentication to GitHub servers +ssh -T git@github.com +``` + +== SSH (+ FIDO2) + +This part of the doc explains how to setup and use FIDO2 security keys, such as YubiKeys, Google's Titan, etc. + +First of all, a new FIDO2 key can be configured as follows to set up a PIN. + +```bash +# list FIDO2 devices +fido2-token -L + +# set a PIN for the device +fido2-token -S $device +``` + +Then, a [resident key](https://developers.yubico.com/WebAuthn/WebAuthn_Developer_Guide/Resident_Keys.html) can be created and stored on the YubiKey as follows (see [Yubico's documentation](https://www.yubico.com/blog/github-now-supports-ssh-security-keys/)). + +>[!SUCCESS] +> Some FIDO2 keys (e.g. recent YubiKeys, and probably others) support **resident keys**. A resident key is stored on the hardware key itself and easier to import to a new computer because it can be loaded directly from the security key. In order to use that feature, the `-O resident` option can be added to the `ssh-keygen` command chosen below. + +```bash +# (default) touch only +ssh-keygen -t ed25519-sk + +# PIN + touch +ssh-keygen -t ed25519-sk -O verify-required + +# nothing (could be unsupported by some OpenSSH clients) +ssh-keygen -t ed25519-sk -O no-touch-required + +# PIN (could be unsupported by some OpenSSH clients) +ssh-keygen -t ed25519-sk -O verify-required -O no-touch-required +``` + +Once the SSH key is generated, the public part can be added to the contributor's GitHub profile. GitHub's documentation explains how to achieve that ([adding a new SSH key to your GitHub account](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/adding-a-new-ssh-key-to-your-github-account)). + +Once a key is created and added on GitHub, it can be added to the contributor's machine SSH environment as follows. This is as easy as copy-pasting the public and private key parts to `~/.ssh`. + +>[!SUCCESS] +> If you opted for a **resident key** setup, the SSH key can be loaded from the hardware key itself. +> +> Note that those steps shouldn't be needed when the key has just been created, as the keys should automatically be added to `~/.ssh`. The commands below are mostly relevant when using **existing** resident keys on **a new system**. +> +> ```bash +> # temporary +> # needs to be done again after a reboot +> ssh-add -K +> +> # permanent +> # will download the private and public resident security keys in the current directory +> # private key is to be moved in ~/.ssh (physical FIDO2 key will always be needed) +> ssh-keygen -K +> # it's on purpose, the "_rk" part is removed, otherwise it doesn't work. +> mv id_ed25519_sk_rk ~/.ssh/id_ed25519_sk +> mv id_ed25519_sk_rk.pub ~/.ssh/id_ed25519_sk.pub +> ``` +> +> >[!WARNING] +> >While the `ssh-keygen -K` command saves names files `id_ed25519_sk_rk[.pub]`, it's on purpose the `_rk` part is then removed on the host. Otherwise, SSH fails at handling the keys. The files must be named `id_ed25519_sk[.pub]` on the system. + +Once the SSH environment is ready, `git` CLI can be configured to rely on the security key for signing commits and authenticating ([telling git about your SSH key](https://docs.github.com/en/authentication/managing-commit-signature-verification/telling-git-about-your-signing-key#telling-git-about-your-ssh-key)). + +>[!SUCCESS] +> The `git` client version must be 2.34 or later. + +```bash +# if setting up for the first time, configure git +git config --global user.name "YOUR_NAME" +# for the email, indicate your public email (ID+Name@users.noreply.github.com) from https://github.com/settings/emails +git config --global user.email "ID+Name@users.noreply.github.com" + +git config --global gpg.format ssh +# replace the public key path if needed, below is an example +git config --global user.signingkey "$HOME/.ssh/id_ed25519_sk.pub" + +# configure git to sign commits and tags by default +git config --global commit.gpgsign true +git config --global tag.gpgsign true + +# verify commits locally, associate SSH public keys with users +mkdir -p ~/.config/git +echo "$(git config --get user.email) $(cat ~/.ssh/id_ed25519_sk.pub)" | tee ~/.config/git/allowed_signers +git config --global gpg.ssh.allowedSignersFile "$HOME/.config/git/allowed_signers" +``` + +The SSH connection can then be tested as follows ([testing your SSH connection](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/testing-your-ssh-connection)). + +```bash +# load the SSH agent into the current shell +eval "$(ssh-agent -s)" + +# test the SSH authentication to GitHub servers +ssh -T git@github.com +``` + +::: + +>[!SUCCESS] +> The contributor's GitHub account can be configured to mark unsigned commits as unverified or partially verified. While it's not mandatory regarding contributions to Exegol since the requirement is managed on Exegol repositories directly, it's a nice thing to do. See GitHub's documentation on [Vigilante mode](https://docs.github.com/en/authentication/managing-commit-signature-verification/displaying-verification-statuses-for-all-of-your-commits). diff --git a/docs/src/contribute/wrapper.md b/docs/src/contribute/wrapper.md new file mode 100644 index 00000000..eea2f64d --- /dev/null +++ b/docs/src/contribute/wrapper.md @@ -0,0 +1,19 @@ +# Contributing to the Wrapper + +The Exegol wrapper is the command-line interface for managing Exegol containers. It provides a user-friendly way to interact with Exegol images and containers. + +## Getting started + +1. Fork the [Exegol](https://github.com/ThePorgs/Exegol) repository +2. Follow the [Installation Guide](/contribute/install) to set up your development environment +3. Checkout the `dev` branch +4. (optional) create a new branch in your fork, if you plan on working on different topics +5. Create your content using this guide +6. Make sure your changes work locally +7. Stage, Commit, and Push your changes +8. Submit a Pull Request (https://github.com/ThePorgs/Exegol/compare) + +## Need Help? + +> [!NOTE] +> Considering the wrapper is not the component where people want to contribute most (because that's not where tools are installed, because it may seem a bit complex at first), we don't want to spend time writing documentation most won't ever read. If you DO want to author to the wrapper, please contact us, and we will work with you. \ No newline at end of file diff --git a/docs/src/dashboard/community.md b/docs/src/dashboard/community.md new file mode 100644 index 00000000..5ac5adce --- /dev/null +++ b/docs/src/dashboard/community.md @@ -0,0 +1,36 @@ +# Community + +The Exegol project is powered by a vibrant community of thousands of cybersecurity professionals, students, and enthusiasts who share a passion for technical exploration and security. + +The Community page provides quick access to various Exegol community resources, support channels, and social platforms where you can connect with other users and the Exegol team. + + + +### Discord server + +Our Discord server is the central hub for the Exegol community, featuring channels in both English and French. Here you'll find: + +- **Project announcements** and latest updates +- **Technical support** channels for troubleshooting +- **General discussion** spaces for networking and knowledge sharing +- **Resources and articles** shared by community members +- **Memes and fun content** because top memes are our top priority + +### Ways to contribute + +Being part of the Exegol community means you can actively contribute to the project's growth: + +- **Share Exegol** with colleagues and friends +- **Report bugs** to help improve stability +- **Suggest new features** or tools you'd like to see +- **Vote on upcoming features** to help prioritize development +- **Provide feedback** on your experience + +It's thanks to our dedicated users that Exegol continues to evolve and improve. Your participation matters! + +### Join us! + +We welcome security enthusiasts of all levels. Whether you're just starting out or you're a seasoned professional, there's a place for you in our community. + +[Join the Exegol Discord Server](https://discord.gg/cXThyp7D6P) + diff --git a/docs/src/dashboard/learn.md b/docs/src/dashboard/learn.md new file mode 100644 index 00000000..600ff344 --- /dev/null +++ b/docs/src/dashboard/learn.md @@ -0,0 +1,11 @@ +# Learning Center + +The Learning Center provides educational videos to help you learn about Exegol installation and usage. + +The videos are organized by track, difficulty level, and topic tags. These videos cover various aspects of Exegol from beginner installation guides to advanced usage techniques. + +Some videos in the Learning Center are exclusive to and users, including in-depth technical deep dives, best practices and optimization guides, exclusive training content. + +> [!INFO] +> Our Learning Center is featuring few videos for now. We're working on creating more comprehensive content, but our priority is features development, maintenance and support. Stay tuned for regular updates as we expand our resources! + diff --git a/docs/src/dashboard/licenses.md b/docs/src/dashboard/licenses.md new file mode 100644 index 00000000..c46e5121 --- /dev/null +++ b/docs/src/dashboard/licenses.md @@ -0,0 +1,54 @@ +# Licenses + +The Licenses page allows you to manage your **Exegol Pro and Enterprises** licenses, view and change which devices are activated. + +For each license, you can see: + +- Type (Pro or Enterprise) +- Organization behind the Enterprise license (Enterprise only) +- Team you're in (Enterprise only) +- Status (active/expired/disabled) +- The machine name and type (Windows, macOS, Linux) +- Validity +- Actions available + +> [!TIP] +> Additional fields can be shown through the "View" options menu, especially for debug purposes if something doesn't work and you reach out to Support. + +The table provides a clear view of which devices are currently using your licenses, making it easy to manage your license quota. + +> [!NOTE] +> Each license is tied to a specific machine. If you need to use Exegol on a new device, you'll need to activate a license for it. + +## Managing Licenses + +### Rename a Machine + +You can rename a machine associated with a license to make it more identifiable: + +1. Find the machine in the licenses table +2. Click the "Rename" action in the Actions column +3. Enter a new name for the machine +4. Confirm the change + +### Revoke a License + +If you no longer use Exegol on a particular machine, you can revoke its license to free it up for another device: + +1. Find the machine in the licenses table +2. Click the "Revoke" action in the Actions column +3. Confirm the revocation + +> [!WARNING] +> Licenses have a revokation cooldown period of 10 days. After enrolling a license on a machine, you'll need to wait until the cooldown period ends before you can revoke it and enroll it elsewhere. If you need immediate assistance, please contact our Support team through a Discord private ticket and mention the license UUID. + +## Activating a New License + +To activate Exegol on a new machine: + +1. Install and set up Exegol on the new machine +2. Run the command `exegol activate` in your terminal +3. Follow the on-screen prompts to authenticate and activate your license + +The newly activated machine will then appear in your licenses table. + diff --git a/docs/src/dashboard/organizations.md b/docs/src/dashboard/organizations.md new file mode 100644 index 00000000..51a4fe93 --- /dev/null +++ b/docs/src/dashboard/organizations.md @@ -0,0 +1,143 @@ +# Organizations + +Organizations provide a way to manage multiple users, teams, subscriptions, and licenses in Exegol. This is primarily designed for businesses or teams that need centralized management of their Exegol resources. + +This section is available to **Exegol Enterprise** users. The section's name is the organization name set at checkout. +Multiple org sections can exist concurrently. + +> [!NOTE] +> If you've *only* been assigned an Exegol Enterprise license, but you're not the buyer and haven't been assigned any management role on the org or team(s) resources (i.e., owner, manager, assigner, viewer), you won't see the section. You will *only* see the license in your own personnal section ([My licenses](https://dashboard.exegol.com/licenses)) + +## Organization sections + +Organization management (i.e. the "Manage" page) is divided into four main sections: + +- **Licenses**: Manage and assign licenses to users +- **Subscriptions**: View and manage organization subscriptions +- **Teams**: Create and manage teams within your organization +- **Roles**: Manage organization-wide roles and permissions + +When Teams are created, the corresponding sub-pages are created inside the Organization section. + +### Licenses + +Licenses in organizations can be managed directly by the organization, or delegated to specific teams. + +::: tabs + +=== Change Team + +To change which Team manages a license (i.e., allow the Team's manager or assigner to assign the license to someone): + +1. Select the license(s) in the Organization's or Team's Licenses section +2. Click "Change team" +3. Select the team that should manage the license +4. Confirm the change + +=== Assign License + +To directly assign a License to someone: + +1. Select the license(s) in the Organization's or Team's Licenses section +2. Click "Assign license" +3. Enter the user's email address. +4. Confirm the change + +> [!WARNING] +> Licenses have a reassignment cooldown period of 10 days. After assigning a license to a user, you'll need to wait until the cooldown period ends before you can reassign it to another user. If you need immediate assistance, please contact our Support team through a Discord private ticket and mention the license UUID. + +Once a license is assigned to a user, they will be able to see and manage it in the "[My licenses](https://dashboard.exegol.com/licenses)" section. See the corresponding documentation on the matter: [Licenses](licenses). + +::: + +### Subscriptions + +The Subscriptions section allows organization administrators to view and manage all subscriptions associated with the organization. + +The subscriptions table is very similar to the "My subscriptions" one (see the [subscriptions](subscriptions) docs). + +Organization **owners** can manage subscriptions through the billing portal: + +1. Find the subscription in the table +2. Click the "Billing portal" action in the Actions column +3. In the billing portal, you can: + - Update payment methods + - Change the number of seats (billing will be adjusted proportionally for the remainder of the billing cycle.) + - View invoices and billing history + - Cancel or renew subscriptions + +### Teams + +The teams table shows the list of Teams in the Organization, allows Owners/Managers to rename or remove them, and add others. + +When a Team is created, a sub-page is created for it, with the Licenses and Roles sections. + +The Teams sub-pages feature two sections: Licenses (similarly to the Organization's [#licenses](#licenses) section), and Roles (similarly to the Organization's [#roles](#roles) section). + +The main difference resides in the fact that Teams can't have an "Owner", as this is a role assigned at the Organization level only. + +### Roles + +The Roles section allows organization administrators to manage who has administrative access to the organization and at what permission level. + +> [!IMPORTANT] +> It's crucial to understand that the Roles section is specifically for assigning administrative permissions within the dashboard. These roles determine who can manage the organization, its teams, licenses, and subscriptions. +> +> This should not be confused with "team members" or "users" in the operational sense. Adding someone as a Manager or Viewer in the Roles section doesn't automatically make them a license user or give them access to Exegol features - it only gives them administrative capabilities in the dashboard. + +For example: +- A person might be an "Owner" in the Roles section with full administrative rights, but might not actually use Exegol themselves +- Conversely, someone might be an active Exegol user with an assigned license but have no administrative role in the dashboard + +To give someone access to use Exegol, you need to assign them a license through the Licenses section. To give someone administrative capabilities to manage the organization, you add them through the Roles section. + +Organizations have four permission levels: + +- **Owner**: Can manage everything in the organization, including subscriptions and billing. +- **Manager**: Can manage licenses, teams, and assign roles. +- **Assigner**: Can assign licenses to users. Can't change teams and roles. +- **Viewer**: Can read licenses, teams, members. Can't make changes. + +> [!WARNING] +> The Owner role grants full access to the billing page. Owners can add or remove seats, change payment methods, and cancel subscriptions for all subscriptions bought by the same customer account. + +:::tabs +==== Adding members + +To add *administrative* members to your organization: + +1. Navigate to the **Roles** section +2. Click the "Invite member" button +3. Enter the member's email and select their role +4. Send the invitation + +==== Changing roles + +To change a member's role: + +1. Find the member in the table +2. Click the "Edit" action in the Actions column +3. Select a new role for the member +4. Confirm the change +::: + +## Misc + +### Renaming an Organization + +To rename your organization: +1. Click the dropdown menu next to the organization name at the top of the page +2. Select "Rename organization" +3. Enter a new name +4. Save the changes + +### Abandoning Roles + +If you want to leave an organization or team (in the administrative sense): +1. Click the dropdown menu next to the organization/team name +2. Select "Abandon role in organization/team" +3. Confirm your decision + +> [!IMPORTANT] +> Organization owners cannot abandon their role if they are the only owner. Transfer ownership to another user first and have them remove you. Note that abandoning a role only removes your administrative access to the organization - it does not revoke your license if you have one. To have your license revoked, you'll need to contact a team or organization administrator. + diff --git a/docs/src/dashboard/overview.md b/docs/src/dashboard/overview.md new file mode 100644 index 00000000..656570fa --- /dev/null +++ b/docs/src/dashboard/overview.md @@ -0,0 +1,5 @@ +# Overview + +The dashboard ([dashboard.exegol.com](https://dashboard.exegol.com)) is your main entry point to access and manage your Exegol instances (i.e., subscriptions, licenses, learning center, referral, community and support links, etc.). + +The dashboard overview provides a quick summary of your account, subscriptions, licenses, and useful links and is mostly useful for paid tiers users: and . \ No newline at end of file diff --git a/docs/src/dashboard/referral.md b/docs/src/dashboard/referral.md new file mode 100644 index 00000000..486a3889 --- /dev/null +++ b/docs/src/dashboard/referral.md @@ -0,0 +1,38 @@ +# Referral program + +The Referral page allows you to participate in Exegol's **referral program** to save on your subscription costs and help friends discover Exegol (and save as well). + +The referral program offers mutual benefits: + +- Your referred friends get a 10% discount on monthly, or 1.5 months free on yearly Pro plan +- As a referrer, you receive a discount on your next billing cycle for each successful referral. The discounts are cumulative, uncapped, but can't produce a negative billing amount. The discount should be automatically applied to the next billing period. + +The referral program is available only to users with an active Pro subscription. + +## Obtaining a Referral link + + +1. Click the "Refer a friend" button in the referrals table +2. Enter a name for your referral (for your own tagging purposes only) +3. Click "Create referral" +4. Copy the generated link and share it with your friend. + +> [!WARNING] +> Do not use email addresses as referral names to avoid disclosing personal information. + +## Limitations + +- **Maximum pending referrals**: You can have up to 5 pending referrals at any time +- **Expiration**: Referrals expire after 1 month if not completed +- **Eligibility**: Only Pro subscription owners can refer users +- **Discount period**: Discount applies for the first year, only on Pro subscriptions + +## Partner Program + +For frequent referrers, Exegol is developing a Partner Program with: +- Exclusive status and perks +- Special recognition for top referrers +- Additional benefits to be announced + +> [!SUCCESS] +> Stay tuned for announcements about Partner Program milestones and rewards. diff --git a/docs/src/dashboard/settings.md b/docs/src/dashboard/settings.md new file mode 100644 index 00000000..efec7a35 --- /dev/null +++ b/docs/src/dashboard/settings.md @@ -0,0 +1,109 @@ +# Settings + +The Settings page allows you to manage your Exegol account preferences, security options, and connected services. + +## Profile + +In the Profile section, you can update: + +- **Display Name**: Your name as it appears throughout the dashboard +- **Email Address**: Your account's contact email + +> [!NOTE] +> If you have a pending email change, you'll see a badge next to your email field. You must verify the new email address by clicking the link sent to both addresses before the change takes effect. + +> [!WARNING] +> If your account uses an Enterprise license, your email address will be visible to administrative members in the org or team (Owner, Manager, Assigner, Viewer). + +You can also connect your Discord account to access: + +- Private support tickets +- Voting on new features + +::: tabs + +=== Linking Discord + +To link your Discord account: + +1. Click the "Link" button in the Discord section +2. Follow the authorization process on Discord's website +3. If you're not already a member of the Exegol Discord server, you'll be prompted to join + +> [!NOTE] +> Your account will be assigned roles, depending on the active license(s) you have. + +=== Unlinking Discord + +To unlink your Discord account: +1. Click the "Unlink" button +2. Confirm your choice +3. Any associated roles will be removed within 24 hours + +::: + +## Security Settings + +### Password Management + +To change your password: +1. Click "Change password" in the Security section +2. You'll be redirected to a password reset page +3. Follow the instructions to create a new password + +### Two-Factor Authentication (2FA) + +Add an extra layer of security with authenticator apps: + +::: tabs + +=== Adding 2FA + +1. Click "Add" in the Two-Factor authentication section +2. Scan the QR code with your authenticator app +3. Enter the verification code to complete setup + +=== Removing 2FA + +To remove a 2FA device: +1. Find the device in your list +2. Click "Remove" +3. Confirm the removal + +> [!WARNING] +> If you remove all 2FA devices, your account will be protected by password only. + +::: + +## Dashboard Preferences + +- **Language Settings**: Select your preferred language from the dropdown in the Language section +- **Currency Preference**: Select your currency from the dropdown in the Currency section +- **Theme Toggle**: Click the theme toggle button in the Theme section +- **Cookie Management**: Click "Settings" in the Cookies section, and adjust your privacy preferences in the popup dialog + +## Session Management + +::: tabs + +=== Current session + +To log out from your current device: +1. Click "Log out" in the Current session section + +=== Other sessions + +To log out from all other devices where you're signed in: +1. Click "Log out others" in the All other sessions section +2. Confirm your choice in the dialog + +> [!TIP] +> Use this feature if you suspect unauthorized access to your account or if you forgot to log out from a public or shared device. + +::: + +## Account Deletion + +Account deletion requests are currently processed manually by our team to ensure proper handling of active subscriptions before account closure. This prevents you from being locked out while subscriptions are still active. This process will be automated as we scale up. + +Once processed, account deletion is permanent. All your data, including subscriptions, licenses, and settings will be permanently removed. diff --git a/docs/src/dashboard/subscriptions.md b/docs/src/dashboard/subscriptions.md new file mode 100644 index 00000000..8937b1d6 --- /dev/null +++ b/docs/src/dashboard/subscriptions.md @@ -0,0 +1,29 @@ +# Subscriptions + +The Subscriptions page allows you to manage your **Exegol** subscriptions (Pro subs only), view usage details, and handle billing information. + +The subs are detailed in the [Organizations](organizations#subscriptions) page. + +> [!TIP] +> Additional fields can be shown through the "View" options menu, especially for debug purposes if something doesn't work and you reach out to Support. + +The price shown is the default price of the corresponding subscription tier, not including potential discounts. The real amount is available in the billing portal. + +The billing portal link can be obtained through the Actions menu in the far right column of the table. Through this portal, users can modify billing information, number of seats, cancel subcriptions etc. + +> [!NOTE] +> Pro subscriptions are limited to 1 subscription with up to 2 seats. If you need more seats, consider upgrading to the Enterprise plan. + +## Adding a New Subscription + +To add a new subscription: + +1. Click the "Add subscription" button in the top-right corner +2. You'll be redirected to the subscription page where you can choose between Pro and Enterprise plans + +> [!WARNING] +> If you already have a Pro subscription, you'll see a warning message indicating that you've reached the limit. You can either: +> - Add seats to your existing Pro subscription (up to 2 seats) +> - Add or switch to an Enterprise plan for more seats + +For more information regarding the Pro and Enteprise plans, go to [exegol.com/pricing](https://exegol.com/pricing). \ No newline at end of file diff --git a/docs/src/dashboard/support.md b/docs/src/dashboard/support.md new file mode 100644 index 00000000..ba0cbad7 --- /dev/null +++ b/docs/src/dashboard/support.md @@ -0,0 +1,28 @@ +# Support + +The Support page provides quick links to support channels, to find answers to your questions, and connect with the Exegol community and team. + + + +### Documentation first + +We recommend starting with our documentation: +- Check the [FAQ](/faq) section for common questions and answers +- Use the search function to find specific topics related to your issue + +### Community support + +The Exegol community is friendly and helpful: +- Join our [official Discord server](https://discord.gg/cXThyp7D6P) to connect with other users +- Ask questions in the community channels +- Share your experiences and learn from others + +### Advanced support + +For Pro and Enterprise subscribers: +- Open a private ticket on our Discord server for: + - Issues requiring confidentiality + - Urgent assistance + - More personalized support + +We strive to minimize the issues you might encounter, but rest assured that we're here to help whenever you need assistance. \ No newline at end of file diff --git a/docs/src/faq.md b/docs/src/faq.md new file mode 100644 index 00000000..0f1f5853 --- /dev/null +++ b/docs/src/faq.md @@ -0,0 +1,161 @@ +# Frequently asked questions + +Below are the frequently asked questions regarding either features or +the overall project. + +## What tools are installed in Exegol? + +The list of tools is dynamically generated for all Exegol images and +available [here](/images/tools). + +## Can I run Exegol on a macOS? + +Yes. And both CPU architectures are supported (Intel X86_64 (AMD64) and +Apple Silicon M1/M2 (ARM64). + +> [!SUCCESS] Tip +> We strongly advised macOS users to replace Docker Desktop with +> [OrbStack](https://orbstack.dev/), allowing host network mode to work +> for instance, this it's not supported by Docker Desktop for Mac. + +## Can I use a VPN with Exegol? + +Yes. And you have multiple choices. + +- **The "YOLO" choice**: at the container creation (i.e. when "starting" + a container for the first time), give all permissions to the container + so that you're able to run openvpn in it and start the vpn. The + command should look like + `exegol start --privileged`. +- **The better choice**: use the `--vpn` option at the container + creation: + `exegol start --vpn `. It's + the easiest and more secure choice. See the `start` help + [here](/wrapper/cli/start). + +> [!WARNING] +> Creating a **privileged** container (c.f. the "YOLO" choice) exposes +> you to higher security risks. This should be avoided. + +## Can I customize Exegol? + +Yes, please refer to the +["my-resources" documentation](/images/my-resources) that +explains how to automatically setup your changes to your Exegol +containers. Also, see the +["wrapper's advanced-uses" documentation](/wrapper/features#advanced-uses) +to see how to edit Exegol's conf among other things. You could also want +to [make your own Exegol image](/faq#can-i-make-my-own-exegol-image) + +## Can I make my own Exegol image? + +Yes. You will need to create a dockerfile (e.g. `CUSTOM.dockerfile`) at +the root of the exegol-images module next to the other dockerfiles (i.e. +`/path/to/Exegol/exegol-docker-build/`) containing the instructions you +want the build process to follow. + +Then, run something like `exegol install "myimagename" "CUSTOM"` to +build the image locally. See the `install` documentation: +[install action](/wrapper/cli/install). + +## How to install Exegol on an external drive? + +Exegol's wrapper is lightweight, but it's Docker images can take up some +space, and users may not have enough room in their internal HDD/SSD, +hence the question. This usually comes down to "how can I install Docker +on an external drive?", and the answer depends on the host. + +> [!SUCCESS] Tip +> Use a fast drive, otherwise Exegol will get real slow. + +For macOS and Windows users, this can be configured in the Docker +Desktop dashboard (in +`Settings > Resources > Advanced > Disk image location`). + + + +## How to add a new tool? + +"Adding a tool" can mean many things. Depending on that, you'll get a +different answer. So let's answer most of them. + +If you want to add a tool: + +- **in the official Exegol images**: refer to the + [contribution guidance](/contribute/resources#adding-new-tools#adding-a-new-tool). +- **in your own custom local image**: refer to the + [contribution guidance](/contribute/resources#adding-new-tools#adding-a-new-tool) as well, but instead of + creating a Pull Request at the end to offer your contribution, just + build the image locally with the wrapper and enjoy your custom local + image. +- **in a live container**: that's your container, you can do whatever + you whish in it ;) +- **automatically in all containers at their creation**: refer to the + ["my-resources" documentation](/images/my-resources). + +## Can I install docker directly on my WSL2 distro instead of Docker Desktop ? + +Yes, it's possible to install docker directly on WSL2 rather than using +Docker Desktop, but you'll be restricted to your WSL2 environment and +its constraints. + +Although Docker Desktop is incomplete, it does offer a few advantages +(exegol can be used from powershell / cmd, windows folder sharing with +the exegol workstation, etc). We therefore recommend **Docker Desktop as +the official support** for Exegol. + +We do **not** guarantee wrapper stability with a directly installed WSL +docker. + +## How to retrieve your desktop login details ? + +The container's root password can be obtained with +`exegol info ` (i.e. this is needed when using the +[desktop](/wrapper/features#desktop) feature) + +## WSL 2 consumes massive amounts of RAM, CPU power, and Disk Space. How can I deal with this issue ? + +Users might experience excessive memory consumption when using Exegol. +This is caused by WSL 2 not freeing up RAM even when processes are +finished, causing large amounts of unused memory to remain allocated. +This leads to high memory usage on the host system and reduced +performance. More information about this issue can be found \[at this +GitHub issue\](). A simple +workaround is to create a +%UserProfile%.wslconfig file in Windows +and use it to limit memory assigned to WSL 2 VM. + +`` ` [wsl2] memory=8GB # Limits VM memory in WSL 2 up to 3GB processors=2 # Makes the WSL 2 VM use two virtual processors ``\` + +When using Docker with the WSL2 backend, resource limits are managed by +Windows. There might be cases, for example after updating an Exegol +image, where Docker might take double the disk space the image needs. To +deal with this problem, users should find the +Disk image location in Docker Desktop +(Settings -\> Resources -\> Advanced). It +will be in the following format +C:Users\AppDataLocalDockerwsl. The +Virtual Hard Disk can be located in the following path, +C:Users\AppDataLocalDockerwsldisk. +Users can use the diskpart tool to shrink +the Virtual Hard Disk using the following instructions based on +directions +\[here\](). - +Stop Docker Desktop - Start an administrative CMD or PowerShell +session - Stop WSL2: wsl --shutdown - +Start the diskpart tool: diskpart - +Select the Virtual Hard Disk: select vdisk +file="C:Users\AppDataLocalDockerwsldiskdocker_data.vhdx". +A message DiskPart successfully selected the +virtual disk file. should appear. - Shrink the Virtual Hard Disk: +compact vdisk - Wait for the proccess to +reach 100 completion (might take some time) + +## How do I update Exegol? + +`exegol update` + +> [!SUCCESS] Hint +> If you installed the wrapper with pipx, update with `pipx upgrade exegol` diff --git a/docs/src/first-install.md b/docs/src/first-install.md new file mode 100644 index 00000000..91fde5aa --- /dev/null +++ b/docs/src/first-install.md @@ -0,0 +1,277 @@ +# First install + + +While Exegol supports all major operating systems, we recommend using Linux for optimal performance. +Docker Desktop on Windows and macOS has limitations with host network interfaces and USB device access. + +Exegol is installed through two main steps: + +1. Install the Python wrapper (the "brains") +2. Install at least one Exegol image (the "muscle") + +> [!TIP] +> For the easiest and smoothest experience, we recommend installing Exegol on a Linux system (such as Ubuntu) and using the Zsh shell. Other operating systems and shells are supported, but this setup is by far the most straightforward. + +This page details the installation steps for the most common operating systems Ubuntu/Debian, macOS or Windows. + +If you're using another operating system in the following list, click on it to be redirected to the proper installation page: [Arch](/install/on-arch), [Fedora](/install/on-fedora), [Gentoo](/install/on-gentoo), [NixOS](/install/on-nixos), [openSUSE](/install/on-opensuse). + +If your operating system is not covered here or in the list above, it should work nonetheless, but we probably didn't have the time to document it yet (you're welcome to help if you'd like). + +## 1. Requirements + +Before installing Exegol, ensure you have: + +- **Git**: for downloading source code ([Linux](https://github.com/git-guides/install-git#install-git-on-linux) | [macOS](https://github.com/git-guides/install-git#install-git-on-mac) | [Windows](https://github.com/git-guides/install-git#install-git-on-windows)) +- **Python 3**: to run the wrapper ([Linux](https://docs.python.org/3/using/unix.html) | [macOS](https://docs.python.org/3/using/mac.html) | [Windows](https://docs.python.org/3/using/windows.html)) +- **Docker**: to run the containers. [Docker Engine](https://docs.docker.com/engine/install/) for Linux, [OrbStack](https://orbstack.dev/) is advised for macOS, [Docker Desktop](https://docs.docker.com/desktop/install/windows-install/) for Windows. +- **Storage**: at least 200GB recommended + +::: tabs + +=== Linux + +Linux is the recommended platform for Exegol. No additional requirements necessary. + +Install Git and Python if not already installed: +```bash +sudo apt update && sudo apt install -y git python3 pipx +``` + +Ensure pipx is in PATH and reload the shell + +```bash +pipx ensurepath && exec $SHELL +``` + +While we always advise to refer to the [official documentation](https://docs.docker.com/engine/install/), the following one-liner can be used to install Docker quickly. + +```bash +curl -fsSL "https://get.docker.com/" | sh +``` + +> [!WARNING] +> Docker "[Rootless mode](https://docs.docker.com/engine/security/rootless/)" is not supported by Exegol as of yet. Don't follow that part. + +=== macOS + +For macOS, we recommend [Orbstack](https://orbstack.dev/). [Docker Desktop](https://docs.docker.com/desktop/install/mac-install/) can be used as well but lacks a few features and is not very optimized. + +Install Homebrew if not already installed + +```bash +/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)" +``` + +Install Git, Python and Pipx + +```bash +brew install git python pipx +``` + +Ensure pipx is in PATH and reload the shell + +```bash +pipx ensurepath && exec $SHELL +``` + + +=== Windows + +For Windows, you'll need: + +- Windows 10 (updated) or Windows 11 +- [WSL2](https://learn.microsoft.com/en-us/windows/wsl/install) with at least one Linux distribution installed +- [Docker Desktop](https://docs.docker.com/desktop/install/windows-install/) with WSL2 integration enabled + +Install Git and Python: +```powershell +# Download and install Git from the official website +winget install --id Git.Git -e --source winget + +# Download and install Python +winget install --id Python.Python.3 -e --source winget +``` + +![Windows Docker Desktop WSL integration](/assets/install/windows_dockerdesktop_wsl_config.png) + + +> [!WARNING] +> You may want to disable Windows Defender during the installation, as +> Exegol will download pre-built remote shells (or temporarily exclude +> `C:\Users\\AppData\Local\Temp` or the source file +> directory). +> +> You should also add the folder +> `C:\Users\\.exegol\exegol-resources` to the exclusion list. + +Later on, if you want to install the wrapper on your Windows machine directly, and not in a WSL, that's possible. You'll need to install pipx first. + + +```powershell +py -m pip install --user pipx +py -m pipx ensurepath +``` + +::: + +## 2. Wrapper install + +Install Exegol in an isolated environment using [pipx](https://pypa.github.io/pipx/), a tool that allows you to easily install and run Python applications in isolated environments, keeping them separate from your system Python and other packages. + +```bash +pipx install exegol +``` + +Before using Exegol, you will need to read and accept the [End User License Agreement (EULA)](/legal/eula). This will be prompted on the first run of the wrapper, and until it's confirmed. + +To interact with docker, the wrapper needs proper permissions. You must either run Exegol with sudo (preferred), or have your user be a member of the docker group (which dangerously allows your user to basically have root permissions all the time). + +The following command shows how to do that with bash, but it can be adapted to any shell. Once the alias is set, you can apply it your current session. + +::: tabs +=== Linux Bash +```bash +echo "alias exegol='sudo -E $(echo ~/.local/bin/exegol)'" >> ~/.bash_aliases && source ~/.bash_aliases +``` +=== Linux Zsh +```zsh +echo "alias exegol='sudo -E $(echo ~/.local/bin/exegol)'" >> ~/.zshrc && source ~/.zshrc +``` +=== Windows PowerShell / WSL +When using Docker Desktop, you **don't** need to use ``sudo``. You can skip this step and follow the next one. +=== macOS +When using Docker Desktop, you **don't** need to use ``sudo``. You can skip this step and follow the next one. +::: + +## 3. Activation + +If you have a [Pro or Enterprise subscription](https://exegol.com/pricing), you can activate your license: + +```bash +exegol activate +``` + +You will need an active license, and a token from [dashboard.exegol.com/otp](https://dashboard.exegol.com/otp). See the [activate](wrapper/cli/activate) documentation section for more information on that action. + +## 4. Image install + +Once the wrapper is installed, you can download your first Exegol image: + +```bash +exegol install +``` + +You'll be guided through selecting and installing an image. + +## 5. Run Exegol + +Launch your first Exegol container with: + +```bash +exegol start +``` + + +## :zap: Auto-completion setup + +This step is optionnal. + +Exegol supports command auto-completion for easier usage. Here's how to set it up for your shell: + +::: tabs + +=== Bash + +First, install argcomplete: +```bash +pipx install argcomplete +``` + +Then, add the following line to your `.bashrc`: + +```bash +eval "$(register-python-argcomplete --no-defaults exegol)" +``` + +=== Zsh + +```zsh +# Install argcomplete +pipx install argcomplete + +# Enable compinit if not already enabled +echo "autoload -U compinit && compinit" >> ~/.zshrc + +# Add Exegol completion +echo 'eval "$(register-python-argcomplete --no-defaults exegol)"' >> ~/.zshrc +``` + +=== Fish + +```fish +# Activate in current session +register-python-argcomplete --no-defaults --shell fish exegol | source + +# Or create completion file +register-python-argcomplete --no-defaults --shell fish exegol > ~/.config/fish/completions/exegol.fish +``` + +=== Tcsh + +```sh +eval `register-python-argcomplete --no-defaults --shell tcsh exegol` +``` + +=== PowerShell + +```powershell +# Install argcomplete +pipx install argcomplete + +# Create directory if needed +mkdir $HOME\Documents\WindowsPowerShell -ErrorAction SilentlyContinue + +# Generate completion file +register-python-argcomplete --no-defaults --shell powershell exegol > $HOME\Documents\WindowsPowerShell\exegol_completion.psm1 + +# Import in profile +Add-Content -Path $PROFILE -Value 'Import-Module "$HOME\Documents\WindowsPowerShell\exegol_completion.psm1"' + +# Optional: Enable tab completion like Zsh +Add-Content -Path $PROFILE -Value 'Set-PSReadlineKeyHandler -Key Tab -Function MenuComplete' +``` + +::: + +## :sunrise: Graphical applications support + +This step is optionnal. Graphical apps are already usable through the graphical desktop environment already available. +This step allows more advanced users to set up X11 socket sharing to open GUI apps from the CLI directly. + +::: tabs + +=== Linux + +Linux supports graphical applications natively. + +=== macOS + +Exegol **already supports** a full desktop environment out of the box, that you can access with a VNC client, or directly in your browser (with the `--desktop` wrapper option). This is better than launching GUI apps from the terminal. + +If you really want to launch GUI apps from the terminal on macOS and the full desktop is not enough, you need [XQuartz](https://www.xquartz.org/) installed, with "Allow connections from network clients" enabled, but be avised, this solution is far from smooth. We call this X11 support. + +![macOS XQuartz configuration requirement](/assets/install/macOS_xquartz_config.png) + + +=== Windows + +Windows supports graphical applications through WSLg: + +1. Ensure WSL2 is updated: `wsl --update` +2. Verify that a Linux distribution is installed and working through WSL2 + +See the [official WSLg documentation](https://github.com/microsoft/wslg#installing-wslg) for more details. + +::: + diff --git a/docs/src/images/credentials.md b/docs/src/images/credentials.md new file mode 100644 index 00000000..c3ec90e3 --- /dev/null +++ b/docs/src/images/credentials.md @@ -0,0 +1,12 @@ +# Credentials + +Some tools are pre-configured with the following credentials + +| Element | User | Password | +|----------------------|--------------|----------------| +| neo4j database | neo4j | exegol4thewin | +| bettercap ui | bettercap | exegol4thewin | +| trilium | trilium | exegol4thewin | +| empire | empireadmin | exegol4thewin | +| wso-webshell (PHP) | | exegol4thewin | + diff --git a/docs/src/images/my-resources.md b/docs/src/images/my-resources.md new file mode 100644 index 00000000..6e2e2371 --- /dev/null +++ b/docs/src/images/my-resources.md @@ -0,0 +1,425 @@ +# My resources + +"My-resources" allows users to make Exegol their own and customize it even further. This feature relies on a simple volume shared between the host and all exegol containers, and an advanced integration in the Exegol images directly. +It allows users to enjoy their own tools that are not available in Exegol but also to customize their Exegol setup + +The volume is accessible from the host at `~/.exegol/my-resources/` and from the containers (if the feature was left enabled at the container creation) at `/opt/my-resources`. + +> [!WARNING] +> The "my-resources" feature will do what it's told to do. If users +> choose to use that feature to replace files or configuration, those +> replacements should take place. So if there are some additions to +> Exegol you're not getting, it could be because you have a +> "my-resources" setup that replaces it. + +Below are the features offered by "My-resources", allowing users to +extend Exegol beyond what is initially included ([tools](/images/tools), +[resources](/resources/list)). + +- [Custom tools](/images/my-resources#custom-tools): users can place their own custom + standalone tools, binaries and scripts in the "my-resources" volume. + This volume is accessible from all containers at `/opt/my-resources`. +- [Supported setup](/images/my-resources#supported-setups): users can customize their + exegol environments automatically and transparently without having to + manually setting things up for each and every new Exegol container + they create. In this functionality, a pre-set list of supported custom + configuration is set, and will improve with time. It's the easier and + most user-friendly approach to customizing a few configurations. +- [User setup](/images/my-resources#user-setup): In this functionality, a shell script can + be populated with every command a user wishes its containers to run at + their creation. + +## Custom tools + +> [!INFO] +> Available from version `3.0.0` of any exegol image. + +In the container, the `/opt/my-resources/bin/` folder +(`~/.exegol/my-resources/bin/` on the host) is automatically added to +the `PATH` of the zsh shell. The user can then add tools in that folder +in order to use them from the container. + + +> [!TIP] +>The most simple approach would be to add standalone binaries, but users +> could also add symbolic links that would point to somewhere else in +> `/opt/my-resources/`. +> +> ``` bash +> # Example for a standalone binary on your host +> cp /path/to/tool ~/.exegol/my-resources/bin/ +> # or for a standalone binary on your exegol container +> cp /path/to/tool /opt/my-resources/bin/ +> +> # Example for a symbolic link from your host +> git -C ~/.exegol/my-resources/ clone "https://github.com/someauthor/sometool" +> ln -s ../sometool/script.py ~/.exegol/my-resources/bin/script.py +> # or from your exegol container +> git -C /opt/my-resources/ clone "https://github.com/someauthor/sometool" +> ln -s /opt/my-resources/sometool/script.py /opt/my-resources/bin/script.py +> ``` + + +## Supported setups + +Configuration files stored in the `/opt/my-resources/setup/` directory +will be deployed on the containers and allow users to customize Exegol +even further. By default, the number of officially supported +configuration files is limited, and it depends on the version of the +image itself, not the wrapper. + + + +> [!TIP] +> In order to see what configuration files are supported in your version, +> the `/opt/supported_setups.md` documentation file can be read from any +> container. + + +This documentation will reference in detail all the supported +customizations available over time, and the corresponding minimum image +version required for each one. + +If a user wants to deploy tools and configurations that are not +supported, or more advanced, they can opt for the +[User setup](/images/my-resources#user-setup). + +### `apt` (packages, sources, keys) + +> [!INFO] +> Available from version `3.0.0` of any exegol image. + +A system exists to easily install arbitrary APT packages in any new +exegol container. + +- Custom APT **repositories** can be added in exegol by filling in the + `/opt/my-resources/setup/apt/sources.list` file +- Importing custom repositories usually requires importing **GPG keys** + as well, which can be done by entering trusted GPG keys download URLs + in the `/opt/my-resources/setup/apt/keys.list` file +- To install **APT packages** automatically (after updating the + repository including the custom ones), just enter a list of package + names in the `/opt/my-resources/setup/apt/packages.list` file + +### `bloodhound` (customqueries, config) + +> [!INFO] +> Available from version `3.1.0` of the `ad` and `full` images. + + +A system exists to easily add one or **several** bloodhound +customqueries files, or change its configuration file in any new exegol +container. + +To automatically: + +- overwrite the `~/.config/bloodhound/config.json` configuration file, + simply create the file + `/opt/my-resources/setup/bloodhound/config.json` +- replace the default exegol customqueries, place one or several valid + customqueries files into the folder + `/opt/my-resources/setup/bloodhound/customqueries_replacement/`. +- merge with the default exegol customqueries by placing one or several + valid customqueries files into the folder + `/opt/my-resources/setup/bloodhound/customqueries_merge/` + +> [!TIP] +> To be considered for replacing or merging, the customqueries files +> must be **valid** and bear the `.json` extension. The file names do +> not matter. The output will be saved into the single file +> `~/.config/bloodhound/customqueries.json`. + +### `firefox` (policy) + +> [!INFO] +> Available from version `3.1.6` of any exegol image. + +A system exists to easily personalise firefox in any new exegol +container. + +The file `/usr/lib/firefox-esr/distribution/policies.json` can be +used as a template in order to create your own Firefox policy. +Your policy can then be copied to the location `/opt/my-resources/setup/firefox/policies.json` +to apply it in the next container deployment +(), +all available directives can be found here: +. + +> [!IMPORTANT] +> Your custom policy will overwrite the default policy created by Exegol. + +The default policy applied by Exegol will do the following actions: + +*Add a few bookmarks* + +```json +{ + "policies": { + "ManagedBookmarks": [ + { + "toplevel_name": "Exegol Bookmarks" + }, + { + "url": "https://exegol.readthedocs.io/en/latest/", + "name": "Exegol Doc" + }, + { + "name": "References / Guides", + "children": [ + { + "url": "https://www.thehacker.recipes/", + "name": "THR" + }, + [...] + { + "url": "https://lolol.farm/", + "name": "LOLOL Farm" + } + ] + } + ] +} +``` + +*Install a few extensions* + +```json +{ + "policies": { + "ExtensionSettings": { + "foxyproxy@eric.h.jung": { + "installation_mode": "force_installed", + "install_url": "https://addons.mozilla.org/firefox/downloads/latest/foxyproxy-standard/latest.xpi" + }, + [...] + } +} +``` + +*Disable a few Firefox features such as the telemetry* + +```json +{ + "policies": { + "DisableTelemetry": true, + "DisplayBookmarksToolbar": "always", + "UserMessaging": { + "WhatsNew": false, + "ExtensionRecommendations": false, + "FeatureRecommendations": false, + "UrlbarInterventions": false, + "SkipOnboarding": true, + "MoreFromMozilla": false + } +} +``` + +*Apply the CA of Burpsuite* + +```json +{ + "policies": { + "Certificates": { + "Install": ["/opt/tools/firefox/cacert.der"] + } +} +``` + +In order to install a specific addon, you can go to the Firefox addon +webpage, and search for the addon GUID in the page HTML source code by +searching for the JSON field `"guid":`, for example for the Dark Reader +addon, the GUID is `addon@darkreader.org`, you can then add the +extension in the JSON file: + +``` json +"ExtensionSettings": { + "addon@darkreader.org": { + "installation_mode": "force_installed", + "install_url": "https://addons.mozilla.org/firefox/downloads/latest/addon@darkreader.org/latest.xpi" + }, +} +``` + +To add a bookmark you can add a children to an existing folder in the +`ManagedBookmarks` directive: + +``` json +{ + "url": "https://www.thehacker.recipes/", + "name": "THR" +} +``` +or you can add a new folder: + +``` json +{ + "name": "New folder", + "children": [ + { + "url": "https://regex101.com/", + "name": "Regex101" + } + ] +} +``` + +### `firefox` (addons, CA) (deprecated) + +> [!WARNING] +> This covers the previous method for personalizing Firefox; the current +> approach utilizes `` policy <`firefox `` (policy)\>\`. + +> [!INFO] +> Available from version `3.0.2` to `3.1.5` of any exegol image. + +A system exists to easily install arbitrary firefox addons in any new +exegol container. + +The `/opt/my-resources/setup/firefox/addons.txt` file allows the user to +list addons to install from online sources. It must be filled with their +links in Mozilla's shop (for example + ). + +The `.xpi` files in `/opt/my-resources/setup/firefox/addons/` folder +will be installed as well. + +> [!INFO] +> Below, available from version `3.2.0` of any exegol image. + +The `.der` files in `/opt/my-resources/setup/firefox/CA/` folder will be +trusted . + +### `python3` (pip3) + +> [!INFO] +> Available from version `3.0.0` of any exegol image. + +A system exists to easily install arbitrary PIP3 packages in any new +exegol container. + +The `/opt/my-resources/setup/python3/requirements.txt` file allows the +user to list a set of packages to install with constraints just like a +classic **requirements.txt** file. + +### `tmux` (conf) + +> [!INFO] +> Available from version `3.0.0` of any exegol image. + + +Exegol supports overloading its **tmux** configuration to allow all +users to use their personal configuration. + +- To automatically overwrite the `~/.tmux.conf` configuration file, + simply create the file `/opt/my-resources/setup/tmux/tmux.conf` + +> [!TIP] +> It is possible to install **plugins** with the APT customization +> system, details [here](/images/my-resources#apt-packages-sources-keys). + +### `vim` (vimrc, configs) + +> [!INFO] +> Available from version `3.0.0` of any exegol image. + +Exegol supports overwriting its **vim** configuration to allow all users +to use their personal configuration. + +- To automatically overwrite the `~/.vimrc` configuration file, simply + create the file `/opt/my-resources/setup/vim/vimrc` + +- vim configuration folders are also automatically synchronized: + - `/opt/my-resources/setup/vim/autoload/*` --\> `~/.vim/autoload/` + - `/opt/my-resources/setup/vim/backup/*` --\> `~/.vim/backup/` + - `/opt/my-resources/setup/vim/colors/*` --\> `~/.vim/colors/` + - `/opt/my-resources/setup/vim/plugged/*` --\> `~/.vim/plugged/` + - `/opt/my-resources/setup/vim/bundle/*` --\> `~/.vim/bundle/` + +> [!TIP] +> It is possible to install **plugins** with +> [the APT customization system](/images/my-resources#apt-packages-sources-keys). + +### `neovim` (.config/nvim) + +> [!INFO] +> Will be available from version `3.1.2` of any exegol image. + +Exegol supports overwriting its **neovim** configuration to allow all +users to use their personal configuration. + +- To automatically overwrite the `~/.config/nvim/` configuration, copy + your config in `/opt/my-resources/setup/nvim/` + +> [!TIP] +> It is possible to install **plugins dependencies** with +> [the APT customization system](/images/my-resources#apt-packages-sources-keys). + +### `zsh` (aliases, zshrc, history) + +> [!INFO] +> Available from version `3.0.0` of any exegol image. + +To not change the configuration for the proper functioning of exegol but +allow the user to add aliases and custom commands to zshrc, additional +configuration files will be automatically loaded by zsh to take into +account the customization of the user . + +- **aliases**: any custom alias can be defined in the + `/opt/my-resources/setup/zsh/aliases` file. This file is automatically + loaded by zsh. +- **zshrc**: it is possible to add commands at the end of the zshrc + routine in `/opt/my-resources/setup/zsh/zshrc` file. +- **history**: it is possible to automatically add history commands at + the end of `~/.zsh_history` from the file + `/opt/my-resources/setup/zsh/history`. + +> [!TIP] +> It is possible to install **plugins** with the APT customization +> system, details [here](/images/my-resources#apt-packages-sources-keys). + +### `arsenal` (cheats) + +> [!INFO] +> Available from version `3.1.5` of any exegol image. + +Exegol supports adding a custom cheatsheets file (rst or md file) for +Arsenal () by moving +them in the folder `/opt/my-resources/setup/arsenal-cheats/`. + +> [!TIP] +> You can create a structure with folders if you want some organization + +## User setup + +> [!INFO] +> Available from version `3.0.0` of any exegol image. + +The `/opt/my-resources/setup/load_user_setup.sh` script is executed on +the first startup of each new container that has the "my-resources" +feature enabled. Arbitrary code can be added in this file, in order to +customize Exegol (dependency installation, configuration file copy, +etc). + +> [!WARNING] +> It is strongly advised **not** to overwrite the configuration files +> provided by exegol (e.g. `/root/.zshrc`, `/opt/.exegol_aliases`, ...), +> official updates will not be applied otherwise. + +## Permissions + +To facilitate its use, a read/write access system **shared** (between +the host user and the container root user) has been implemented. + +To allow this permissions sharing, the "my-resources" folder (and all subdirectories) must have the Set-GID permission bit set. This is done automatically by the wrapper if the current user has sufficient rights. Otherwise, the wrapper will display a sudo command to be executed manually to update the relevant permissions. + +## Troubleshooting + +In case of problem, the customization system logs all actions in the +`/var/log/exegol/load_setups.log` file. + +If the whole installation went smoothly the log file will be compressed +by gunzip and will have the name `/var/log/exegol/load_setups.log.gz` + +> [!TIP] +> Logs in `.gz` format can be viewed directly **without unpacking** them +> with the `zcat`, `zgrep`, `zdiff` or `zmore` command! diff --git a/docs/src/images/profiles.md b/docs/src/images/profiles.md new file mode 100644 index 00000000..0519ecba --- /dev/null +++ b/docs/src/images/profiles.md @@ -0,0 +1 @@ + \ No newline at end of file diff --git a/docs/src/images/services.md b/docs/src/images/services.md new file mode 100644 index 00000000..4c2c44ff --- /dev/null +++ b/docs/src/images/services.md @@ -0,0 +1,15 @@ +# Services list + +This section lists the services that can be used in Exegol containers and their associated default ports. + +| Service | Port | Commands | Comments | +|----------------------|---------|------------------------------------------------------|----------| +| **neo4j** | 7687, 7474, 7373 | `neo4j start`, `neo4j stop`, `neo4j restart` | Used by BloodHound and BloodHound-related projects. | +| **BloodHound-CE** | 1030 | `bloodhound-ce`, `bloodhound-ce-reset`, `bloodhound-ce-stop` | BloodHound Community Edition Web Interface | +| **postgresql** | 5432 | `service postgresql [...]` | Used by BloodHound CE | +| **Trilium** | 1991 | `trilium-start`, `trilium-stop` | Collaborative note-taking app. [GitHub](https://github.com/zadam/trilium) | +| **Burp Suite** | 8080 | `burpsuite` | HTTP(S) Proxy | +| **Starkiller (Empire)** | TBD | `ps-empire server` | GUI for the Empire post-exploit framework. [GitHub](https://github.com/BC-SECURITY/Empire) | +| **Havoc** | 40056 | `havoc client/server` | C2 Framework in GO. [GitHub](https://github.com/HavocFramework/Havoc) | +| **Desktop** (VNC & Websockify) | 6336, random | `desktop-start`, `desktop-stop`, `desktop-restart` | Remote graphical desktop feature (beta). Used with `--desktop` from up-to-date wrapper. | + diff --git a/docs/src/images/tools.md b/docs/src/images/tools.md new file mode 100644 index 00000000..c3be96a4 --- /dev/null +++ b/docs/src/images/tools.md @@ -0,0 +1,35 @@ +# Tools list + +For detailed information about the different types of Exegol images, please refer to the [Images types](/images/types) page. + +But TL;DR, it goes like this for Community users. +- `free`: The most comprehensive image. Similar to `full`, but a bit late. + +And for and : +- `nightly`: Development image with latest updates and feats. +- Tagged releases (`full`, `ad`, `osint`, `web`, `light`): Stable versions with specific tool sets. + +## Free image + + + +## Nightly image + + + +## Tagged releases + +:::tabs +=== AMD64 + + +=== ARM64 + + +::: + +## Latest nightly +
+Below is the list of tools featured in the latest nightly (AMD64) image. + + diff --git a/docs/src/images/types.md b/docs/src/images/types.md new file mode 100644 index 00000000..29d84279 --- /dev/null +++ b/docs/src/images/types.md @@ -0,0 +1,49 @@ +# Exegol images + +Exegol offers several specialized Docker images, each tailored for different security testing and research purposes. + +- Official Exegol images are pre-built and available for immediate use through `exegol install`. +- Users can also build their own custom images if needed +- Each image is optimized for its specific use case while maintaining a consistent base environment +- The images are regularly updated with the latest tool versions and security patches +- Pro and Enterprise users have access to all images, while Community users are limited to the Free image + + +## Free image + +Equivalent to the Full image but a few versions behind. Contains all tools supported by Exegol, making it perfect for getting started with the platform +| Image Name | Description | +|------------|-------------| +| `free` | The most comprehensive image. Best for non-profits, students, learners. | + +Users can also build their own Exegol images locally using the `exegol build` command. For more information about building local images, see the [build documentation](../wrapper/cli/build.md). That's especially interesting to build specific images like the ones described below. + +## Advanced images + +| Image Name | Description | +|------------|-------------| +| `full` | The most comprehensive image that includes all tools supported by Exegol. This is the heaviest image but provides the most complete toolkit for security professionals. | +| `ad` | Specialized image focused on Active Directory and internal penetration testing tools. Perfect for red teaming and internal security assessments. | +| `web` | Dedicated to web application security testing, containing tools specifically designed for web penetration testing and vulnerability assessment. | +| `light` | A streamlined version containing only the most essential and commonly used tools across various security domains. Ideal for quick assessments or when resources are limited. | +| `osint` | This image focuses on Open Source Intelligence gathering tools, helping security professionals collect and analyze publicly available information. | +| `nightly` | A development version that contains the latest updates and features. This image is intended for advanced users and developers who want to test cutting-edge features. Note that this version may be unstable. | + +## Private Images + +For organizations requiring a complete private registry solution, we offer a managed Exegol private registry service. This enterprise solution includes: + +- A fully managed private Docker registry for Exegol images +- Custom Exegol images maintained and updated by our team +- Full integration with the Exegol wrapper +- Automatic updates and maintenance of your private images +- Dedicated support and customization options +- The appropriate NDA and IP agreements, to protect your knowledge and content + +This service is ideal for organizations that need: +- Complete control over their Exegol image distribution +- Private, organization-specific Exegol images +- Full integration with their existing infrastructure +- Regular updates and maintenance of their private images + +Contact us for a quote and to discuss your organization's specific requirements. diff --git a/docs/src/index.md b/docs/src/index.md new file mode 100644 index 00000000..86efd01b --- /dev/null +++ b/docs/src/index.md @@ -0,0 +1 @@ + \ No newline at end of file diff --git a/docs/src/install/on-arch.md b/docs/src/install/on-arch.md new file mode 100644 index 00000000..6d480474 --- /dev/null +++ b/docs/src/install/on-arch.md @@ -0,0 +1,82 @@ +# Installing Exegol on Arch Linux + +> [!NOTE] +> This page was brought to you by a community member and wasn't "mass-tested" yet. Feedback on whether it works properly (or not) would be greatly appreciated (please head over to our Discord server for that). + +Exegol is installed through two main steps: + +1. Install the Python wrapper (the "brains") +2. Install at least one Exegol image (the "muscle") + +## 1. Requirements + +Git, Python3 and Pipx can be installed with the following command: + +```bash +sudo pacman -Syu --noconfirm && sudo pacman -S --noconfirm git python-pipx +``` + +Ensure pipx is in PATH and reload the shell + +```bash +pipx ensurepath && exec $SHELL +``` + +While we always advise to refer to the [official documentation](https://docs.docker.com/engine/install/), the following one-liner can be used to install Docker quickly. + +```bash +sudo pacman -Syu docker +``` + +> [!WARNING] +> Docker "[Rootless mode](https://docs.docker.com/engine/security/rootless/)" is not supported by Exegol as of yet. Don't follow that part. + +Once docker is installed, it needs to be started. + +```bash +# start docker +sudo systemctl start docker + +# configure docker to start at boot +sudo systemctl enable --now docker +``` + +## 2. Wrapper install + +Install Exegol in an isolated environment using [pipx](https://pypa.github.io/pipx/), a tool that allows you to easily install and run Python applications in isolated environments, keeping them separate from your system Python and other packages. + +```bash +pipx install exegol +``` + +Before using Exegol, you will need to read and accept the [End User License Agreement (EULA)](/legal/eula). This will be prompted on the first run of the wrapper, and until it's confirmed. + +To interact with docker, the wrapper needs proper permissions. You must either run Exegol with sudo (preferred), or have your user be a member of the docker group (which dangerously allows your user to basically have root permissions all the time). + +The following command shows how to do that with bash, but it can be adapted to any shell. Once the alias is set, you can apply it your current session. + +Add the following alias to your `~/.bashrc` file: + +```bash +echo "alias exegol='sudo -E \$HOME/.local/bin/exegol'" >> ~/.bashrc && source ~/.bashrc +``` + +## 3. The rest + +Once the requirements are installed, the main installation documentation can be followed, from [step "3. Activation"](/first-install#_3-activation). + +## 3.1. Graphical apps + +To enable graphical applications inside containers (like Firefox, BloodHound, or BurpSuite) to connect to your X11 session, you need to install `xorg-xhost` and grant some access. + +First, install xorg-xhost: + +```bash +sudo pacman -S xorg-xhost +``` + +Then, grant access to the local root user (used by Exegol or Docker) + +```shell +xhost +si:localuser:root +``` \ No newline at end of file diff --git a/docs/src/install/on-fedora.md b/docs/src/install/on-fedora.md new file mode 100644 index 00000000..6060f2cb --- /dev/null +++ b/docs/src/install/on-fedora.md @@ -0,0 +1,135 @@ +# Installing Exegol on Fedora + +> [!NOTE] +> This page was brought to you by a community member and wasn't "mass-tested" yet. Feedback on whether it works properly (or not) would be greatly appreciated (please head over to our Discord server for that). + +Exegol is installed through two main steps: + +1. Install the Python wrapper (the "brains") +2. Install at least one Exegol image (the "muscle") + +> [!WARNING] +> SELinux is usually enabled by default on Fedora and is not supported by Exegol (yet). You may need to disable it on Docker, or set it to permissive mode for Exegol to work properly. Refer to the [Configure SELinux](#configure-selinux) part down at the bottom if needed. + +## 1. Requirements + +Git, Python3 and Pipx can be installed with the following command: + +```bash +sudo dnf -y update && sudo dnf -y install git python3 pipx +``` + +Ensure pipx is in PATH and reload the shell + +```bash +pipx ensurepath && exec $SHELL +``` + +While we always advise to refer to the [official documentation](https://docs.docker.com/engine/install/), the following one-liner can be used to install Docker quickly. + +```bash +curl -fsSL "https://get.docker.com/" | sh +``` + +> [!WARNING] +> Docker "[Rootless mode](https://docs.docker.com/engine/security/rootless/)" is not supported by Exegol as of yet. Don't follow that part. + +Once docker is installed, it needs to be started. + +```bash +# start docker +sudo systemctl start docker + +# configure docker to start at boot +sudo systemctl enable --now docker +``` + +## 2. Wrapper install + +Install Exegol in an isolated environment using [pipx](https://pypa.github.io/pipx/), a tool that allows you to easily install and run Python applications in isolated environments, keeping them separate from your system Python and other packages. + +```bash +pipx install exegol +``` + +Before using Exegol, you will need to read and accept the [End User License Agreement (EULA)](/legal/eula). This will be prompted on the first run of the wrapper, and until it's confirmed. + +To interact with docker, the wrapper needs proper permissions. You must either run Exegol with sudo (preferred), or have your user be a member of the docker group (which dangerously allows your user to basically have root permissions all the time). + +The following command shows how to do that with bash, but it can be adapted to any shell. Once the alias is set, you can apply it your current session. + +Add the following alias to your `~/.bashrc` file: + +```bash +echo "alias exegol='sudo -E \$HOME/.local/bin/exegol'" >> ~/.bashrc && source ~/.bashrc +``` + +## 3. The rest + +Once the requirements are installed, the main installation documentation can be followed, from [step "3. Activation"](/first-install#_3-activation). + +## Configure SELinux + +Create the following files + +::: code-group + + +```te [exegol_bint.te] +module exegol_bint 1.0; + +require { + type container_t; + type bin_t; + class dir { create write getattr search open add_name }; + class file { create write getattr open execute }; +} + +# Allow container to perform all operations on directories labeled as bin_t +allow container_t bin_t:dir { create write getattr search open add_name }; + +# Allow container to perform all operations on files labeled as bin_t +allow container_t bin_t:file { create write getattr open execute }; +``` + +```te [exegol_home.te] +module exegol_home 1.0; + +require { + type container_t; + type data_home_t; + class file { ioctl entrypoint open execute read write getattr }; +} + +#============= container_t ============== +allow container_t data_home_t:file { ioctl entrypoint open execute read write getattr }; +``` + +```te [exegol_connectto.te] +module exegol_connectto 1.0; + +require { + type container_t; + type unconfined_t; + class unix_stream_socket { connectto }; +} + +# Allow container to perform connectto operation on unix_stream_socket +allow container_t unconfined_t:unix_stream_socket { connectto }; +``` +::: + +Run the following commands +``` +checkmodule -M -m -o exegol_bint.mod exegol_bint.te +semodule_package -o exegol_bint.pp -m exegol_bint.mod +sudo semodule -i exegol_file-bint.pp + +checkmodule -M -m -o exegol_home.mod exegol_home.te +semodule_package -o exegol_home.pp -m exegol_home.mod +sudo semodule -i exegol_home.pp + +checkmodule -M -m -o exegol_ connectto.mod exegol_connectto.te +semodule_package -o exegol_connectto.pp -m exegol_connectto.mod +sudo semodule -i exegol_connectto.pp +``` \ No newline at end of file diff --git a/docs/src/install/on-gentoo.md b/docs/src/install/on-gentoo.md new file mode 100644 index 00000000..362108e8 --- /dev/null +++ b/docs/src/install/on-gentoo.md @@ -0,0 +1,129 @@ +# Installing Exegol on Gentoo + +> [!NOTE] +> This page was brought to you by a community member and wasn't "mass-tested" yet. Feedback on whether it works properly (or not) would be greatly appreciated (please head over to our Discord server for that). + +# Installing Exegol on Gentoo + +Exegol is installed through two main steps: + +1. Install the Python wrapper (the "brains") +2. Install at least one Exegol image (the "muscle") + +## 1. Requirements + +Git, Python3 and Pipx can be installed with the following command: + + +```bash +sudo emerge --ask dev-vcs/git +``` + +```bash +sudo emerge --ask dev-lang/python +``` + +```bash +sudo emerge --ask dev-python/pip +``` + +Install pipx inside a virtual environment (required on Gentoo): + +```bash +python3 -m venv ~/myenv +source ~/myenv/bin/activate +pip install pipx +``` + +Ensure pipx is in PATH and reload the shell (inside myenv): + +```bash +pipx ensurepath && exec $SHELL +``` + +Then install the Exegol wrapper (inside myenv): + +```bash +pipx install exegol +``` + + +>You can choose any directory for the virtual environment. This method works well for installing both pipx and Exegol on Gentoo. + +Create a shortcut to run Exegol with `sudo` while keeping your user environment: + +```bash +echo "alias exegol='sudo -E \$HOME/.local/bin/exegol'" >> ~/.bashrc && source ~/.bashrc +``` + +## 1.2. Installing Docker + +While we recommend referring to the official [Gentoo Wiki](https://wiki.gentoo.org/wiki/Docker) for full details, the following commands can be used to install and configure Docker on Gentoo. + + +Install Docker and CLI tools: + +```bash +sudo emerge --ask --verbose app-containers/docker app-containers/docker-cli +``` + +Check kernel compatibility: + +```bash +/usr/share/docker/contrib/check-config.sh +``` + +Start Docker (choose according to your init system): + +###### With systemd: + +```bash +# start docker +sudo systemctl start docker.service + +# configure docker to start at boot +sudo systemctl enable docker.service +``` + +###### With openrc: + +After Docker has been successfully installed and configured, it can be added to the system's default runlevel, starting it at boot: + +```bash +rc-update add docker default +rc-service docker start +``` + +If you need the Docker registry: + +```bash +rc-update add registry default +rc-service registry start +``` + + +> [!WARNING] +> Docker "[Rootless mode](https://docs.docker.com/engine/security/rootless/)" is not supported by Exegol as of yet. Don't follow that part. + +## 2. The rest + +Once the requirements are installed, the main installation documentation can be followed, from [step "2. Wrapper install"](/first-install#_2-wrapper-install). + +## 3.1. Graphical apps + +To enable graphical applications inside containers (like Firefox, BloodHound, or BurpSuite) to connect to your X11 session, you need to install `xorg-xhost` and grant some access. + +```bash +sudo emerge --ask x11-apps/xhost +``` + +Outsite the container: + +```bash +xhost +local: +``` + +Inside the container: +```bash +export DISPLAY=:0 +``` \ No newline at end of file diff --git a/docs/src/install/on-nixos.md b/docs/src/install/on-nixos.md new file mode 100644 index 00000000..40b7ee8f --- /dev/null +++ b/docs/src/install/on-nixos.md @@ -0,0 +1,55 @@ +# Installing Exegol on NixOS + +> [!NOTE] +> This page was brought to you by a community member and wasn't "mass-tested" yet. Feedback on whether it works properly (or not) would be greatly appreciated (please head over to our Discord server for that). + +Exegol is installed through two main steps: + +1. Install the Python wrapper (the "brains") +2. Install at least one Exegol image (the "muscle") + +## 1. Requirements + +`git`, `python3`, `pipx`, and the Docker engine can be installed by editing your NixOS configuration: + +```bash +sudo nano /etc/nixos/configuration.nix +``` + +Add the following lines (or merge with your existing configuration): + +```bash + environment.systemPackages = with pkgs; [ + git + python3 + pipx + ]; + virtualisation.docker = { + enable = true; + }; + +``` + +Save the file with [CTRL] + [O], press [ENTER], and exit with [CTRL] + [X]. + +Then apply the changes: + +```bash +sudo nixos-rebuild switch +``` + +Ensure `pipx` is in PATH and reload the shell + +```bash +pipx ensurepath && exec $SHELL +``` + +While we always advise to refer to the [official documentation](https://docs.docker.com/engine/install/) + + +> [!WARNING] +> Docker "[Rootless mode](https://docs.docker.com/engine/security/rootless/)" is not supported by Exegol as of yet. Don't follow that part. + +## 2. The rest + +Once the requirements are installed, the main installation documentation can be followed, from [step "2. Wrapper install"](/first-install#_2-wrapper-install). diff --git a/docs/src/install/on-opensuse.md b/docs/src/install/on-opensuse.md new file mode 100644 index 00000000..655ab3e7 --- /dev/null +++ b/docs/src/install/on-opensuse.md @@ -0,0 +1,66 @@ +# Installing Exegol on openSUSE + +> [!NOTE] +> This page was brought to you by a community member and wasn't "mass-tested" yet. Feedback on whether it works properly (or not) would be greatly appreciated (please head over to our Discord server for that). + +Exegol is installed through two main steps: + +1. Install the Python wrapper (the "brains") +2. Install at least one Exegol image (the "muscle") + +## 1. Requirements + +Git, Python3 and Pipx can be installed with the following command: + +```bash +sudo zypper refresh && sudo zypper install -y git python3 python313-pipx +``` + +Ensure pipx is in PATH and reload the shell + +```bash +pipx ensurepath && exec $SHELL +``` + +While we always advise to refer to the [official documentation](https://docs.docker.com/engine/install/), the following one-liner can be used to install Docker quickly. + +```bash +sudo zypper install -y docker +``` + +> [!WARNING] +> Docker "[Rootless mode](https://docs.docker.com/engine/security/rootless/)" is not supported by Exegol as of yet. Don't follow that part. + +Once docker is installed, it needs to be started. + +```bash +# start docker +sudo systemctl start docker + +# configure docker to start at boot +sudo systemctl enable --now docker +``` + +## 2. Wrapper install + +Install Exegol in an isolated environment using [pipx](https://pypa.github.io/pipx/), a tool that allows you to easily install and run Python applications in isolated environments, keeping them separate from your system Python and other packages. + +```bash +pipx install exegol +``` + +Before using Exegol, you will need to read and accept the [End User License Agreement (EULA)](/legal/eula). This will be prompted on the first run of the wrapper, and until it's confirmed. + +To interact with docker, the wrapper needs proper permissions. You must either run Exegol with sudo (preferred), or have your user be a member of the docker group (which dangerously allows your user to basically have root permissions all the time). + +The following command shows how to do that with bash, but it can be adapted to any shell. Once the alias is set, you can apply it your current session. + +Add the following alias to your `~/.bashrc` file: + +```bash +echo "alias exegol='sudo -E \$HOME/.local/bin/exegol'" >> ~/.bashrc && source ~/.bashrc +``` + +## 3. The rest + +Once the requirements are installed, the main installation documentation can be followed, from [step "3. Activation"](/first-install#_3-activation). \ No newline at end of file diff --git a/docs/src/legal/cookie-policy.md b/docs/src/legal/cookie-policy.md new file mode 100644 index 00000000..67455325 --- /dev/null +++ b/docs/src/legal/cookie-policy.md @@ -0,0 +1,66 @@ +# Cookie policy + +## 1. What are cookies? + +Cookies are small text files stored on your device when you visit websites. They help remember your preferences and enable certain site functionalities. + +## 2. Types of cookies we use + +Execorp uses the following types of cookies on exegol.com and related domains: + +### 2.1 Necessary cookies + +These cookies are essential for the proper functioning of our websites: +- Authentication cookies: to verify your identity and secure your account +- Session cookies: to maintain your logged-in state +- Basic functionality cookies: to ensure core website features work correctly + +These cookies are strictly necessary for the operation of our services and cannot be disabled without affecting your ability to use our websites. + +### 2.2 Functional cookies + +These cookies enable enhanced features and personalization: +- Preference cookies: to remember your settings and choices +- Language and region cookies: to remember your preferred locale +- Customization cookies: to remember how you've customized our services + +Functional cookies improve your user experience but are not essential for the basic operation of our websites. + +### 2.3 Analytics cookies + +We use analytics cookies to understand how visitors interact with our site: +- Usage cookies: to understand which pages are visited and how users navigate +- Performance cookies: to help us improve site performance and usability +- Attribution cookies: to understand how users discover our services + +These tools help us measure and improve our offerings and user experience. + +## 3. Third-party cookies + +Some cookies may be set by third parties when you use our services: +- Payment processors (Stripe) +- Analytics providers (Google Analytics, Plausible) +- Content delivery networks (Cloudflare) + +Please note that these third parties have their own privacy policies and cookie practices over which we have limited control. + +## 4. Cookie management + +Most web browsers allow you to control cookies through their settings. You can: +- Block cookies entirely +- Delete existing cookies +- Set preferences for different websites + +Please note that blocking cookies may impact functionality of our services. + +You can also use opt-out tools provided by analytics services: +- [Google Analytics Opt-out Browser Add-on](https://tools.google.com/dlpage/gaoptout) +- [Plausible Analytics data policy](https://plausible.io/data-policy) + +## 5. Updates to this policy + +We may update this cookie policy from time to time. Significant changes will be communicated to users as appropriate, such as through a notification in your account or by email. + +## 6. Contact + +If you have questions about our cookie practices, please contact [contact@exegol.com](mailto:contact@exegol.com). \ No newline at end of file diff --git a/docs/src/legal/eula.md b/docs/src/legal/eula.md new file mode 100644 index 00000000..871f7df0 --- /dev/null +++ b/docs/src/legal/eula.md @@ -0,0 +1,95 @@ +# End user license agreement (EULA) + +This End User License Agreement ("Agreement") is entered into between Execorp SAS, headquartered at 122 rue Amelot, 75011 Paris, France ("Execorp"), and the user ("You") who downloads, installs, accesses, or uses any part of the Exegol software, images, scripts, or associated resources ("Software"). + +By downloading, installing, accessing, or using the Software, You agree to be bound by this Agreement. + +If You do not agree to the terms of this Agreement, You must not use the Software. + +## 1. License grant + +Subject to Your compliance with this Agreement, Execorp grants You a personal, limited, non-exclusive, non-transferable, revocable license to install and use the Software solely: +- For lawful purposes +- In accordance with the permitted usage defined in your subscription plan (Community, Pro, Enterprise) +- On a non-commercial basis under the Community plan +- Or on a commercial basis if You have an active Pro or Enterprise subscription + +No ownership rights are granted to You. Execorp retains all rights not expressly granted under this Agreement. + +### 1.1 Internet connectivity and license verification + +Some components of the Software, including the command-line wrapper used to manage modules and environments, require periodic access to the Internet to verify the validity of the associated license. + +You acknowledge that the Software is designed to perform regular license checks and may attempt to connect to Execorp’s servers for this purpose. + +While temporary offline use is allowed and supported (e.g., in isolated environments), You agree that the system on which the Software is installed must reconnect to the Internet periodically in order to restore license verification. Extended use of the Software in offline mode without license validation may lead to automatic deactivation of certain features or the entire Software, at Execorp’s discretion. + +This requirement may not apply to certain Enterprise licenses, on a case-by-case basis, where a dedicated wrapper version is distributed by Execorp to the licensed company. + +## 2. License restrictions + +You agree that You will not: +- Copy, distribute, sell, sublicense, lease, or otherwise transfer the Software to any third party +- Modify, adapt, create derivative works from, or translate the Software +- Reverse engineer, decompile, disassemble, or otherwise attempt to discover the source code of the Software, except as expressly permitted by applicable law and then only after prior written notice to Execorp +- Remove, obscure, or alter any proprietary notices, labels, or marks on the Software +- Use the Software for illegal activities or unauthorized penetration testing without explicit consent +- Use the Software in any manner that infringes the intellectual property rights or other rights of Execorp or any third party + +## 3. Commercial use + +Commercial use of the Software, including but not limited to: +- Using the Software in a professional or revenue-generating environment +- Providing services to third parties + +requires an active Pro or Enterprise subscription purchased from Execorp. + +Use of the Community (i.e., free) plan is strictly limited to personal, non-commercial, educational, or research purposes. + +## 4. Intellectual property rights + +All rights, titles, and interests in and to the Software, including any intellectual property rights therein, are and will remain the exclusive property of Execorp and its licensors. + +This Agreement does not grant You any rights to trademarks or service marks of Execorp. + +## 5. Updates and modifications + +Execorp may, at its sole discretion, release updates, patches, or new versions of the Software. + +This Agreement will govern any such updates unless expressly replaced by a different license agreement accompanying the updated version. + +Execorp reserves the right to discontinue or modify the Software at any time without liability. + +## 6. Termination + +This Agreement is effective until terminated. + +It will terminate automatically without notice if You breach any term of this Agreement. Upon termination, You must immediately cease all use of the Software and destroy all copies in Your possession or control. + +Execorp may also terminate this Agreement at its discretion if it decides to cease providing the Software. + +## 7. Disclaimer of warranties + +The Software is provided "as is" without warranties of any kind, express or implied. + +Execorp expressly disclaims any implied warranties of merchantability, fitness for a particular purpose, non-infringement, or accuracy. + +Execorp does not warrant that the Software will operate uninterrupted or be error-free. + +## 8. Limitation of liability + +To the fullest extent permitted by applicable law, in no event will Execorp be liable for any indirect, incidental, special, consequential, or punitive damages arising out of or related to Your use of the Software. + +Execorp's total cumulative liability arising from or related to this Agreement and the Software shall not exceed the amount You paid (if any) for a license during the twelve (12) months prior to the event giving rise to liability. + +If You use the Software under the Community plan, Execorp assumes no liability. + +## 9. Governing law and jurisdiction + +This Agreement shall be governed by the laws of France. + +Any dispute arising out of or related to this Agreement will be submitted to the exclusive jurisdiction of the courts located in Paris, France. + +## 10. Contact + +For any inquiries related to this Agreement or the Software, You may contact: [contact@exegol.com](mailto:contact@exegol.com) \ No newline at end of file diff --git a/docs/src/legal/legal-notice.md b/docs/src/legal/legal-notice.md new file mode 100644 index 00000000..ae2cd8b6 --- /dev/null +++ b/docs/src/legal/legal-notice.md @@ -0,0 +1,35 @@ +# Legal notice + +## 1. Website publisher + +The website [https://exegol.com](https://exegol.com) and all its subdomains are published by Execorp, a Simplified Joint Stock Company (SAS) with a capital of 10,000 euros, registered in the "Tribunal des Activités Économiques de Paris" under SIREN number 944 256 536. Registered office: 122 rue Amelot, 75011 Paris, France. Contact email: [contact@exegol.com](mailto:contact@exegol.com) + +## 2. Publishing director + +The publishing director is the President of Execorp, namely MONKEY 513, a Single-Person Simplified Joint Stock Company (SASU), registered under SIREN number 932 547 367, with its registered office at 122 rue Amelot, 75011 Paris, France. + +## 3. Hosting + +The website [https://exegol.com](https://exegol.com) and all its subdomains are primarily hosted by Cloudflare, Inc., 101 Townsend St, San Francisco, CA 94107, United States. Website: [https://www.cloudflare.com](https://www.cloudflare.com) + +Certain data, particularly user databases, are stored by Supabase, Inc., 970 Toa Payoh North, #07-04, Singapore 318992. Website: [https://supabase.com](https://supabase.com). The database itself is in France. + +## 4. Intellectual property + +All elements appearing on the exegol.com website and its subdomains (texts, images, logos, software, databases, etc.) are protected by current intellectual property laws and are the exclusive property of Execorp, unless otherwise stated. + +Any reproduction, representation, modification, publication, transmission, distortion, in whole or in part, of the website or its content, by any means whatsoever, is prohibited without the express prior authorization of Execorp. + +## 5. Liability + +Execorp strives to provide as accurate information as possible on its websites. However, Execorp cannot be held responsible for omissions, inaccuracies, or deficiencies in updates, whether caused by itself or by third-party partners who provide this information. + +Execorp cannot be held responsible for any material or immaterial damage caused by the use of the websites or its services, particularly in case of unlawful use by users. + +## 6. Website usage + +The use of exegol.com and its subdomains implies full and complete acceptance of these legal notices. + +## 7. Applicable law + +These legal notices are governed by French law. Any dispute relating to the use of the website shall be subject to the exclusive jurisdiction of the courts of Paris. \ No newline at end of file diff --git a/docs/src/legal/open-source-components.md b/docs/src/legal/open-source-components.md new file mode 100644 index 00000000..fa82e244 --- /dev/null +++ b/docs/src/legal/open-source-components.md @@ -0,0 +1,52 @@ +# Open source components + +## 1. Third-party open source components + +Exegol integrates various open source components, libraries, and tools. We acknowledge and thank the developers and contributors of these projects for their valuable work. + +The following is a non-exhaustive list of the primary open source components used in Exegol: + +### 1.1 Core technologies + +- **Docker**: [Apache License 2.0](https://github.com/moby/moby/blob/master/LICENSE) +- **Python**: [Python Software Foundation License](https://docs.python.org/3/license.html) +- **Debian**: [Various licenses](https://www.debian.org/legal/licenses/) + +### 1.2 Web and frontend components + +- **React**: [MIT License](https://github.com/facebook/react/blob/main/LICENSE) +- **NextJS**: [MIT License](https://github.com/vercel/next.js/blob/canary/license.md) +- **Tailwind CSS**: [MIT License](https://github.com/tailwindlabs/tailwindcss/blob/master/LICENSE) + +### 1.3 Backend and infrastructure + +- **Supabase**: [Apache License 2.0](https://github.com/supabase/supabase/blob/master/LICENSE) +- **PostgreSQL**: [PostgreSQL License](https://www.postgresql.org/about/licence/) +- **Nginx**: [BSD 2-Clause License](https://nginx.org/LICENSE) + +### 1.4 Security tools and libraries + +For a complete and up-to-date list of security tools included in Exegol, please refer to [the tools list](/images/tools). + +## 2. License compliance + +Execorp strives to ensure compliance with all open source licenses. This includes: + +- Preserving original copyright notices and license texts +- Providing attribution where required +- Making source code available when required by licenses +- Respecting the terms of copyleft licenses + +## 3. Third-party license notifications + +The complete license texts for the above components can be found in their respective repositories or websites. + +If you believe any component is not properly attributed or is used in a way that violates its license terms, please contact us at [contact@exegol.com](mailto:contact@exegol.com). + +## 4. Contributing to open source + +Execorp believes in the value of open source software and contributes back to the community when possible. Some components of Exegol may be released under open source licenses as detailed in our software license policy. + +## 5. Updates to this information + +This list of open source components may be updated from time to time as dependencies change or new components are integrated into Exegol. We recommend checking this document periodically for the most current information. \ No newline at end of file diff --git a/docs/src/legal/privacy-policy.md b/docs/src/legal/privacy-policy.md new file mode 100644 index 00000000..4f761f0f --- /dev/null +++ b/docs/src/legal/privacy-policy.md @@ -0,0 +1,101 @@ +# Privacy policy + +## 1. Data controller + +The data controller for the data collected on exegol.com and its subdomains is: +Execorp, SAS with a capital of 10,000 euros, whose registered office is located at 122 rue Amelot, 75011 Paris, France. +Contact email: [contact@exegol.com](mailto:contact@exegol.com) + +## 2. Data collected + +In the context of using our sites and services, Execorp may collect the following data: +- Email address +- Username chosen by the user +- Information related to licenses and subscriptions +- Activity logs and action history +- Referral information +- Information related to roles and teams (for Enterprise subscriptions) + +Payment data is processed directly by our provider Stripe and is not stored by Execorp. + +## 3. Purposes of processing + +The collected data is used for: +- Providing subscribed services (account management, licenses, subscriptions) +- Managing access to specific features (Learning Center, support, private channels) +- Improving service functionality and ensuring platform security +- Informing users of important updates +- Facilitating referral program management + +## 4. Legal basis for processing + +Data processing is based on: +- Contract execution (acceptance of Terms of Service) +- Execorp's legitimate interest (service improvement, security) +- Compliance with legal obligations + +## 5. Data recipients + +The collected data is strictly intended for Execorp and its technical subcontractors: +- Cloudflare (hosting) +- Supabase (data storage) +- Stripe (payment) +- Discord (community management related to certain features) + +Execorp does not sell or rent your data to third parties. + +## 6. Data retention period + +Data is retained: +- As long as the user account is active +- Then archived for a maximum period of 5 years after account closure for evidence and legal compliance purposes + +Technical logs are retained for 12 months. + +## 7. Data security + +Execorp implements all appropriate technical and organizational measures to protect personal data against any destruction, loss, alteration, disclosure, or unauthorized access. + +## 8. Transfers outside the European Union + +Some providers are located outside the European Union (notably Cloudflare and Supabase). +Execorp ensures that appropriate safeguards are in place, such as adherence to the Data Privacy Framework or standard contractual clauses approved by the European Commission. + +## 9. User rights + +In accordance with applicable regulations, users have the following rights: +- Right of access +- Right to rectification +- Right to erasure +- Right to object +- Right to restriction of processing +- Right to data portability + +To exercise these rights, users can send a request to: [contact@exegol.com](mailto:contact@exegol.com) + +## 10. Data breach notification + +In the event of a personal data breach (as defined by the GDPR), Execorp commits to: + +- Notify the relevant supervisory authority (CNIL in France) within 72 hours of becoming aware of the breach, unless the breach is unlikely to result in a risk to individuals' rights and freedoms +- Assess the potential impact and risk level for affected users +- Directly notify affected users without undue delay when the breach is likely to result in a high risk to their rights and freedoms +- Provide affected users with information about: + - The nature of the breach + - Categories of personal data affected + - Likely consequences + - Measures taken to address the breach and mitigate potential adverse effects + - Contact information for further inquiries +- Document all breaches, their effects, and remedial actions taken + +We will communicate through email, account notifications, or other direct means as appropriate, depending on the circumstances of the breach. + +## 11. GDPR compliance + +Execorp processes personal data in accordance with the General Data Protection Regulation (GDPR - Regulation (EU) 2016/679). +Users also have the right to lodge a complaint with the competent supervisory authority, the CNIL (Commission Nationale de l'Informatique et des Libertés), accessible via the website: [www.cnil.fr](https://www.cnil.fr). + +## 12. Modifications + +Execorp reserves the right to modify this privacy policy at any time. +Any substantial modification will be communicated to users through appropriate means, including notification in their personal space. \ No newline at end of file diff --git a/docs/src/legal/security-policy.md b/docs/src/legal/security-policy.md new file mode 100644 index 00000000..7ef1cbc8 --- /dev/null +++ b/docs/src/legal/security-policy.md @@ -0,0 +1,64 @@ +# Security policy + +At Execorp, the security of the Exegol suite and the protection of our users are our top priorities. We are committed to implementing all necessary measures to secure our systems. However, no technology is completely free from vulnerabilities. + +If you discover a vulnerability or security issue, we encourage you to report it responsibly so we can address it as quickly as possible. Your assistance is crucial in helping us protect all our users. + +## 1. Scope + +This responsible disclosure program covers all Exegol-related services and products unless expressly stated otherwise. + +The following is a non-exhaustive list of examples considered out of scope: + +- Clickjacking on pages without sensitive actions +- CSRF on login, logout, or any unauthenticated actions +- Attacks requiring physical access or traffic interception (MITM) +- Social engineering attacks +- Denial of Service (DoS) attempts +- Spoofing or content injection issues without concrete security impact +- Absence of DNSSEC, CAA, or CSP headers +- Missing Secure or HttpOnly flags on non-sensitive cookies +- Dead links +- User enumeration without significant impact + +## 2. Testing rules + +- Do not perform mass automated scans on our platforms or those of other users +- Any automated or intensive testing activity must be pre-approved by Execorp +- Please contact us before initiating any such activities +- Do not access, alter, or destroy other users' data +- Do not continue exploitation beyond what is strictly necessary to demonstrate the existence of the issue + +## 3. How to report a vulnerability + +Please contact us primarily through our dedicated email address: [contact@exegol.com](mailto:contact@exegol.com) + +When reporting, please: +- Provide a clear description of the issue +- Include precise reproduction steps if possible +- Attach screenshots or proof-of-concept scripts if available + +### 4. Important notes + +- Execorp does not systematically monitor its spam folders +- It is the sender's responsibility to ensure proper message delivery (sending parameters, headers, anti-spam measures) +- Consequently, Execorp cannot be held responsible for unreceived reports or those filtered as spam +- We commit to responding to received reports within a maximum of 5 business days + +## 5. Publication and public disclosure + +Please do not publicly disclose the vulnerability before we have had time to analyze and fix it. + +If you wish to publish your research (conference, blog, etc.), please submit a draft at least 30 days before publication. + +Any public communication must not reveal: +- Exegol user data +- Internal information regarding Execorp, its partners, employees, or sensitive infrastructure + +## 6. Our commitments + +- We will handle your report confidentially +- We will keep you informed of the analysis progress and measures taken +- If you wish, we can publicly acknowledge you as a security contributor +- If your approach respects this policy, we will not take any legal action against you +- We make every effort to quickly fix reported issues and greatly appreciate your contribution to our ecosystem's security diff --git a/docs/src/legal/software-license.md b/docs/src/legal/software-license.md new file mode 100644 index 00000000..3997b4ea --- /dev/null +++ b/docs/src/legal/software-license.md @@ -0,0 +1,112 @@ +# Exegol Software License (ESL) - Version 1.0 + +## Preamble + +The Exegol software suite ("Exegol") is developed by Execorp to serve the needs of cybersecurity professionals. While certain elements of the source code, scripts, documentation, or containers may be made publicly accessible, such availability is intended to foster transparency, community trust, and collaboration. + +This public access does not imply a waiver of Execorp's intellectual property rights, nor does it authorize unrestricted or commercial use of the software. + +### License Transition and GPL3 Coexistence + +Exegol is transitioning from the GNU General Public License version 3 (GPL3) to the Execorp Software License (ESL). This transition is governed by the following rules: + +- All code released prior to June 5th, 2025 remains under GPL3 (i.e., [GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007](https://www.gnu.org/licenses/gpl-3.0.en.html)) +- Code released since June 5th, 2025 (the start date of this dual-license mechanism) will be under either: + - The Exegol Software License (ESL) + - or GPL3 (if it contains or is derived from GPL3-licensed code) + +## 1. Definitions + +- **Execorp**: company publishing Exegol +- **Exegol**: all software, scripts, Docker images, documentation, and associated content published by Execorp under this name +- **User**: any individual or legal entity accessing or using Exegol +- **Non-commercial use**: use without direct or indirect purpose of generating revenue or providing third-party services +- **Commercial use**: use of Exegol as a tool within a business context for the user's own operations, such as professional activities, internal training, or security operations +- **Commercial exploitation**: any activity that uses Exegol as a basis for generating revenue or providing services to third parties, including but not limited to maintenance, support, managed services, repackaging, or reselling +- **Subscription**: a monthly or yearly renewed purchase (Pro or Enterprise) that permits commercial use of Exegol under the terms of this license + +## 2. Intellectual property + +Exegol is and remains the exclusive property of Execorp. All rights not expressly granted by this license are reserved. + +The public availability of part of the source code does not confer any right of use, modification, reproduction, or distribution outside the conditions provided by this license. + +## 3. Granted rights + +### 3.1 Non-commercial use + +Execorp grants the user a free, personal, non-exclusive, non-transferable, and revocable license to use Exegol for strictly non-commercial purposes, such as: +- Academic research +- Individual learning +- Participation in cybersecurity competitions (CTF, hackathons) + +### 3.2 Commercial Use and Exploitation + +#### 3.2.1 Allowed Commercial Use (with subscription) +With a valid subscription (Pro or Enterprise), you are permitted to use Exegol in a commercial context for your own business operations (e.g., technical assessments, penetration test, bug bounty, research), such as: +- Using Exegol as part of your professional activities +- Using Exegol in your business or enterprise environment +- Using Exegol for internal training or documentation +- Using Exegol as part of your security operations + +#### 3.2.2 Prohibited Commercial Exploitation +The following activities are strictly prohibited, even with a valid subscription, as they constitute commercial exploitation of Exegol. These activities require a specific written agreement with Execorp: + +- Providing maintenance, support, or managed services on Exegol products +- Repackaging or redistributing Exegol as part of another product or service +- Using Exegol as a dependency in commercial software or services +- Providing Exegol as part of a commercial infrastructure or platform +- Creating derivative works or modifications of Exegol for commercial purposes +- Reselling or sublicensing Exegol in any form + +In simple terms: You may use Exegol commercially for your own business needs with a subscription, but you may not build a business around Exegol itself without a specific agreement. + +Any violation of these prohibitions may lead to legal action and immediate termination of the license. + +### 3.3 Specific limitation for Pro subscription + +An individual user holding a Pro subscription is authorized to activate up to two installations (e.g., two personal machines). Beyond this, an Enterprise subscription is mandatory. + +## 4. Restrictions + +The user is prohibited from: +- Redistributing all or part of Exegol without express authorization from Execorp +- Creating derivative works intended for commercial exploitation +- Modifying Exegol to circumvent usage limitations provided by this license +- Using Exegol to develop a competing product + +Any violation of these restrictions will result in immediate termination of the license, without notice. + +## 5. Contributions + +Users who voluntarily contribute to Exegol (code, documentation, ideas, feedback): +- Grant Execorp an irrevocable, worldwide, free, and unlimited right to use, reproduce, modify, publish, or distribute these contributions, and an exclusive right to commercialize it. +- Accept that certain contributions may be subject to a specific intellectual property rights transfer agreement, established case by case by Execorp + +Users further acknowledge and agree that any contribution proposed for inclusion into any official Exegol project (via pull request or equivalent) may be subject to prior technical or legal review. Execorp reserves the right to contact the contributor to negotiate and formalize a written assignment of rights agreement before the contribution is accepted and merged. + +## 6. No warranty + +Exegol is provided "as is", without any warranty, express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, or absence of errors. The user assumes all risks associated with the use of Exegol. + +## 7. Limitation of liability + +To the fullest extent permitted by applicable law, Execorp shall not be liable for: +- Any direct, indirect, special, incidental, or consequential damages +- Any loss of profits, business interruption, loss of data or customers +- Unlawful use of Exegol by third parties + +## 8. Duration + +This license is granted for the entire duration of applicable legal protection, except in case of early termination for non-compliance with its terms. + +## 9. Termination + +The license is automatically terminated in case of violation of the stated terms. Execorp reserves the right to revoke the license for any fraudulent or abusive use. In case of termination: +- The user must immediately cease all use of Exegol +- Any existing subscriptions will be terminated without refund +- Execorp may pursue legal action for any continued unauthorized use + +## 10. Governing law and jurisdiction + +This license is governed by French law. Any dispute relating to its interpretation or application shall be submitted to the exclusive jurisdiction of the courts of Paris. \ No newline at end of file diff --git a/docs/src/legal/summary.md b/docs/src/legal/summary.md new file mode 100644 index 00000000..1fd2fa7a --- /dev/null +++ b/docs/src/legal/summary.md @@ -0,0 +1,53 @@ +--- +icon: scale +--- + +# Legal + +## Terms of Service +- :white_check_mark: **Can:** create account, use Exegol as specified in your plan, cancel anytime +- :x: **Can't:** use for illegal activities, share account credentials, use Community (i.e., free) plan commercially +- :warning: **Must:** be 18+ or supervised by a parent/guardian, comply with export laws +- Read more [here](./terms-of-service.md) + +## End User License Agreement +- :white_check_mark: **Can:** install and use software for personal use, use commercially with Pro/Enterprise plan +- :x: **Can't:** share software with others, modify code, reverse engineer +- :warning: **Important:** no warranty provided, use at your own risk +- Read more [here](./eula.md) + +## Privacy Policy +- :clipboard: **We collect:** email, username, subscription info, activity logs +- :no_entry_sign: **We don't:** sell your data +- :scroll: **We comply:** with GDPR. You can ask for pretty much anything when it comes to your data +- Read more [here](./privacy-policy.md) + +## Cookie Policy +- :cookie: **We use:** necessary cookies (login), functional cookies (preferences), analytics cookies (usage statistics) +- :gear: **You can:** block cookies in your browser, but some features may break +- :globe_with_meridians: **Third parties:** may set their own cookies (Stripe, Google Analytics, Cloudflare) +- Read more [here](./cookie-policy.md) + +## Software License +- :unlock: **Community use:** personal, educational, non-commercial only +- :moneybag: **Commercial use:** requires paid Pro/Enterprise subscription +- :two: **Pro plan limit:** max 2 active licenses per user +- Read more [here](./software-license.md) + +## Open Source Components +- :package: **Contains:** docker, Python, security tools, web components +- :handshake: **We:** respect all open source licenses and provide attribution (or at least do our best to do so) +- :page_facing_up: **Full list:** available in Exegol documentation +- Read more [here](./open-source-components.md) + +## Security Policy +- :bug: **Found a vulnerability?** email contact@exegol.com +- :no_entry: **Don't:** perform automated scans, DoS attacks, exploit beyond proof +- :clock5: **We'll:** respond within 5 business days, not take legal action if you follow rules +- Read more [here](./security-policy.md) + +## Legal Notice +- :office: **Publisher:** Execorp SAS (Paris, France) +- :cloud: **Hosting:** Cloudflare, Supabase +- :copyright: **Rights:** all content is Execorp's property unless stated otherwise +- Read more [here](./legal-notice.md) \ No newline at end of file diff --git a/docs/src/legal/terms-of-service.md b/docs/src/legal/terms-of-service.md new file mode 100644 index 00000000..dac64131 --- /dev/null +++ b/docs/src/legal/terms-of-service.md @@ -0,0 +1,161 @@ +# Terms of service + +Execorp SAS – headquartered at 122 rue Amelot, 75011 Paris, France, and registered under registered in the "Tribunal des Activités Économiques de Paris" under SIREN number 944 256 536, provides services including the Exegol Suite (websites, applications, software) under the following terms. + +By creating an account, subscribing, accessing, or using any part of the Exegol Suite, you agree to these Terms of Service ("Terms"). If you do not accept these Terms, you must not use the Services. + +## 1. Acceptance of terms + +By using any Exegol service (creating an account, using the dashboard, downloading software, purchasing subscriptions), you accept these Terms. Execorp may update these Terms occasionally. Updates will be posted online, and continued use after updates means acceptance. + +Additional policies, such as the Privacy Policy and the Security Policy, are incorporated by reference. + +## 2. Services offered + +Execorp offers the Exegol Suite through several plans: +- **Community plan**: For non-commercial personal use only +- **Pro plan**: Paid, for commercial use by individuals, limited to two active licenses +- **Enterprise plan**: Paid, designed for businesses with floating licenses, team management, and custom options + +Plan and pricing details are available on the public landing page at [exegol.com](https://exegol.com) and may evolve over time. + +## 3. Account creation and security + +Users must create an account to access certain services. You must provide accurate information, keep your credentials secure, and assume responsibility for all activities under your account. + +Execorp encourages the use of strong passwords and two-factor authentication (2FA). If you suspect a security issue with your account, notify [contact@exegol.com](mailto:contact@exegol.com) immediately. + +### 3.1 Age requirements + +Users under the age of 18 may use the Services only with the involvement and supervision of a parent or legal guardian. By using the Services, you confirm that you are at least 18 years old or using the Services under the supervision of a parent or legal guardian who agrees to be bound by these Terms. + +Parents or legal guardians are responsible for ensuring minors under their supervision use the Services responsibly and in accordance with all applicable laws and these Terms. + +## 4. Acceptable use + +You agree to use the Services lawfully and appropriately. Forbidden actions include (but are not limited to): +- Attempting unauthorized access to systems +- Using the Services to conduct illegal activities +- Attempting to disrupt or overload Exegol systems +- Circumventing any usage restrictions (especially for Community plan users) + +Unauthorized vulnerability scanning or penetration testing against Exegol infrastructure is forbidden without prior written consent. + +## 5. Subscription and payment terms + +Pricing is dynamically displayed based on your browser's locale settings or Stripe's automatic detection. The actual billing currency and VAT, where applicable, will be clearly indicated at checkout. + +Subscriptions are billed via Stripe: +- Monthly or annually, depending on the selected plan +- Automatic renewal unless cancelled before the billing date + +VAT is calculated based on your billing address and applicable regulations. Business customers in the EU must provide a valid VAT number if eligible. + +If payment fails, Execorp reserves the right to suspend or terminate access to the Services. + +Execorp may modify prices, billing models, or features. Changes affecting existing subscriptions will be communicated in advance. + +## 6. Referral program + +Execorp may offer a referral program to Pro users. Referrals can grant rewards or discounts according to the rules available on [exegol.com](https://exegol.com). + +Execorp reserves the right to modify or discontinue the referral program without notice. Abuse of the program may result in disqualification and account suspension. Rewards are not exchangeable for cash unless explicitly stated. + +## 7. Right of withdrawal + +For EU/EEA consumers: By subscribing and accessing digital Services immediately, you acknowledge that you waive your legal right of withdrawal under Article L221-28 of the French Consumer Code. + +Execorp reminds users that subscriptions start immediately upon purchase. No "cooling-off" period applies after accessing paid features. + +## 8. Cancellation and termination + +You can cancel your subscription at any time through your account settings. Cancellation takes effect at the end of the current billing period. + +Execorp may suspend or terminate accounts: +- For breach of these Terms +- If legally required +- In case of security threats or misuse + +Upon termination, you lose access to Services, and no refunds are owed except as required by law. + +## 9. Intellectual property + +All software, documentation, trademarks, graphics, and other content related to the Exegol Suite are the property of Execorp or its licensors. + +You receive a personal, limited, non-exclusive, non-transferable license to use the Services, subject to compliance with these Terms. + +You may not copy, sell, distribute, reverse-engineer, or create derivative works based on the Services without express written permission. + +Feedback or suggestions you submit may be freely used by Execorp without compensation. + +## 10. Export control compliance + +You acknowledge that the Services may be subject to export control laws and regulations. You agree not to export, re-export, or transfer the Services to countries, persons, or entities prohibited under applicable export control laws. + +You represent and warrant that: +- You are not located in, under the control of, or a national or resident of any country subject to U.S. or EU embargo, UN sanctions, or other applicable trade sanctions +- You are not on any list of prohibited or restricted parties +- You will not use the Services for any purposes prohibited by applicable export control laws + +Execorp reserves the right to refuse service to anyone believed to be in violation of these export control provisions. + +## 11. Security and responsible disclosure + +Execorp encourages responsible disclosure of security vulnerabilities. Researchers are invited to report findings to [contact@exegol.com](mailto:contact@exegol.com) as described in our Responsible Disclosure Policy. + +Execorp implements industry-standard security practices but does not guarantee absolute security. + +## 12. Privacy and data protection + +Execorp processes personal data in compliance with applicable laws, including the GDPR and CCPA where applicable. + +Please refer to our Privacy Policy available on [exegol.com](https://exegol.com) for detailed information on data collection, use, rights, and protections. + +### 12.1 Data breach notification + +In the event of a data breach affecting your personal data, Execorp will: +- Notify affected users without undue delay, typically within 72 hours of becoming aware of the breach +- Provide information about the nature of the breach, categories of data concerned, likely consequences, and measures taken +- Communicate through email, account notifications, or other direct means when possible +- Work diligently to mitigate any potential harm and prevent future breaches + +## 13. Disclaimers and limitation of liability + +The Services are provided "as is" without warranty of any kind. + +Execorp disclaims all warranties, express, implied, or statutory, including warranties of merchantability, fitness for a particular purpose, or non-infringement. + +Execorp is not liable for: +- Indirect, incidental, special, consequential, or punitive damages +- Loss of profits, data, goodwill, or other intangible losses +- Unauthorized access or use of your data + +Execorp's total liability is limited to the amount you paid for the Services during the twelve (12) months before the event giving rise to the liability. Execorp has no liability toward users of the Community plan. + +Certain jurisdictions do not allow limitation of liability; in such cases, minimum liability under applicable law will apply. + +## 14. Changes to services + +Execorp may modify, suspend, or discontinue any part of the Services at any time. + +When feasible, users will be informed in advance, especially for significant changes affecting paid subscriptions. + +If Execorp discontinues a Service entirely, users with active subscriptions may be eligible for a pro-rated refund at Execorp's discretion. + +## 15. Governing law and jurisdiction + +These Terms are governed by the laws of France. + +Any disputes arising from these Terms or the Services will be submitted to the exclusive jurisdiction of the courts of Paris, France. + +### 15.1 Alternative dispute resolution + +Prior to initiating formal legal proceedings, the parties agree to attempt in good faith to resolve any dispute through negotiation. If the dispute cannot be resolved through negotiation within 30 days, either party may propose mediation through a mutually acceptable mediator. + +This alternative dispute resolution provision does not prevent either party from seeking injunctive or other urgent legal relief when necessary to protect its rights. + +If mandatory local consumer protection laws apply, they are not affected by this clause. + +## 16. Contact + +For all communications, including legal notices, user support, or security disclosures, please contact: [contact@exegol.com](mailto:contact@exegol.com) \ No newline at end of file diff --git a/docs/src/public/exegol_resources/resources_list.csv b/docs/src/public/exegol_resources/resources_list.csv new file mode 100644 index 00000000..38abfa20 --- /dev/null +++ b/docs/src/public/exegol_resources/resources_list.csv @@ -0,0 +1,39 @@ +Resource,Link,Description +SysInternals,https://learn.microsoft.com/en-us/sysinternals,Windows utilities signed by Microsoft +pspy,https://github.com/DominicBreuker/pspy,Monitor linux processes without root permissions +PEASS-ng,https://github.com/carlospolop/PEASS-ng,Privilege Escalation Awesome Scripts SUITE +linux-smart-enumeration (lse.sh),https://github.com/diego-treitos/linux-smart-enumeration,Linux enumeration tool for pentesting and CTFs with verbosity levels +LinEnum,https://github.com/rebootuser/LinEnum,Scripted Local Linux Enumeration & Privilege Escalation Checks +Linux Exploit Suggester,https://github.com/The-Z-Labs/linux-exploit-suggester,Linux privilege escalation auditing tool +Mimikatz,https://github.com/gentilkiwi/mimikatz,A little tool to play with Windows security +SharpHound.exe,https://github.com/BloodHoundAD/BloodHound,C# ingestor for BloodHound +JuicyPotato.exe,https://github.com/ohpe/juicy-potato,https://github.com/ohpe/juicy-potato +PrintSpoofer,https://github.com/itm4n/PrintSpoofer,Abusing SeImpersonatePrivilege from LOCAL/NETWORK SERVICE +GodPotato,https://github.com/BeichenDream/GodPotato,Abusing SeImpersonatePrivilege on recent Windows OS (up to W11 and Server 2022) +static netcat (linux),https://github.com/andrew-d/static-binaries,Utility to establish TCP or UDP connections +static netcat (windows),https://gitlab.com/onemask/pentest-tools,Utility to establish TCP or UDP connections +SpoolSample.exe,https://gitlab.com/onemask/pentest-tools,PoC tool to coerce Windows hosts authenticate to other machines +DiagHub.exe,https://gitlab.com/onemask/pentest-tools,Diagnostics Hub Standard Collector Service +LaZagne,https://github.com/AlessandroZ/LaZagne,Credentials recovery project +Sublinacl.exe,https://gitlab.com/onemask/pentest-tools,Modify Access Control Entries +plink.exe,https://www.cog-genomics.org/plink/,Network connection tool +deepce,https://github.com/stealthcopter/deepce,Docker Enumeration Escalation of Privileges and Container Escapes +Some webshells,,PHP and ASPX webshells +ysoserial,https://github.com/pwntester/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization +http-put-server,https://gist.githubusercontent.com/mildred/67d22d7289ae8f16cae7/raw/214c213c9415da18a471d1ed04660022cce059ef/server.py,HTTP PUT Server +Chisel,https://github.com/jpillora/chisel,A fast TCP/UDP tunnel over HTTP +WinPwn,https://github.com/S3cur3Th1sSh1t/WinPwn,Automation for AD pentesting +ligolo-ng,https://github.com/nicocha30/ligolo-ng,Advanced yet simple tunneling/pivoting tool that uses a TUN interface +bitleaker,https://github.com/kkamagui/bitleaker,This tool can decrypt a BitLocker-locked partition with the TPM vulnerability +napper,https://github.com/kkamagui/napper-for-tpm,TPM vulnerability checking tool for CVE-2018-6622 +mimipenguin,https://github.com/huntergregal/mimipenguin,A tool to dump the login password from the current linux user +p0wny-shell,https://github.com/flozz/p0wny-shell,Single-file PHP shell +Inveigh,https://github.com/Kevin-Robertson/Inveigh,.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers +MailSniper,https://github.com/dafthack/MailSniper,Penetration testing tool for searching through email in a Microsoft Exchange +PowerSploit,https://github.com/PowerShellMafia/PowerSploit,A PowerShell Post-Exploitation Framework +PrivescCheck,https://github.com/itm4n/PrivescCheck,Privilege Escalation Enumeration Script for Windows +SharpCollection,https://github.com/Flangvik/SharpCollection,Nightly builds of common C# offensive tools +WinEnum,https://github.com/neox41/WinEnum,Script for Local Windows Enumeration +impacket-examples-windows,https://github.com/maaaaz/impacket-examples-windows,The great impacket example scripts compiled for Windows +nishang,https://github.com/samratashok/nishang,Offensive PowerShell for red team +PowerSharpPack,https://github.com/S3cur3Th1sSh1t/PowerSharpPack,Many useful offensive CSharp Projects wraped into Powershell for easy usage. diff --git a/docs/src/public/external/banner.png b/docs/src/public/external/banner.png new file mode 100644 index 00000000..255e56e3 Binary files /dev/null and b/docs/src/public/external/banner.png differ diff --git a/docs/src/public/images/Exegol_Symbol_DarkVersion.png b/docs/src/public/images/Exegol_Symbol_DarkVersion.png new file mode 100644 index 00000000..e8433231 Binary files /dev/null and b/docs/src/public/images/Exegol_Symbol_DarkVersion.png differ diff --git a/docs/src/public/images/Exegol_Symbol_DarkVersion.svg b/docs/src/public/images/Exegol_Symbol_DarkVersion.svg new file mode 100644 index 00000000..5495f5ef --- /dev/null +++ b/docs/src/public/images/Exegol_Symbol_DarkVersion.svg @@ -0,0 +1,21 @@ + + + + + + + + + + + + + \ No newline at end of file diff --git a/docs/src/public/images/Exegol_Symbol_LightVersion.png b/docs/src/public/images/Exegol_Symbol_LightVersion.png new file mode 100644 index 00000000..5f95cb6f Binary files /dev/null and b/docs/src/public/images/Exegol_Symbol_LightVersion.png differ diff --git a/docs/src/public/images/Exegol_Symbol_LightVersion.svg b/docs/src/public/images/Exegol_Symbol_LightVersion.svg new file mode 100644 index 00000000..85584a82 --- /dev/null +++ b/docs/src/public/images/Exegol_Symbol_LightVersion.svg @@ -0,0 +1,21 @@ + + + + + + + + + + + + + \ No newline at end of file diff --git a/docs/src/public/images/Social_preview.png b/docs/src/public/images/Social_preview.png new file mode 100644 index 00000000..4ebc21a4 Binary files /dev/null and b/docs/src/public/images/Social_preview.png differ diff --git a/docs/src/public/images/android-chrome-192x192.png b/docs/src/public/images/android-chrome-192x192.png new file mode 100644 index 00000000..6ddf33a6 Binary files /dev/null and b/docs/src/public/images/android-chrome-192x192.png differ diff --git a/docs/src/public/images/android-chrome-512x512.png b/docs/src/public/images/android-chrome-512x512.png new file mode 100644 index 00000000..f67240b5 Binary files /dev/null and b/docs/src/public/images/android-chrome-512x512.png differ diff --git a/docs/src/public/images/apple-touch-icon.png b/docs/src/public/images/apple-touch-icon.png new file mode 100644 index 00000000..bdc0442e Binary files /dev/null and b/docs/src/public/images/apple-touch-icon.png differ diff --git a/docs/src/public/images/favicon-16x16.png b/docs/src/public/images/favicon-16x16.png new file mode 100644 index 00000000..79346a6d Binary files /dev/null and b/docs/src/public/images/favicon-16x16.png differ diff --git a/docs/src/public/images/favicon-32x32.png b/docs/src/public/images/favicon-32x32.png new file mode 100644 index 00000000..92ec9975 Binary files /dev/null and b/docs/src/public/images/favicon-32x32.png differ diff --git a/docs/src/public/images/favicon.ico b/docs/src/public/images/favicon.ico new file mode 100644 index 00000000..02f4e5d0 Binary files /dev/null and b/docs/src/public/images/favicon.ico differ diff --git a/docs/src/public/images/site.webmanifest b/docs/src/public/images/site.webmanifest new file mode 100644 index 00000000..78bc8519 --- /dev/null +++ b/docs/src/public/images/site.webmanifest @@ -0,0 +1 @@ +{"name":"","short_name":"","icons":[{"src":"/images/android-chrome-192x192.png","sizes":"192x192","type":"image/png"},{"src":"/images/android-chrome-512x512.png","sizes":"512x512","type":"image/png"}],"theme_color":"#ffffff","background_color":"#ffffff","display":"standalone"} \ No newline at end of file diff --git a/docs/src/public/installed_tools/free.csv b/docs/src/public/installed_tools/free.csv new file mode 100644 index 00000000..e72fb2e6 --- /dev/null +++ b/docs/src/public/installed_tools/free.csv @@ -0,0 +1,3 @@ +Image tag,Version,Arch,Build date,Tools list +free,latest,amd64,"2025-03-20T03:56:44Z",[download]() +free,latest,arm64,"2025-03-20T03:17:22Z",[download]() \ No newline at end of file diff --git a/docs/src/public/installed_tools/lists/ad_3.1.0_amd64.csv b/docs/src/public/installed_tools/lists/ad_3.1.0_amd64.csv new file mode 100644 index 00000000..7fd0fb6a --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.0_amd64.csv @@ -0,0 +1,214 @@ +Tool,Link,Description +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound.git,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/0x09AL/golden_copy.git,A tool to copy data from Golden Ticket and Silver Ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver.git,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.0_arm64.csv b/docs/src/public/installed_tools/lists/ad_3.1.0_arm64.csv new file mode 100644 index 00000000..153b7652 --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.0_arm64.csv @@ -0,0 +1,213 @@ +Tool,Link,Description +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound.git,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/0x09AL/golden_copy.git,A tool to copy data from Golden Ticket and Silver Ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver.git,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.1_amd64.csv b/docs/src/public/installed_tools/lists/ad_3.1.1_amd64.csv new file mode 100644 index 00000000..7fd0fb6a --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.1_amd64.csv @@ -0,0 +1,214 @@ +Tool,Link,Description +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound.git,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/0x09AL/golden_copy.git,A tool to copy data from Golden Ticket and Silver Ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver.git,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.1_arm64.csv b/docs/src/public/installed_tools/lists/ad_3.1.1_arm64.csv new file mode 100644 index 00000000..153b7652 --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.1_arm64.csv @@ -0,0 +1,213 @@ +Tool,Link,Description +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound.git,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/0x09AL/golden_copy.git,A tool to copy data from Golden Ticket and Silver Ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver.git,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.2_amd64.csv b/docs/src/public/installed_tools/lists/ad_3.1.2_amd64.csv new file mode 100644 index 00000000..ca27a102 --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.2_amd64.csv @@ -0,0 +1,242 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.2_arm64.csv b/docs/src/public/installed_tools/lists/ad_3.1.2_arm64.csv new file mode 100644 index 00000000..b8c7dbee --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.2_arm64.csv @@ -0,0 +1,241 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.3_amd64.csv b/docs/src/public/installed_tools/lists/ad_3.1.3_amd64.csv new file mode 100644 index 00000000..73ed4fad --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.3_amd64.csv @@ -0,0 +1,247 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.3_arm64.csv b/docs/src/public/installed_tools/lists/ad_3.1.3_arm64.csv new file mode 100644 index 00000000..5b48d4d3 --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.3_arm64.csv @@ -0,0 +1,246 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.4_amd64.csv b/docs/src/public/installed_tools/lists/ad_3.1.4_amd64.csv new file mode 100644 index 00000000..4bc3d5a8 --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.4_amd64.csv @@ -0,0 +1,249 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.4_arm64.csv b/docs/src/public/installed_tools/lists/ad_3.1.4_arm64.csv new file mode 100644 index 00000000..a53afc62 --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.4_arm64.csv @@ -0,0 +1,248 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.5_amd64.csv b/docs/src/public/installed_tools/lists/ad_3.1.5_amd64.csv new file mode 100644 index 00000000..b4ad50af --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.5_amd64.csv @@ -0,0 +1,254 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/NH-RED-TEAM/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.5_arm64.csv b/docs/src/public/installed_tools/lists/ad_3.1.5_arm64.csv new file mode 100644 index 00000000..5cdc7f62 --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.5_arm64.csv @@ -0,0 +1,253 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/NH-RED-TEAM/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/source/assets/installed_tools/lists/ad_3.1.6_amd64.csv b/docs/src/public/installed_tools/lists/ad_3.1.6_amd64.csv similarity index 99% rename from source/assets/installed_tools/lists/ad_3.1.6_amd64.csv rename to docs/src/public/installed_tools/lists/ad_3.1.6_amd64.csv index 904f546d..02c99726 100644 --- a/source/assets/installed_tools/lists/ad_3.1.6_amd64.csv +++ b/docs/src/public/installed_tools/lists/ad_3.1.6_amd64.csv @@ -266,4 +266,4 @@ xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.htm ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. -zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). \ No newline at end of file diff --git a/source/assets/installed_tools/lists/ad_3.1.6_arm64.csv b/docs/src/public/installed_tools/lists/ad_3.1.6_arm64.csv similarity index 99% rename from source/assets/installed_tools/lists/ad_3.1.6_arm64.csv rename to docs/src/public/installed_tools/lists/ad_3.1.6_arm64.csv index cce8c5cf..d5e60e5c 100644 --- a/source/assets/installed_tools/lists/ad_3.1.6_arm64.csv +++ b/docs/src/public/installed_tools/lists/ad_3.1.6_arm64.csv @@ -265,4 +265,4 @@ xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.htm ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. -zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). \ No newline at end of file diff --git a/docs/src/public/installed_tools/lists/ad_3.1.7_amd64.csv b/docs/src/public/installed_tools/lists/ad_3.1.7_amd64.csv new file mode 100644 index 00000000..cc1fcc24 --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.7_amd64.csv @@ -0,0 +1,274 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +autobloody,https://github.com/CravateRouge/autobloody,Automatically exploit Active Directory privilege escalation paths shown by BloodHound. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +BBOT,https://github.com/blacklanternsecurity/bbot,BEE·bot is a multipurpose scanner inspired by Spiderfoot built to automate your Recon and ASM. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +godap,https://github.com/Macmod/godap,A complete TUI for LDAP. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/pyLDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mitmproxy,https://github.com/mitmproxy/mitmproxy,mitmproxy is an interactive SSL/TLS-capable intercepting proxy with a console interface for HTTP/1 HTTP/2 and WebSockets. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +Powerview.py,https://github.com/aniqfakhrul/powerview.py,PowerView.py is an alternative for the awesome original PowerView.ps1 script. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pyFindUncommonShares,https://github.com/p0dalirius/pyFindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pysnaffler,https://github.com/skelsec/pysnaffler,Snaffler. But in python. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +RemoteMonologue,https://github.com/3lp4tr0n/RemoteMonologue,A tool to coerce NTLM authentications via DCOM +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADrecon,https://github.com/dirkjanm/ROADtools#roadrecon,Azure AD recon for red and blue. +ROADtx,https://github.com/dirkjanm/ROADtools#roadtools-token-exchange-roadtx,ROADtools Token eXchange. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rusthound-ce,https://github.com/g0h4n/RustHound-CE,BloodHound-CE ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmsecrets,https://github.com/synacktiv/SCCMSecrets,SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting and initial access and lateral movement. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +udpx,https://github.com/nullt3r/udpx, Fast and lightweight - UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability to add custom ones. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/ad_3.1.7_arm64.csv b/docs/src/public/installed_tools/lists/ad_3.1.7_arm64.csv new file mode 100644 index 00000000..df264704 --- /dev/null +++ b/docs/src/public/installed_tools/lists/ad_3.1.7_arm64.csv @@ -0,0 +1,272 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +autobloody,https://github.com/CravateRouge/autobloody,Automatically exploit Active Directory privilege escalation paths shown by BloodHound. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +BBOT,https://github.com/blacklanternsecurity/bbot,BEE·bot is a multipurpose scanner inspired by Spiderfoot built to automate your Recon and ASM. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +firefox,https://www.mozilla.org,A web browser +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +godap,https://github.com/Macmod/godap,A complete TUI for LDAP. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/pyLDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mitmproxy,https://github.com/mitmproxy/mitmproxy,mitmproxy is an interactive SSL/TLS-capable intercepting proxy with a console interface for HTTP/1 HTTP/2 and WebSockets. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +Powerview.py,https://github.com/aniqfakhrul/powerview.py,PowerView.py is an alternative for the awesome original PowerView.ps1 script. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pyFindUncommonShares,https://github.com/p0dalirius/pyFindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pysnaffler,https://github.com/skelsec/pysnaffler,Snaffler. But in python. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +RemoteMonologue,https://github.com/3lp4tr0n/RemoteMonologue,A tool to coerce NTLM authentications via DCOM +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADrecon,https://github.com/dirkjanm/ROADtools#roadrecon,Azure AD recon for red and blue. +ROADtx,https://github.com/dirkjanm/ROADtools#roadtools-token-exchange-roadtx,ROADtools Token eXchange. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rusthound-ce,https://github.com/g0h4n/RustHound-CE,BloodHound-CE ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmsecrets,https://github.com/synacktiv/SCCMSecrets,SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting and initial access and lateral movement. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +udpx,https://github.com/nullt3r/udpx, Fast and lightweight - UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability to add custom ones. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). diff --git a/docs/src/public/installed_tools/lists/full_3.1.0_amd64.csv b/docs/src/public/installed_tools/lists/full_3.1.0_amd64.csv new file mode 100644 index 00000000..17dbf9d5 --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.0_amd64.csv @@ -0,0 +1,331 @@ +Tool,Link,Description +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound.git,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/0x09AL/golden_copy.git,A tool to copy data from Golden Ticket and Silver Ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ida,https://www.hex-rays.com/products/ida/,Interactive disassembler for software analysis. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +ltrace,https://github.com/dkogan/ltrace,ltrace is a debugging program for Linux and Unix that intercepts and records dynamic library calls that are called by an executed process. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nasm,https://github.com/netwide-assembler/nasm,NASM is an 80x86 assembler designed for portability and modularity. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver.git,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +strace,https://github.com/strace/strace,strace is a debugging utility for Linux that allows you to monitor and diagnose system calls made by a process. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +vulny-code-static-analysis,https://github.com/swisskyrepo/Vulny-Code-Static-Analysis,Static analysis tool for C code +wabt,https://github.com/WebAssembly/wabt,The WebAssembly Binary Toolkit (WABT) is a suite of tools for WebAssembly (Wasm) including assembler and disassembler / a syntax checker / and a binary format validator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.0_arm64.csv b/docs/src/public/installed_tools/lists/full_3.1.0_arm64.csv new file mode 100644 index 00000000..e7cb5fc8 --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.0_arm64.csv @@ -0,0 +1,324 @@ +Tool,Link,Description +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound.git,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/0x09AL/golden_copy.git,A tool to copy data from Golden Ticket and Silver Ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver.git,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +vulny-code-static-analysis,https://github.com/swisskyrepo/Vulny-Code-Static-Analysis,Static analysis tool for C code +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.1_amd64.csv b/docs/src/public/installed_tools/lists/full_3.1.1_amd64.csv new file mode 100644 index 00000000..17dbf9d5 --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.1_amd64.csv @@ -0,0 +1,331 @@ +Tool,Link,Description +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound.git,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/0x09AL/golden_copy.git,A tool to copy data from Golden Ticket and Silver Ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ida,https://www.hex-rays.com/products/ida/,Interactive disassembler for software analysis. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +ltrace,https://github.com/dkogan/ltrace,ltrace is a debugging program for Linux and Unix that intercepts and records dynamic library calls that are called by an executed process. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nasm,https://github.com/netwide-assembler/nasm,NASM is an 80x86 assembler designed for portability and modularity. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver.git,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +strace,https://github.com/strace/strace,strace is a debugging utility for Linux that allows you to monitor and diagnose system calls made by a process. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +vulny-code-static-analysis,https://github.com/swisskyrepo/Vulny-Code-Static-Analysis,Static analysis tool for C code +wabt,https://github.com/WebAssembly/wabt,The WebAssembly Binary Toolkit (WABT) is a suite of tools for WebAssembly (Wasm) including assembler and disassembler / a syntax checker / and a binary format validator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.1_arm64.csv b/docs/src/public/installed_tools/lists/full_3.1.1_arm64.csv new file mode 100644 index 00000000..e7cb5fc8 --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.1_arm64.csv @@ -0,0 +1,324 @@ +Tool,Link,Description +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound.git,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/0x09AL/golden_copy.git,A tool to copy data from Golden Ticket and Silver Ticket +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver.git,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +vulny-code-static-analysis,https://github.com/swisskyrepo/Vulny-Code-Static-Analysis,Static analysis tool for C code +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.2_amd64.csv b/docs/src/public/installed_tools/lists/full_3.1.2_amd64.csv new file mode 100644 index 00000000..d448e67f --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.2_amd64.csv @@ -0,0 +1,370 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ida,https://www.hex-rays.com/products/ida/,Interactive disassembler for software analysis. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +ltrace,https://github.com/dkogan/ltrace,ltrace is a debugging program for Linux and Unix that intercepts and records dynamic library calls that are called by an executed process. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nasm,https://github.com/netwide-assembler/nasm,NASM is an 80x86 assembler designed for portability and modularity. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +strace,https://github.com/strace/strace,strace is a debugging utility for Linux that allows you to monitor and diagnose system calls made by a process. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wabt,https://github.com/WebAssembly/wabt,The WebAssembly Binary Toolkit (WABT) is a suite of tools for WebAssembly (Wasm) including assembler and disassembler / a syntax checker / and a binary format validator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.2_arm64.csv b/docs/src/public/installed_tools/lists/full_3.1.2_arm64.csv new file mode 100644 index 00000000..9a532a74 --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.2_arm64.csv @@ -0,0 +1,363 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/masky,masky is a tool to mask sensitive data / such as credit card numbers / in logs and other files. +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/arthepsy/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.3_amd64.csv b/docs/src/public/installed_tools/lists/full_3.1.3_amd64.csv new file mode 100644 index 00000000..e7f9041f --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.3_amd64.csv @@ -0,0 +1,375 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ida,https://www.hex-rays.com/products/ida/,Interactive disassembler for software analysis. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +ltrace,https://github.com/dkogan/ltrace,ltrace is a debugging program for Linux and Unix that intercepts and records dynamic library calls that are called by an executed process. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nasm,https://github.com/netwide-assembler/nasm,NASM is an 80x86 assembler designed for portability and modularity. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +strace,https://github.com/strace/strace,strace is a debugging utility for Linux that allows you to monitor and diagnose system calls made by a process. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wabt,https://github.com/WebAssembly/wabt,The WebAssembly Binary Toolkit (WABT) is a suite of tools for WebAssembly (Wasm) including assembler and disassembler / a syntax checker / and a binary format validator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.3_arm64.csv b/docs/src/public/installed_tools/lists/full_3.1.3_arm64.csv new file mode 100644 index 00000000..c396f203 --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.3_arm64.csv @@ -0,0 +1,367 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.4_amd64.csv b/docs/src/public/installed_tools/lists/full_3.1.4_amd64.csv new file mode 100644 index 00000000..241de0a2 --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.4_amd64.csv @@ -0,0 +1,377 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ida,https://www.hex-rays.com/products/ida/,Interactive disassembler for software analysis. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +ltrace,https://github.com/dkogan/ltrace,ltrace is a debugging program for Linux and Unix that intercepts and records dynamic library calls that are called by an executed process. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nasm,https://github.com/netwide-assembler/nasm,NASM is an 80x86 assembler designed for portability and modularity. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +strace,https://github.com/strace/strace,strace is a debugging utility for Linux that allows you to monitor and diagnose system calls made by a process. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wabt,https://github.com/WebAssembly/wabt,The WebAssembly Binary Toolkit (WABT) is a suite of tools for WebAssembly (Wasm) including assembler and disassembler / a syntax checker / and a binary format validator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.4_arm64.csv b/docs/src/public/installed_tools/lists/full_3.1.4_arm64.csv new file mode 100644 index 00000000..767403dd --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.4_arm64.csv @@ -0,0 +1,369 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/Proxmark/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/OPENCYBER-FR/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/OPENCYBER-FR/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.5_amd64.csv b/docs/src/public/installed_tools/lists/full_3.1.5_amd64.csv new file mode 100644 index 00000000..7832b98d --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.5_amd64.csv @@ -0,0 +1,382 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ida,https://www.hex-rays.com/products/ida/,Interactive disassembler for software analysis. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +ltrace,https://github.com/dkogan/ltrace,ltrace is a debugging program for Linux and Unix that intercepts and records dynamic library calls that are called by an executed process. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nasm,https://github.com/netwide-assembler/nasm,NASM is an 80x86 assembler designed for portability and modularity. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/RfidResearchGroup/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/NH-RED-TEAM/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +strace,https://github.com/strace/strace,strace is a debugging utility for Linux that allows you to monitor and diagnose system calls made by a process. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wabt,https://github.com/WebAssembly/wabt,The WebAssembly Binary Toolkit (WABT) is a suite of tools for WebAssembly (Wasm) including assembler and disassembler / a syntax checker / and a binary format validator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.5_arm64.csv b/docs/src/public/installed_tools/lists/full_3.1.5_arm64.csv new file mode 100644 index 00000000..06b6d0fc --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.5_arm64.csv @@ -0,0 +1,375 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +finduncommonshares,https://github.com/p0dalirius/FindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/LDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/RfidResearchGroup/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADtools,https://github.com/dirkjanm/ROADtools,ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components / the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound (v2),https://github.com/NH-RED-TEAM/RustHound,BloodHound-CE ingestor in Rust. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/source/assets/installed_tools/lists/full_3.1.6_amd64.csv b/docs/src/public/installed_tools/lists/full_3.1.6_amd64.csv similarity index 99% rename from source/assets/installed_tools/lists/full_3.1.6_amd64.csv rename to docs/src/public/installed_tools/lists/full_3.1.6_amd64.csv index 50cbda6a..ba05dc4f 100644 --- a/source/assets/installed_tools/lists/full_3.1.6_amd64.csv +++ b/docs/src/public/installed_tools/lists/full_3.1.6_amd64.csv @@ -394,4 +394,4 @@ yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional featur Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file -zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images \ No newline at end of file diff --git a/source/assets/installed_tools/lists/full_3.1.6_arm64.csv b/docs/src/public/installed_tools/lists/full_3.1.6_arm64.csv similarity index 99% rename from source/assets/installed_tools/lists/full_3.1.6_arm64.csv rename to docs/src/public/installed_tools/lists/full_3.1.6_arm64.csv index 537f1889..19972a32 100644 --- a/source/assets/installed_tools/lists/full_3.1.6_arm64.csv +++ b/docs/src/public/installed_tools/lists/full_3.1.6_arm64.csv @@ -387,4 +387,4 @@ yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional featur Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file -zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images \ No newline at end of file diff --git a/docs/src/public/installed_tools/lists/full_3.1.7_amd64.csv b/docs/src/public/installed_tools/lists/full_3.1.7_amd64.csv new file mode 100644 index 00000000..ece87c98 --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.7_amd64.csv @@ -0,0 +1,402 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autobloody,https://github.com/CravateRouge/autobloody,Automatically exploit Active Directory privilege escalation paths shown by BloodHound. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +BBOT,https://github.com/blacklanternsecurity/bbot,BEE·bot is a multipurpose scanner inspired by Spiderfoot built to automate your Recon and ASM. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gitleaks,https://github.com/trufflesecurity/gitleaks,Gitleaks scans hardcoded secrets in git repositories and folders. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +godap,https://github.com/Macmod/godap,A complete TUI for LDAP. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ida,https://www.hex-rays.com/products/ida/,Interactive disassembler for software analysis. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/pyLDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +ltrace,https://github.com/dkogan/ltrace,ltrace is a debugging program for Linux and Unix that intercepts and records dynamic library calls that are called by an executed process. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mitmproxy,https://github.com/mitmproxy/mitmproxy,mitmproxy is an interactive SSL/TLS-capable intercepting proxy with a console interface for HTTP/1 HTTP/2 and WebSockets. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nasm,https://github.com/netwide-assembler/nasm,NASM is an 80x86 assembler designed for portability and modularity. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +Powerview.py,https://github.com/aniqfakhrul/powerview.py,PowerView.py is an alternative for the awesome original PowerView.ps1 script. +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/RfidResearchGroup/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pyFindUncommonShares,https://github.com/p0dalirius/pyFindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pysnaffler,https://github.com/skelsec/pysnaffler,Snaffler. But in python. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +RemoteMonologue,https://github.com/3lp4tr0n/RemoteMonologue,A tool to coerce NTLM authentications via DCOM +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADrecon,https://github.com/dirkjanm/ROADtools#roadrecon,Azure AD recon for red and blue. +ROADtx,https://github.com/dirkjanm/ROADtools#roadtools-token-exchange-roadtx,ROADtools Token eXchange. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rusthound-ce,https://github.com/g0h4n/RustHound-CE,BloodHound-CE ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmsecrets,https://github.com/synacktiv/SCCMSecrets,SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting and initial access and lateral movement. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +strace,https://github.com/strace/strace,strace is a debugging utility for Linux that allows you to monitor and diagnose system calls made by a process. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +trufflehog,https://github.com/trufflesecurity/trufflehog,Find verify and analyze hardcoded secrets in git repositories folders buckets and more. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +udpx,https://github.com/nullt3r/udpx, Fast and lightweight - UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability to add custom ones. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wabt,https://github.com/WebAssembly/wabt,The WebAssembly Binary Toolkit (WABT) is a suite of tools for WebAssembly (Wasm) including assembler and disassembler / a syntax checker / and a binary format validator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/full_3.1.7_arm64.csv b/docs/src/public/installed_tools/lists/full_3.1.7_arm64.csv new file mode 100644 index 00000000..8016d345 --- /dev/null +++ b/docs/src/public/installed_tools/lists/full_3.1.7_arm64.csv @@ -0,0 +1,394 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autobloody,https://github.com/CravateRouge/autobloody,Automatically exploit Active Directory privilege escalation paths shown by BloodHound. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +BBOT,https://github.com/blacklanternsecurity/bbot,BEE·bot is a multipurpose scanner inspired by Spiderfoot built to automate your Recon and ASM. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gitleaks,https://github.com/trufflesecurity/gitleaks,Gitleaks scans hardcoded secrets in git repositories and folders. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +godap,https://github.com/Macmod/godap,A complete TUI for LDAP. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/pyLDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mitmproxy,https://github.com/mitmproxy/mitmproxy,mitmproxy is an interactive SSL/TLS-capable intercepting proxy with a console interface for HTTP/1 HTTP/2 and WebSockets. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +Powerview.py,https://github.com/aniqfakhrul/powerview.py,PowerView.py is an alternative for the awesome original PowerView.ps1 script. +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/RfidResearchGroup/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pyFindUncommonShares,https://github.com/p0dalirius/pyFindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pysnaffler,https://github.com/skelsec/pysnaffler,Snaffler. But in python. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +RemoteMonologue,https://github.com/3lp4tr0n/RemoteMonologue,A tool to coerce NTLM authentications via DCOM +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADrecon,https://github.com/dirkjanm/ROADtools#roadrecon,Azure AD recon for red and blue. +ROADtx,https://github.com/dirkjanm/ROADtools#roadtools-token-exchange-roadtx,ROADtools Token eXchange. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rusthound-ce,https://github.com/g0h4n/RustHound-CE,BloodHound-CE ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmsecrets,https://github.com/synacktiv/SCCMSecrets,SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting and initial access and lateral movement. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +trufflehog,https://github.com/trufflesecurity/trufflehog,Find verify and analyze hardcoded secrets in git repositories folders buckets and more. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +udpx,https://github.com/nullt3r/udpx, Fast and lightweight - UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability to add custom ones. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/latest_free_amd64.csv b/docs/src/public/installed_tools/lists/latest_free_amd64.csv new file mode 100644 index 00000000..ba05dc4f --- /dev/null +++ b/docs/src/public/installed_tools/lists/latest_free_amd64.csv @@ -0,0 +1,397 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autobloody,https://github.com/CravateRouge/autobloody,Automatically exploit Active Directory privilege escalation paths shown by BloodHound. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gitleaks,https://github.com/trufflesecurity/gitleaks,Gitleaks scans hardcoded secrets in git repositories and folders. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ida,https://www.hex-rays.com/products/ida/,Interactive disassembler for software analysis. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/pyLDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +ltrace,https://github.com/dkogan/ltrace,ltrace is a debugging program for Linux and Unix that intercepts and records dynamic library calls that are called by an executed process. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mitmproxy,https://github.com/mitmproxy/mitmproxy,mitmproxy is an interactive SSL/TLS-capable intercepting proxy with a console interface for HTTP/1 HTTP/2 and WebSockets. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nasm,https://github.com/netwide-assembler/nasm,NASM is an 80x86 assembler designed for portability and modularity. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/RfidResearchGroup/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pyFindUncommonShares,https://github.com/p0dalirius/pyFindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADrecon,https://github.com/dirkjanm/ROADtools#roadrecon,Azure AD recon for red and blue. +ROADtx,https://github.com/dirkjanm/ROADtools#roadtools-token-exchange-roadtx,ROADtools Token eXchange. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rusthound-ce,https://github.com/g0h4n/RustHound-CE,BloodHound-CE ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +strace,https://github.com/strace/strace,strace is a debugging utility for Linux that allows you to monitor and diagnose system calls made by a process. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +trufflehog,https://github.com/trufflesecurity/trufflehog,Find verify and analyze hardcoded secrets in git repositories folders buckets and more. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +udpx,https://github.com/nullt3r/udpx, Fast and lightweight - UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability to add custom ones. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wabt,https://github.com/WebAssembly/wabt,The WebAssembly Binary Toolkit (WABT) is a suite of tools for WebAssembly (Wasm) including assembler and disassembler / a syntax checker / and a binary format validator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images \ No newline at end of file diff --git a/docs/src/public/installed_tools/lists/latest_free_arm64.csv b/docs/src/public/installed_tools/lists/latest_free_arm64.csv new file mode 100644 index 00000000..19972a32 --- /dev/null +++ b/docs/src/public/installed_tools/lists/latest_free_arm64.csv @@ -0,0 +1,390 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autobloody,https://github.com/CravateRouge/autobloody,Automatically exploit Active Directory privilege escalation paths shown by BloodHound. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gitleaks,https://github.com/trufflesecurity/gitleaks,Gitleaks scans hardcoded secrets in git repositories and folders. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/pyLDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mitmproxy,https://github.com/mitmproxy/mitmproxy,mitmproxy is an interactive SSL/TLS-capable intercepting proxy with a console interface for HTTP/1 HTTP/2 and WebSockets. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/RfidResearchGroup/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pyFindUncommonShares,https://github.com/p0dalirius/pyFindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADrecon,https://github.com/dirkjanm/ROADtools#roadrecon,Azure AD recon for red and blue. +ROADtx,https://github.com/dirkjanm/ROADtools#roadtools-token-exchange-roadtx,ROADtools Token eXchange. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rusthound-ce,https://github.com/g0h4n/RustHound-CE,BloodHound-CE ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +trufflehog,https://github.com/trufflesecurity/trufflehog,Find verify and analyze hardcoded secrets in git repositories folders buckets and more. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +udpx,https://github.com/nullt3r/udpx, Fast and lightweight - UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability to add custom ones. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images \ No newline at end of file diff --git a/docs/src/public/installed_tools/lists/latest_nightly_amd64.csv b/docs/src/public/installed_tools/lists/latest_nightly_amd64.csv new file mode 100644 index 00000000..6c4669f5 --- /dev/null +++ b/docs/src/public/installed_tools/lists/latest_nightly_amd64.csv @@ -0,0 +1,404 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autobloody,https://github.com/CravateRouge/autobloody,Automatically exploit Active Directory privilege escalation paths shown by BloodHound. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +BBOT,https://github.com/blacklanternsecurity/bbot,BEE·bot is a multipurpose scanner inspired by Spiderfoot built to automate your Recon and ASM. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gitleaks,https://github.com/trufflesecurity/gitleaks,Gitleaks scans hardcoded secrets in git repositories and folders. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +godap,https://github.com/Macmod/godap,A complete TUI for LDAP. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ida,https://www.hex-rays.com/products/ida/,Interactive disassembler for software analysis. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/pyLDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +ltrace,https://github.com/dkogan/ltrace,ltrace is a debugging program for Linux and Unix that intercepts and records dynamic library calls that are called by an executed process. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +manspider,https://github.com/blacklanternsecurity/MANSPIDER,Manspider will crawl every share on every target system. If provided creds don't work it will fall back to 'guest' then to a null session. +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mitmproxy,https://github.com/mitmproxy/mitmproxy,mitmproxy is an interactive SSL/TLS-capable intercepting proxy with a console interface for HTTP/1 HTTP/2 and WebSockets. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nasm,https://github.com/netwide-assembler/nasm,NASM is an 80x86 assembler designed for portability and modularity. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +OpenVPN,https://openvpn.net/,Fast and Easy Zero-Trust VPN Fully in Your Control +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +Powerview.py,https://github.com/aniqfakhrul/powerview.py,PowerView.py is an alternative for the awesome original PowerView.ps1 script. +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/RfidResearchGroup/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pth-tools,https://github.com/byt3bl33d3r/pth-toolkit,A toolkit to perform pass-the-hash attacks +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pyFindUncommonShares,https://github.com/p0dalirius/pyFindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pysnaffler,https://github.com/skelsec/pysnaffler,Snaffler. But in python. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +RemoteMonologue,https://github.com/3lp4tr0n/RemoteMonologue,A tool to coerce NTLM authentications via DCOM +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADrecon,https://github.com/dirkjanm/ROADtools#roadrecon,Azure AD recon for red and blue. +ROADtx,https://github.com/dirkjanm/ROADtools#roadtools-token-exchange-roadtx,ROADtools Token eXchange. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rusthound-ce,https://github.com/g0h4n/RustHound-CE,BloodHound-CE ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmsecrets,https://github.com/synacktiv/SCCMSecrets,SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting and initial access and lateral movement. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +strace,https://github.com/strace/strace,strace is a debugging utility for Linux that allows you to monitor and diagnose system calls made by a process. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +trufflehog,https://github.com/trufflesecurity/trufflehog,Find verify and analyze hardcoded secrets in git repositories folders buckets and more. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +udpx,https://github.com/nullt3r/udpx, Fast and lightweight - UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability to add custom ones. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wabt,https://github.com/WebAssembly/wabt,The WebAssembly Binary Toolkit (WABT) is a suite of tools for WebAssembly (Wasm) including assembler and disassembler / a syntax checker / and a binary format validator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireguard,https://www.wireguard.com,WireGuard is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/latest_nightly_arm64.csv b/docs/src/public/installed_tools/lists/latest_nightly_arm64.csv new file mode 100644 index 00000000..cdf777fd --- /dev/null +++ b/docs/src/public/installed_tools/lists/latest_nightly_arm64.csv @@ -0,0 +1,396 @@ +Tool,Link,Description +abuseACL,https://github.com/AetherBlack/abuseACL,A python script to automatically list vulnerable Windows ACEs/ACLs. +aclpwn,https://github.com/aas-n/aclpwn.py,Tool for testing the security of Active Directory access controls. +AD-miner,https://github.com/Mazars-Tech/AD_Miner,Active Directory audit tool that leverages cypher queries. +adidnsdump,https://github.com/dirkjanm/adidnsdump,Active Directory Integrated DNS dump utility +aircrack-ng,https://www.aircrack-ng.org,A suite of tools for wireless penetration testing +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +amber,https://github.com/EgeBalci/amber,Forensic tool to recover browser history / cookies and credentials +androguard,https://github.com/androguard/androguard,Reverse engineering and analysis of Android applications +android-tools-adb,https://developer.android.com/studio/command-line/adb,A collection of tools for debugging Android applications +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +angr,https://github.com/angr/angr,a platform-agnostic binary analysis framework +apksigner,https://source.android.com/security/apksigning,arguably the most important step to optimize your APK file +apktool,https://github.com/iBotPeaches/Apktool,It is a tool for reverse engineering 3rd party / closed / binary Android apps. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +asrepcatcher,https://github.com/Yaxxine7/ASRepCatcher,Make your VLAN ASREProastable. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +autobloody,https://github.com/CravateRouge/autobloody,Automatically exploit Active Directory privilege escalation paths shown by BloodHound. +autoconf,https://www.gnu.org/software/autoconf/autoconf.html,Tool for producing shell scripts to configure source code packages +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +avrdude,https://github.com/avrdudes/avrdude,AVRDUDE is a command-line program that allows you to download/upload/manipulate the ROM and EEPROM contents of AVR microcontrollers using the in-system programming technique (ISP). +awscli,https://aws.amazon.com/cli/,Command-line interface for Amazon Web Services. +azure-cli,https://github.com/Azure/azure-cli,A great cloud needs great tools; we're excited to introduce Azure CLI our next generation multi-platform command line experience for Azure. +BBOT,https://github.com/blacklanternsecurity/bbot,BEE·bot is a multipurpose scanner inspired by Spiderfoot built to automate your Recon and ASM. +bettercap,https://github.com/bettercap/bettercap,The Swiss Army knife for 802.11 / BLE / and Ethernet networks reconnaissance and MITM attacks. +binwalk,https://github.com/ReFirmLabs/binwalk,Binwalk is a tool for analyzing / reverse engineering / and extracting firmware images. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +BloodHound-CE,https://github.com/SpecterOps/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments (Community Edition) +bloodhound-ce.py,https://github.com/fox-it/BloodHound.py,BloodHound-CE ingestor in Python. +bloodhound-import,https://github.com/fox-it/BloodHound.py,Import data into BloodHound for analyzing active directory trust relationships +bloodhound-quickwin,https://github.com/kaluche/bloodhound-quickwin,A tool for BloodHounding on Windows machines without .NET or Powershell installed +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +bloodyAD,https://github.com/CravateRouge/bloodyAD,bloodyAD is an Active Directory privilege escalation swiss army knife. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +bqm,https://github.com/Acceis/bqm,Tool to deduplicate custom BloudHound queries from different datasets and merge them in one file. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +bully,https://github.com/aanarchyy/bully,bully is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +certipy,https://github.com/ly4k/Certipy,Python tool to create and sign certificates +certsync,https://github.com/zblurx/certsync,certsync is a tool that helps you synchronize certificates between two directories. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +chainsaw,https://github.com/WithSecureLabs/chainsaw,Rapidly Search and Hunt through Windows Forensic Artefacts +checksec-py,https://github.com/Wenzel/checksec.py,Python wrapper script for checksec.sh from paX. +chisel,https://github.com/jpillora/chisel,Go based TCP tunnel with authentication and encryption support +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +cloudmapper,https://github.com/duo-labs/cloudmapper,CloudMapper helps you analyze your Amazon Web Services (AWS) environments. +cloudsplaining,https://github.com/salesforce/cloudsplaining,AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report. +cloudsploit,https://github.com/aquasecurity/cloudsploit,Cloud Security Posture Management +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +conpass,https://github.com/login-securite/conpass,Python tool for continuous password spraying taking into account the password policy. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +cowpatty,https://github.com/joswr1ght/cowpatty,cowpatty is a tool for offline dictionary attacks against WPA-PSK (Pre-Shared Key) networks. +crackhound,https://github.com/trustedsec/crackhound,A fast WPA/WPA2/WPA3 WiFi Handshake capture / password recovery and analysis tool +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +cyperoth,https://github.com/seajaysec/cypheroth,Automated extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets. +darkarmour,https://github.com/bats3c/darkarmour,a tool to detect and evade common antivirus products +dex2jar,https://github.com/pxb1988/dex2jar,A tool to convert Android's dex files to Java's jar files +dfscoerce,https://github.com/Wh04m1001/dfscoerce,DFS-R target coercion tool +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +divideandscan,https://github.com/snovvcrash/divideandscan,Advanced subdomain scanner +dns2tcp,https://github.com/alex-sector/dns2tcp,dns2tcp is a tool for relaying TCP connections over DNS. +dnschef,https://github.com/iphelix/dnschef,Tool for DNS MITM attacks +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +dnsx,https://github.com/projectdiscovery/dnsx,A tool for DNS reconnaissance that can help identify subdomains and other related domains. +donpapi,https://github.com/login-securite/DonPAPI,Dumping revelant information on compromised targets without AV detection +dploot,https://github.com/zblurx/dploot,dploot is Python rewrite of SharpDPAPI written un C#. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +eaphammer,https://github.com/s0lst1c3/eaphammer,EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. +empire,https://github.com/BC-SECURITY/Empire,post-exploitation and adversary emulation framework +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +enyx,https://github.com/trickster0/enyx,Framework for building offensive security tools. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exif,https://exiftool.org/,Utility to read / write and edit metadata in image / audio and video files +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +exiv2,https://github.com/Exiv2/exiv2,Image metadata library and toolset +ExtractBitlockerKeys,https://github.com/p0dalirius/ExtractBitlockerKeys,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +fdisk,https://github.com/karelzak/util-linux,Collection of basic system utilities / including fdisk partitioning tool +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +fierce,https://github.com/mschwager/fierce,A DNS reconnaissance tool for locating non-contiguous IP space +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +foremost,https://doc.ubuntu-fr.org/foremost,Foremost is a forensic tool for recovering files based on their headers / footers / and internal data structures. +freeipscanner,https://github.com/scrt/freeipscanner,A simple bash script to enumerate stale ADIDNS entries +freerdp2-x11,https://github.com/FreeRDP/FreeRDP,FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license. +frida,https://github.com/frida/frida,Dynamic instrumentation toolkit +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +ghidra,https://github.com/NationalSecurityAgency/ghidra,Software reverse engineering suite of tools. +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gitleaks,https://github.com/trufflesecurity/gitleaks,Gitleaks scans hardcoded secrets in git repositories and folders. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gmsadumper,https://github.com/micahvandeusen/gMSADumper,A tool for extracting credentials and other information from a Microsoft Active Directory domain. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +godap,https://github.com/Macmod/godap,A complete TUI for LDAP. +goldencopy,https://github.com/Dramelac/GoldenCopy,Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +gosecretsdump,https://github.com/c-sto/gosecretsdump,Implements NTLMSSP network authentication protocol in Go +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +GPOddity,https://github.com/synacktiv/GPOddity,Aiming at automating GPO attack vectors through NTLM relaying (and more) +gpp-decrypt,https://github.com/t0thkr1s/gpp-decrypt,A tool to decrypt Group Policy Preferences passwords +gqrx,https://github.com/csete/gqrx,Software defined radio receiver powered by GNU Radio and Qt +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +hackrf,https://github.com/mossmann/hackrf,Low cost software defined radio platform +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hashonymize,https://github.com/ShutdownRepo/hashonymize,This small tool is aimed at anonymizing hashes files for offline but online cracking like Google Collab for instance (see https://github.com/ShutdownRepo/google-colab-hashcat). +Havoc,https://github.com/HavocFramework/Havoc,Command & Control Framework +hcxdumptool,https://github.com/ZerBea/hcxdumptool,Small tool to capture packets from wlan devices. +hcxtools,https://github.com/ZerBea/hcxtools,Tools for capturing and analyzing packets from WLAN devices. +hexedit,https://github.com/pixel/hexedit,View and edit binary files +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +hping3,https://github.com/antirez/hping,A network tool able to send custom TCP/IP packets +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +iptables,https://linux.die.net/man/8/iptables,Userspace command line tool for configuring kernel firewall +jackit,https://github.com/insecurityofthings/jackit,Exploit to take over a wireless mouse and keyboard +jadx,https://github.com/skylot/jadx,Java decompiler +jd-gui,https://github.com/java-decompiler/jd-gui,A standalone Java Decompiler GUI +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +KeePwn,https://github.com/Orange-Cyberdefense/KeePwn,KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. +kerbrute,https://github.com/ropnop/kerbrute,A tool to perform Kerberos pre-auth bruteforcing +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +krbjack,https://github.com/almandin/krbjack,A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. +krbrelayx,https://github.com/dirkjanm/krbrelayx,a tool for performing Kerberos relay attacks +kubectl,https://kubernetes.io/docs/reference/kubectl/overview/,Command-line interface for managing Kubernetes clusters. +ldapdomaindump,https://github.com/dirkjanm/ldapdomaindump,A tool for dumping domain data from an LDAP service +ldaprelayscan,https://github.com/zyn3rgy/LdapRelayScan,Check Domain Controllers for LDAP server protections regarding the relay of NTLM authentication. +ldapsearch,https://wiki.debian.org/LDAP/LDAPUtils,Search for and display entries (ldap) +ldapsearch-ad,https://github.com/yaap7/ldapsearch-ad,LDAP search utility with AD support +LDAPWordlistHarvester,https://github.com/p0dalirius/pyLDAPWordlistHarvester,Generate a wordlist from the information present in LDAP in order to crack passwords of domain accounts +ldeep,https://github.com/franc-pentest/ldeep,ldeep is a tool to discover hidden paths on Web servers. +legba,https://github.com/evilsocket/legba,a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust +libmspack,https://github.com/kyz/libmspack,C library for Microsoft compression formats. +libnfc,https://github.com/grundid/nfctools,Library for Near Field Communication (NFC) devices +libnfc-crypto1-crack,https://github.com/droidnewbie2/acr122uNFC,Implementation of cryptographic attack on Mifare Classic RFID cards +libusb-dev,https://github.com/libusb/libusb,Library for USB device access +ligolo-ng,https://github.com/nicocha30/ligolo-ng,An advanced yet simple tunneling tool that uses a TUN interface. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +lnkup,https://github.com/Plazmaz/lnkUp,This tool will allow you to generate LNK payloads. Upon rendering or being run they will exfiltrate data. +lsassy,https://github.com/Hackndo/lsassy,Windows secrets and passwords extraction tool. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mariadb-client,https://github.com/MariaDB/server,MariaDB is a community-developed fork of the MySQL relational database management system. The mariadb-client package includes command-line utilities for interacting with a MariaDB server. +masky,https://github.com/Z4kSec/Masky,Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX or NT hashes and TGT on a larger scope +masscan,https://github.com/robertdavidgraham/masscan,Masscan is an Internet-scale port scanner +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +mfcuk,https://github.com/nfc-tools/mfcuk,Implementation of an attack on Mifare Classic and Plus RFID cards +mfdread,https://github.com/zhovner/mfdread,Tool for reading/writing Mifare RFID tags +mfoc,https://github.com/nfc-tools/mfoc,Implementation of 'offline nested' attack by Nethemba +minicom,https://doc.ubuntu-fr.org/minicom,Minicom is a text-based serial communication program for Unix-like operating systems. +mitm6,https://github.com/fox-it/mitm6,Tool to conduct a man-in-the-middle attack against IPv6 protocols. +mitmproxy,https://github.com/mitmproxy/mitmproxy,mitmproxy is an interactive SSL/TLS-capable intercepting proxy with a console interface for HTTP/1 HTTP/2 and WebSockets. +mobsf,https://github.com/MobSF/Mobile-Security-Framework-MobSF,Automated and all-in-one mobile application (Android/iOS/Windows) pen-testing malware analysis and security assessment framework +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +mousejack,https://github.com/BastilleResearch/mousejack,Exploit to take over a wireless mouse and keyboard +msprobe,https://github.com/puzzlepeaches/msprobe,msprobe is a tool to identify Microsoft Windows hosts and servers that are running certain services. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +nbtscan,https://github.com/charlesroelli/nbtscan,NBTscan is a program for scanning IP networks for NetBIOS name information. +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netdiscover,https://github.com/netdiscover-scanner/netdiscover,netdiscover is an active/passive address reconnaissance tool +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nfct,https://github.com/grundid/nfctools,Tool for Near Field Communication (NFC) devices +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nmap-parse-ouptut,https://github.com/ernw/nmap-parse-output,Converts/manipulates/extracts data from a Nmap scan output. +noPac,https://github.com/Ridter/noPac,Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user. +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +ntlmv1-multi,https://github.com/evilmog/ntlmv1-multi,Exploit a vulnerability in Microsoft Windows to gain system-level access. +ntlm_theft,https://github.com/Greenwolf/ntlm_theft,A tool for generating multiple types of NTLMv2 hash theft files +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +oaburl,https://gist.githubusercontent.com/snovvcrash/4e76aaf2a8750922f546eed81aa51438/raw/96ec2f68a905eed4d519d9734e62edba96fd15ff/oaburl.py,Find Open redirects and other vulnerabilities. +objection,https://github.com/sensepost/objection,Runtime mobile exploration +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +onesixtyone,https://github.com/trailofbits/onesixtyone,onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. +OpenVPN,https://openvpn.net/,Fast and Easy Zero-Trust VPN Fully in Your Control +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +PassTheCert,https://github.com/AlmondOffSec/PassTheCert,PassTheCert is a tool to extract Active Directory user password hashes from a domain controller's local certificate store. +patator,https://github.com/lanjelot/patator,Login scanner. +pcredz,https://github.com/lgandx/PCredz,PowerShell credential dumper +pcsc,https://pcsclite.apdu.fr/,Middleware for smart card readers +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +peepdf,https://github.com/jesparza/peepdf,peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. +petitpotam,https://github.com/topotam/PetitPotam,Windows machine account manipulation +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pkinittools,https://github.com/dirkjanm/PKINITtools,Pkinit support tools +polenum,https://github.com/Wh1t3Fox/polenum,Polenum is a Python script which uses the Impacket library to extract user information through the SMB protocol. +postman,https://www.postman.com/,API platform for testing APIs +powershell,https://github.com/PowerShell/PowerShell,a command-line shell and scripting language designed for system administration and automation +Powerview.py,https://github.com/aniqfakhrul/powerview.py,PowerView.py is an alternative for the awesome original PowerView.ps1 script. +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +pre2k,https://github.com/garrettfoster13/pre2k,pre2k is a tool to check if a Windows domain has any pre-2000 Windows 2000 logon names still in use. +pretender,https://github.com/RedTeamPentesting/pretender,an mitm tool for helping with relay attacks. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +privexchange,https://github.com/dirkjanm/PrivExchange,a tool to perform attacks against Microsoft Exchange server using NTLM relay techniques +prowler,https://github.com/prowler-cloud/prowler,Perform Cloud Security best practices assessments / audits / incident response / compliance / continuous monitoring / hardening and forensics readiness. +proxmark3,https://github.com/RfidResearchGroup/proxmark3,Open source RFID research toolkit. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pst-utils,https://manpages.debian.org/jessie/pst-utils/readpst.1,pst-utils is a set of tools for working with Outlook PST files. +pwncat,https://github.com/calebstewart/pwncat,A lightweight and versatile netcat alternative that includes various additional features. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwndbg,https://github.com/pwndbg/pwndbg,a GDB plugin that makes debugging with GDB suck less +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pwninit,https://github.com/io12/pwninit,A tool for automating starting binary exploit challenges +pwntools,https://github.com/Gallopsled/pwntools,a CTF framework and exploit development library +pyFindUncommonShares,https://github.com/p0dalirius/pyFindUncommonShares,Script that can help identify shares that are not commonly found on a Windows system. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pygpoabuse,https://github.com/Hackndo/pyGPOAbuse,A tool for abusing GPO permissions to escalate privileges +pykek,https://github.com/preempt/pykek,PyKEK (Python Kerberos Exploitation Kit) a python library to manipulate KRB5-related data. +pylaps,https://github.com/p0dalirius/pylaps,Utility for enumerating and querying LDAP servers. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +pypykatz,https://github.com/skelsec/pypykatz,a Python library for mimikatz-like functionality +pyrit,https://github.com/JPaulMora/Pyrit,Python-based WPA/WPA2-PSK attack tool. +pysnaffler,https://github.com/skelsec/pysnaffler,Snaffler. But in python. +pywerview,https://github.com/the-useless-one/pywerview,A (partial) Python rewriting of PowerSploit's PowerView. +pywhisker,https://github.com/ShutdownRepo/pywhisker,PyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control over that object. It's based on Impacket and on a Python equivalent of Michael Grafnetter's DSInternals called PyDSInternals made by podalirius. +pywsus,https://github.com/GoSecure/pywsus,Python implementation of a WSUS client +radare2,https://github.com/radareorg/radare2,A complete framework for reverse-engineering and analyzing binaries +rdesktop,https://github.com/rdesktop/rdesktop,rdesktop is a client for Remote Desktop Protocol (RDP) used in a number of Microsoft products including Windows NT Terminal Server / Windows 2000 Server / Windows XP and Windows 2003 Server. +reaver,https://github.com/t6x/reaver-wps-fork-t6x,reaver is a tool for brute-forcing WPS (Wireless Protected Setup) PINs. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +redis-tools,https://github.com/antirez/redis-tools,redis-tools is a collection of Redis client utilities including redis-cli and redis-benchmark. +remmina,https://github.com/FreeRDP/Remmina,Remote desktop client. +RemoteMonologue,https://github.com/3lp4tr0n/RemoteMonologue,A tool to coerce NTLM authentications via DCOM +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +ROADrecon,https://github.com/dirkjanm/ROADtools#roadrecon,Azure AD recon for red and blue. +ROADtx,https://github.com/dirkjanm/ROADtools#roadtools-token-exchange-roadtx,ROADtools Token eXchange. +roastinthemiddle,https://github.com/Tw1sm/RITM,RoastInTheMiddle is a tool to intercept and relay NTLM authentication requests. +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +routersploit,https://github.com/threat9/routersploit,Security audit tool for routers. +RsaCracker,https://github.com/skyf0l/RsaCracker,Powerful RSA cracker for CTFs. Supports RSA - X509 - OPENSSH in PEM and DER formats. +rsactftool,https://github.com/RsaCtfTool/RsaCtfTool,The rsactftool tool is used for RSA cryptographic operations and analysis. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +rtl-433,https://github.com/merbanan/rtl_433,Tool for decoding various wireless protocols/ signals such as those used by weather stations +ruler,https://github.com/sensepost/ruler,Outlook Rules exploitation framework. +rusthound,https://github.com/NH-RED-TEAM/RustHound,BloodHound ingestor in Rust. +rusthound-ce,https://github.com/g0h4n/RustHound-CE,BloodHound-CE ingestor in Rust. +rustscan,https://github.com/RustScan/RustScan,The Modern Port Scanner +samdump2,https://github.com/azan121468/SAMdump2,A tool to dump Windows NT/2k/XP/Vista password hashes from SAM files +sccmhunter,https://github.com/garrettfoster13/sccmhunter,SCCMHunter is a post-ex tool built to streamline identifying profiling and attacking SCCM related assets in an Active Directory domain. +sccmsecrets,https://github.com/synacktiv/SCCMSecrets,SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting and initial access and lateral movement. +sccmwtf,https://github.com/xpn/sccmwtf,This code is designed for exploring SCCM in a lab. +scout,https://github.com/nccgroup/ScoutSuite,Scout Suite is an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments. +scrcpy,https://github.com/Genymobile/scrcpy,Display and control your Android device. +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shadowcoerce,https://github.com/ShutdownRepo/shadowcoerce,Utility for bypassing the Windows Defender antivirus by hiding a process within a legitimate process. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +shuffledns,https://github.com/projectdiscovery/shuffledns,A fast and customizable DNS resolver that can be used for subdomain enumeration and other tasks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +sipvicious,https://github.com/enablesecurity/sipvicious,Enumeration and MITM tool for SIP devices +sleuthkit,https://github.com/sleuthkit/sleuthkit,Forensic toolkit to analyze volume and file system data +sliver,https://github.com/BishopFox/sliver,Open source / cross-platform and extensible C2 framework +smali,https://github.com/JesusFreke/smali,A tool to disassemble and assemble Android's dex files +smartbrute,https://github.com/ShutdownRepo/SmartBrute,The smart password spraying and bruteforcing tool for Active Directory Domain Services. +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbclient-ng,https://github.com/p0dalirius/smbclient-ng,smbclient-ng is a fast and user friendly way to interact with SMB shares. +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +smtp-user-enum,https://github.com/pentestmonkey/smtp-user-enum,A tool to enumerate email addresses via SMTP +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sprayhound,https://github.com/Hackndo/Sprayhound,Active Directory password audit tool. +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +ssh-audit,https://github.com/jtesta/ssh-audit,ssh-audit is a tool to test SSH server configuration for best practices. +sshuttle,https://github.com/sshuttle/sshuttle,Transparent proxy server that tunnels traffic through an SSH server +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +steghide,https://github.com/StefanoDeVuono/steghide,steghide is a steganography program that is able to hide data in various kinds of image and audio files. +stegolsb,https://github.com/KyTn/STEGOLSB,Steganography tool to hide data in BMP images using least significant bit algorithm +stegosuite,https://github.com/osde8info/stegosuite,Stegosuite is a free steganography tool that allows you to hide data in image and audio files. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +tailscale,https://github.com/tailscale/tailscale,A secure and easy-to-use VPN alternative that is designed for teams and businesses. +targetedKerberoast,https://github.com/ShutdownRepo/targetedKerberoast,Kerberoasting against specific accounts +tcpdump,https://github.com/the-tcpdump-group/tcpdump,a powerful command-line packet analyzer for Unix-like systems +TeamsPhisher,https://github.com/Octoberfest7/TeamsPhisher,TeamsPhisher is a Python3 program that facilitates the delivery of phishing messages and attachments to Microsoft Teams users whose organizations allow external communications. +testdisk,https://github.com/cgsecurity/testdisk,Partition recovery and file undelete utility +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-map,https://github.com/sec-it/tls-map,tls-map is a library for mapping TLS cipher algorithm names. +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +traceroute,https://github.com/iputils/iputils,Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trid,https://mark0.net/soft-trid-e.html,File identifier +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +trufflehog,https://github.com/trufflesecurity/trufflehog,Find verify and analyze hardcoded secrets in git repositories folders buckets and more. +tshark,https://github.com/wireshark/wireshark,TShark is a terminal version of Wireshark. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +udpx,https://github.com/nullt3r/udpx, Fast and lightweight - UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability to add custom ones. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +upx,https://github.com/upx/upx,UPX is an advanced executable packer +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +Villain,https://github.com/t3l3machus/Villain,Command & Control Framework +volatility2,https://github.com/volatilityfoundation/volatility,Volatile memory extraction utility framework +volatility3,https://github.com/volatilityfoundation/volatility3,Advanced memory forensics framework +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +webclientservicescanner,https://github.com/Hackndo/webclientservicescanner,Scans for web service endpoints +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wifite2,https://github.com/derv82/wifite2,Script for auditing wireless networks. +windapsearch-go,https://github.com/ropnop/go-windapsearch/,Active Directory enumeration tool. +wireguard,https://www.wireguard.com,WireGuard is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography +wireshark,https://github.com/wireshark/wireshark,Wireshark is a network protocol analyzer that lets you see what’s happening on your network at a microscopic level. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +xtightvncviewer,https://www.commandlinux.com/man-page/man1/xtightvncviewer.1.html,xtightvncviewer is an open source VNC client software. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +zerologon,https://github.com/SecuraBV/CVE-2020-1472,Exploit for the Zerologon vulnerability (CVE-2020-1472). +zipalign,https://developer.android.com/studio/command-line/zipalign,arguably the most important step to optimize your APK file +zsteg,https://github.com/zed-0xff/zsteg,Detect steganography hidden in PNG and BMP images diff --git a/docs/src/public/installed_tools/lists/light_3.1.0_amd64.csv b/docs/src/public/installed_tools/lists/light_3.1.0_amd64.csv new file mode 100644 index 00000000..28aca419 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.0_amd64.csv @@ -0,0 +1,52 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.0_arm64.csv b/docs/src/public/installed_tools/lists/light_3.1.0_arm64.csv new file mode 100644 index 00000000..28aca419 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.0_arm64.csv @@ -0,0 +1,52 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.1_amd64.csv b/docs/src/public/installed_tools/lists/light_3.1.1_amd64.csv new file mode 100644 index 00000000..28aca419 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.1_amd64.csv @@ -0,0 +1,52 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.1_arm64.csv b/docs/src/public/installed_tools/lists/light_3.1.1_arm64.csv new file mode 100644 index 00000000..28aca419 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.1_arm64.csv @@ -0,0 +1,52 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/mpgn/CrackMapExec,Network scanner. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.2_amd64.csv b/docs/src/public/installed_tools/lists/light_3.1.2_amd64.csv new file mode 100644 index 00000000..e3c2ea35 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.2_amd64.csv @@ -0,0 +1,45 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.2_arm64.csv b/docs/src/public/installed_tools/lists/light_3.1.2_arm64.csv new file mode 100644 index 00000000..e3c2ea35 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.2_arm64.csv @@ -0,0 +1,45 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.3_amd64.csv b/docs/src/public/installed_tools/lists/light_3.1.3_amd64.csv new file mode 100644 index 00000000..e3c2ea35 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.3_amd64.csv @@ -0,0 +1,45 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.3_arm64.csv b/docs/src/public/installed_tools/lists/light_3.1.3_arm64.csv new file mode 100644 index 00000000..e3c2ea35 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.3_arm64.csv @@ -0,0 +1,45 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.4_amd64.csv b/docs/src/public/installed_tools/lists/light_3.1.4_amd64.csv new file mode 100644 index 00000000..e3c2ea35 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.4_amd64.csv @@ -0,0 +1,45 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.4_arm64.csv b/docs/src/public/installed_tools/lists/light_3.1.4_arm64.csv new file mode 100644 index 00000000..e3c2ea35 --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.4_arm64.csv @@ -0,0 +1,45 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +crackmapexec,https://github.com/Porchetta-Industries/CrackMapExec,Network scanner. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.5_amd64.csv b/docs/src/public/installed_tools/lists/light_3.1.5_amd64.csv new file mode 100644 index 00000000..0e9b71df --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.5_amd64.csv @@ -0,0 +1,44 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.5_arm64.csv b/docs/src/public/installed_tools/lists/light_3.1.5_arm64.csv new file mode 100644 index 00000000..0e9b71df --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.5_arm64.csv @@ -0,0 +1,44 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/light_3.1.6_amd64.csv b/docs/src/public/installed_tools/lists/light_3.1.6_amd64.csv new file mode 100644 index 00000000..2731637c --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.6_amd64.csv @@ -0,0 +1,51 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. \ No newline at end of file diff --git a/docs/src/public/installed_tools/lists/light_3.1.6_arm64.csv b/docs/src/public/installed_tools/lists/light_3.1.6_arm64.csv new file mode 100644 index 00000000..2731637c --- /dev/null +++ b/docs/src/public/installed_tools/lists/light_3.1.6_arm64.csv @@ -0,0 +1,51 @@ +Tool,Link,Description +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +autorecon,https://github.com/Tib3rius/AutoRecon,Multi-threaded network reconnaissance tool which performs automated enumeration of services. +bloodhound,https://github.com/BloodHoundAD/BloodHound,Active Directory security tool for reconnaissance and attacking AD environments. +bloodhound.py,https://github.com/fox-it/BloodHound.py,BloodHound ingestor in Python. +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +coercer,https://github.com/p0dalirius/coercer,DFS-R target coercion tool +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +enum4linux-ng,https://github.com/cddmp/enum4linux-ng,Tool for enumerating information from Windows and Samba systems. +evilwinrm,https://github.com/Hackplayers/evil-winrm,Tool to connect to a remote Windows system with WinRM. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +hydra,https://github.com/vanhauser-thc/thc-hydra,Hydra is a parallelized login cracker which supports numerous protocols to attack. +impacket,https://github.com/ThePorgs/impacket,Set of tools for working with network protocols (ThePorgs version). +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +metasploit,https://github.com/rapid7/metasploit-framework,A popular penetration testing framework that includes many exploits and payloads +neo4j,https://github.com/neo4j/neo4j,Database. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +netexec,https://github.com/Pennyw0rth/NetExec,Network scanner (Crackmapexec updated). +nmap,https://nmap.org,The Network Mapper - a powerful network discovery and security auditing tool +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +proxychains,https://github.com/rofl0r/proxychains,Proxy chains - redirect connections through proxy servers. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +responder,https://github.com/lgandx/Responder,a LLMNR / NBT-NS and MDNS poisoner. +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smbclient,https://github.com/samba-team/samba,SMBclient is a command-line utility that allows you to access Windows shared resources +smbmap,https://github.com/ShawnDEvans/smbmap,A tool to enumerate SMB shares and check for null sessions +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. \ No newline at end of file diff --git a/source/assets/installed_tools/lists/light_3.1.6_amd64.csv b/docs/src/public/installed_tools/lists/light_3.1.7_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.6_amd64.csv rename to docs/src/public/installed_tools/lists/light_3.1.7_amd64.csv diff --git a/source/assets/installed_tools/lists/light_3.1.6_arm64.csv b/docs/src/public/installed_tools/lists/light_3.1.7_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/light_3.1.6_arm64.csv rename to docs/src/public/installed_tools/lists/light_3.1.7_arm64.csv diff --git a/docs/src/public/installed_tools/lists/osint_3.1.0_amd64.csv b/docs/src/public/installed_tools/lists/osint_3.1.0_amd64.csv new file mode 100644 index 00000000..07d34994 --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.0_amd64.csv @@ -0,0 +1,54 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. diff --git a/docs/src/public/installed_tools/lists/osint_3.1.0_arm64.csv b/docs/src/public/installed_tools/lists/osint_3.1.0_arm64.csv new file mode 100644 index 00000000..9a782357 --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.0_arm64.csv @@ -0,0 +1,53 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. diff --git a/docs/src/public/installed_tools/lists/osint_3.1.1_amd64.csv b/docs/src/public/installed_tools/lists/osint_3.1.1_amd64.csv new file mode 100644 index 00000000..07d34994 --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.1_amd64.csv @@ -0,0 +1,54 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. diff --git a/docs/src/public/installed_tools/lists/osint_3.1.1_arm64.csv b/docs/src/public/installed_tools/lists/osint_3.1.1_arm64.csv new file mode 100644 index 00000000..9a782357 --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.1_arm64.csv @@ -0,0 +1,53 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. diff --git a/docs/src/public/installed_tools/lists/osint_3.1.2_amd64.csv b/docs/src/public/installed_tools/lists/osint_3.1.2_amd64.csv new file mode 100644 index 00000000..c92b998b --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.2_amd64.csv @@ -0,0 +1,66 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/osint_3.1.2_arm64.csv b/docs/src/public/installed_tools/lists/osint_3.1.2_arm64.csv new file mode 100644 index 00000000..df4c45db --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.2_arm64.csv @@ -0,0 +1,65 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/osint_3.1.3_amd64.csv b/docs/src/public/installed_tools/lists/osint_3.1.3_amd64.csv new file mode 100644 index 00000000..c92b998b --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.3_amd64.csv @@ -0,0 +1,66 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/osint_3.1.3_arm64.csv b/docs/src/public/installed_tools/lists/osint_3.1.3_arm64.csv new file mode 100644 index 00000000..df4c45db --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.3_arm64.csv @@ -0,0 +1,65 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/osint_3.1.4_amd64.csv b/docs/src/public/installed_tools/lists/osint_3.1.4_amd64.csv new file mode 100644 index 00000000..2d3a1edc --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.4_amd64.csv @@ -0,0 +1,67 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/osint_3.1.4_arm64.csv b/docs/src/public/installed_tools/lists/osint_3.1.4_arm64.csv new file mode 100644 index 00000000..40b96192 --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.4_arm64.csv @@ -0,0 +1,66 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/osint_3.1.5_amd64.csv b/docs/src/public/installed_tools/lists/osint_3.1.5_amd64.csv new file mode 100644 index 00000000..7474a237 --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.5_amd64.csv @@ -0,0 +1,68 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/osint_3.1.5_arm64.csv b/docs/src/public/installed_tools/lists/osint_3.1.5_arm64.csv new file mode 100644 index 00000000..ebd26587 --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.5_arm64.csv @@ -0,0 +1,67 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/osint_3.1.6_amd64.csv b/docs/src/public/installed_tools/lists/osint_3.1.6_amd64.csv new file mode 100644 index 00000000..d1320588 --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.6_amd64.csv @@ -0,0 +1,69 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes \ No newline at end of file diff --git a/docs/src/public/installed_tools/lists/osint_3.1.6_arm64.csv b/docs/src/public/installed_tools/lists/osint_3.1.6_arm64.csv new file mode 100644 index 00000000..7fdc60d7 --- /dev/null +++ b/docs/src/public/installed_tools/lists/osint_3.1.6_arm64.csv @@ -0,0 +1,68 @@ +Tool,Link,Description +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes \ No newline at end of file diff --git a/source/assets/installed_tools/lists/osint_3.1.6_amd64.csv b/docs/src/public/installed_tools/lists/osint_3.1.7_amd64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.6_amd64.csv rename to docs/src/public/installed_tools/lists/osint_3.1.7_amd64.csv diff --git a/source/assets/installed_tools/lists/osint_3.1.6_arm64.csv b/docs/src/public/installed_tools/lists/osint_3.1.7_arm64.csv similarity index 100% rename from source/assets/installed_tools/lists/osint_3.1.6_arm64.csv rename to docs/src/public/installed_tools/lists/osint_3.1.7_arm64.csv diff --git a/docs/src/public/installed_tools/lists/web_3.1.0_amd64.csv b/docs/src/public/installed_tools/lists/web_3.1.0_amd64.csv new file mode 100644 index 00000000..3f83ed22 --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.0_amd64.csv @@ -0,0 +1,142 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +vulny-code-static-analysis,https://github.com/swisskyrepo/Vulny-Code-Static-Analysis,Static analysis tool for C code +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/web_3.1.0_arm64.csv b/docs/src/public/installed_tools/lists/web_3.1.0_arm64.csv new file mode 100644 index 00000000..11fd927d --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.0_arm64.csv @@ -0,0 +1,141 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +vulny-code-static-analysis,https://github.com/swisskyrepo/Vulny-Code-Static-Analysis,Static analysis tool for C code +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/web_3.1.1_amd64.csv b/docs/src/public/installed_tools/lists/web_3.1.1_amd64.csv new file mode 100644 index 00000000..3f83ed22 --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.1_amd64.csv @@ -0,0 +1,142 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +vulny-code-static-analysis,https://github.com/swisskyrepo/Vulny-Code-Static-Analysis,Static analysis tool for C code +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/web_3.1.1_arm64.csv b/docs/src/public/installed_tools/lists/web_3.1.1_arm64.csv new file mode 100644 index 00000000..11fd927d --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.1_arm64.csv @@ -0,0 +1,141 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +ascii,https://github.com/moul/ascii,ASCII command-line tool to replace images with color-coded ASCII art. +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,Exploit a vulnerable Samba service to gain root access. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +infoga,https://github.com/m4ll0k/Infoga,Information gathering tool for hacking. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken.git,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rockyou,https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt,A password dictionary used by most hackers +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +vulny-code-static-analysis,https://github.com/swisskyrepo/Vulny-Code-Static-Analysis,Static analysis tool for C code +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. diff --git a/docs/src/public/installed_tools/lists/web_3.1.2_amd64.csv b/docs/src/public/installed_tools/lists/web_3.1.2_amd64.csv new file mode 100644 index 00000000..b0302453 --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.2_amd64.csv @@ -0,0 +1,156 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/web_3.1.2_arm64.csv b/docs/src/public/installed_tools/lists/web_3.1.2_arm64.csv new file mode 100644 index 00000000..d6038e7b --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.2_arm64.csv @@ -0,0 +1,155 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/web_3.1.3_amd64.csv b/docs/src/public/installed_tools/lists/web_3.1.3_amd64.csv new file mode 100644 index 00000000..b0302453 --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.3_amd64.csv @@ -0,0 +1,156 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/web_3.1.3_arm64.csv b/docs/src/public/installed_tools/lists/web_3.1.3_arm64.csv new file mode 100644 index 00000000..d6038e7b --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.3_arm64.csv @@ -0,0 +1,155 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/web_3.1.4_amd64.csv b/docs/src/public/installed_tools/lists/web_3.1.4_amd64.csv new file mode 100644 index 00000000..9869377d --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.4_amd64.csv @@ -0,0 +1,157 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/web_3.1.4_arm64.csv b/docs/src/public/installed_tools/lists/web_3.1.4_arm64.csv new file mode 100644 index 00000000..288d65bc --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.4_arm64.csv @@ -0,0 +1,156 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/web_3.1.5_amd64.csv b/docs/src/public/installed_tools/lists/web_3.1.5_amd64.csv new file mode 100644 index 00000000..fa1a5d0a --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.5_amd64.csv @@ -0,0 +1,161 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +postman,https://www.postman.com/,API platform for testing APIs +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/docs/src/public/installed_tools/lists/web_3.1.5_arm64.csv b/docs/src/public/installed_tools/lists/web_3.1.5_arm64.csv new file mode 100644 index 00000000..dd316cc8 --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.5_arm64.csv @@ -0,0 +1,160 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +Blackbird,https://github.com/p1ngul1n0/blackbird,An OSINT tool to search fast for accounts by username across 581 sites. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +buster,https://github.com/sham00n/Buster,Advanced OSINT tool +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +postman,https://www.postman.com/,API platform for testing APIs +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +tls-scanner,https://github.com/tls-attacker/tls-scanner,a simple script to check the security of a remote TLS/SSL web server +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +trilium,https://github.com/zadam/trilium,Personal knowledge management system. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes diff --git a/source/assets/installed_tools/lists/web_3.1.6_amd64.csv b/docs/src/public/installed_tools/lists/web_3.1.6_amd64.csv similarity index 99% rename from source/assets/installed_tools/lists/web_3.1.6_amd64.csv rename to docs/src/public/installed_tools/lists/web_3.1.6_amd64.csv index e63cf233..6d22eceb 100644 --- a/source/assets/installed_tools/lists/web_3.1.6_amd64.csv +++ b/docs/src/public/installed_tools/lists/web_3.1.6_amd64.csv @@ -168,4 +168,4 @@ Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes -Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. \ No newline at end of file diff --git a/source/assets/installed_tools/lists/web_3.1.6_arm64.csv b/docs/src/public/installed_tools/lists/web_3.1.6_arm64.csv similarity index 99% rename from source/assets/installed_tools/lists/web_3.1.6_arm64.csv rename to docs/src/public/installed_tools/lists/web_3.1.6_arm64.csv index 23352aef..14829f5a 100644 --- a/source/assets/installed_tools/lists/web_3.1.6_arm64.csv +++ b/docs/src/public/installed_tools/lists/web_3.1.6_arm64.csv @@ -167,4 +167,4 @@ Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes -Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. \ No newline at end of file diff --git a/docs/src/public/installed_tools/lists/web_3.1.7_amd64.csv b/docs/src/public/installed_tools/lists/web_3.1.7_amd64.csv new file mode 100644 index 00000000..6268bcb0 --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.7_amd64.csv @@ -0,0 +1,171 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +BBOT,https://github.com/blacklanternsecurity/bbot,BEE·bot is a multipurpose scanner inspired by Spiderfoot built to automate your Recon and ASM. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +constellation,https://github.com/constellation-app/Constellation,Find and exploit vulnerabilities in mobile applications. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gitleaks,https://github.com/trufflesecurity/gitleaks,Gitleaks scans hardcoded secrets in git repositories and folders. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +postman,https://www.postman.com/,API platform for testing APIs +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +trufflehog,https://github.com/trufflesecurity/trufflehog,Find verify and analyze hardcoded secrets in git repositories folders buckets and more. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. diff --git a/docs/src/public/installed_tools/lists/web_3.1.7_arm64.csv b/docs/src/public/installed_tools/lists/web_3.1.7_arm64.csv new file mode 100644 index 00000000..3091868a --- /dev/null +++ b/docs/src/public/installed_tools/lists/web_3.1.7_arm64.csv @@ -0,0 +1,170 @@ +Tool,Link,Description +amass,https://github.com/OWASP/Amass,A DNS enumeration / attack surface mapping & external assets discovery tool +anew,https://github.com/tomnomnom/anew,A simple tool for filtering and manipulating text data / such as log files and other outputs. +arjun,https://github.com/s0md3v/Arjun,HTTP parameter discovery suite. +arsenal,https://github.com/Orange-Cyberdefense/arsenal,Powerful weapons for penetration testing. +asdf,https://github.com/asdf-vm/asdf,Extendable version manager with support for ruby python go etc +assetfinder,https://github.com/tomnomnom/assetfinder,Tool to find subdomains and IP addresses associated with a domain. +BBOT,https://github.com/blacklanternsecurity/bbot,BEE·bot is a multipurpose scanner inspired by Spiderfoot built to automate your Recon and ASM. +bolt,https://github.com/s0md3v/bolt,Bolt crawls the target website to the specified depth and stores all the HTML forms found in a database for further processing. +brakeman,https://github.com/presidentbeef/brakeman,Static analysis tool for Ruby on Rails applications +bruteforce-luks,https://github.com/glv2/bruteforce-luks,A tool to help recover encrypted LUKS2 containers +burpsuite,https://portswigger.net/burp,Web application security testing tool. +byp4xx,https://github.com/lobuhi/byp4xx,A Swiss Army knife for bypassing web application firewalls and filters. +carbon14,https://github.com/Lazza/carbon14,OSINT tool for estimating when a web page was written. +Censys,https://github.com/censys/censys-python,An easy-to-use and lightweight API wrapper for Censys APIs +cewl,https://digi.ninja/projects/cewl.php,Generates custom wordlists by spidering a target's website and parsing the results +cewler,https://github.com/roys/cewler,CeWL alternative in Python +cloudfail,https://github.com/m0rtem/CloudFail,a reconnaissance tool for identifying misconfigured CloudFront domains. +clusterd,https://github.com/hatRiot/clusterd,A tool to distribute and remotely manage Hacking Team's RCS agents. +cmsmap,https://github.com/Dionach/CMSmap,Tool for security audit of web content management systems. +corscanner,https://github.com/chenjj/CORScanner,a Python script for finding CORS misconfigurations. +creds,https://github.com/ihebski/DefaultCreds-cheat-sheet,One place for all the default credentials to assist pentesters during an engagement. This document has several products default login/password gathered from multiple sources. +crunch,https://github.com/crunchsec/crunch,A wordlist generator where you can specify a standard character set or a character set you specify. +cupp,https://github.com/Mebus/cupp,Cupp is a tool used to generate personalized password lists based on target information. +CyberChef,https://github.com/gchq/CyberChef/,The Cyber Swiss Army Knife +dirb,https://github.com/v0re/dirb,Web Content Scanner +dirsearch,https://github.com/maurosoria/dirsearch,Tool for searching files and directories on a web site. +dnsenum,https://github.com/fwaeytens/dnsenum,dnsenum is a tool for enumerating DNS information about a domain. +droopescan,https://github.com/droope/droopescan,Scan Drupal websites for vulnerabilities. +drupwn,https://github.com/immunIT/drupwn,Drupal security scanner. +exegol-history,https://github.com/ThePorgs/Exegol-history,Credentials management for Exegol +exifprobe,https://github.com/hfiguiere/exifprobe,Exifprobe is a command-line tool to parse EXIF data from image files. +exiftool,https://github.com/exiftool/exiftool,ExifTool is a Perl library and command-line tool for reading / writing and editing meta information in image / audio and video files. +eyewitness,https://github.com/FortyNorthSecurity/EyeWitness,a tool to take screenshots of websites / provide some server header info / and identify default credentials if possible. +fcrackzip,https://github.com/hyc/fcrackzip,Password cracker for zip archives. +feroxbuster,https://github.com/epi052/feroxbuster,Simple / fast and recursive content discovery tool +ffuf,https://github.com/ffuf/ffuf,Fast web fuzzer written in Go. +finalrecon,https://github.com/thewhiteh4t/FinalRecon,A web reconnaissance tool that gathers information about web pages +findomain,https://github.com/findomain/findomain,The fastest and cross-platform subdomain enumerator. +firefox,https://www.mozilla.org,A web browser +fuxploider,https://github.com/almandin/fuxploider,a Python tool for finding and exploiting file upload forms/directories. +fzf,https://github.com/junegunn/fzf,🌸 A command-line fuzzy finder +gau,https://github.com/lc/gau,Fast tool for fetching URLs +genusernames,https://gitlab.com/-/snippets/2480505/raw/main/bash,GenUsername is a Python tool for generating a list of usernames based on a name or email address. +GeoPincer,https://github.com/tloja/GeoPincer,GeoPincer is a script that leverages OpenStreetMap's Overpass API in order to search for locations. +geowordlists,https://github.com/p0dalirius/GeoWordlists,tool to generate wordlists of passwords containing cities at a defined distance around the client city. +gf,https://github.com/tomnomnom/gf,A wrapper around grep to avoid typing common patterns +git-dumper,https://github.com/arthaud/git-dumper,Small script to dump a Git repository from a website. +githubemail,https://github.com/paulirish/github-email,a command-line tool to retrieve a user's email from Github. +gitleaks,https://github.com/trufflesecurity/gitleaks,Gitleaks scans hardcoded secrets in git repositories and folders. +gittools,https://github.com/internetwache/GitTools,A collection of Git tools including a powerful Dumper for dumping Git repositories. +gobuster,https://github.com/OJ/gobuster,Tool to discover hidden files and directories. +GoMapEnum,https://github.com/nodauf/GoMapEnum,Nothing new but existing techniques are brought together in one tool. +gopherus,https://github.com/tarunkant/Gopherus,Gopherus is a simple command line tool for exploiting vulnerable Gopher servers. +goshs,https://github.com/patrickhener/goshs,Goshs is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S with either self-signed certificate or user provided certificate and you can use HTTP basic auth. +gowitness,https://github.com/sensepost/gowitness,A website screenshot utility written in Golang. +gron,https://github.com/tomnomnom/gron,Make JSON greppable! +h2csmuggler,https://github.com/BishopFox/h2csmuggler,HTTP Request Smuggling tool using H2C upgrade +h8mail,https://github.com/khast3x/h8mail,Email OSINT and breach hunting. +haiti,https://github.com/noraj/haiti,haiti is a A CLI tool (and library) to identify hash types (hash type identifier). +hakrawler,https://github.com/hakluke/hakrawler,a fast web crawler for gathering URLs and other information from websites +hakrevdns,https://github.com/hakluke/hakrevdns,Reverse DNS lookup utility that can help with discovering subdomains and other information. +hashcat,https://hashcat.net/hashcat,A tool for advanced password recovery +Hob0Rules rules,https://github.com/praetorian-inc/Hob0Rules,Password cracking rules for Hashcat based on statistics and industry patterns +holehe,https://github.com/megadose/holehe,mail osint tool finding out if it is used on websites. +httpmethods,https://github.com/ShutdownRepo/httpmethods,Tool for exploiting HTTP methods (e.g. PUT / DELETE / etc.) +httprobe,https://github.com/tomnomnom/httprobe,A simple utility for enumerating HTTP and HTTPS servers. +httpx,https://github.com/projectdiscovery/httpx,A tool for identifying web technologies and vulnerabilities / including outdated software versions and weak encryption protocols. +ignorant,https://github.com/megadose/ignorant,holehe but for phone numbers. +imagemagick,https://github.com/ImageMagick/ImageMagick,ImageMagick is a free and open-source image manipulation tool used to create / edit / compose / or convert bitmap images. +ipinfo,https://github.com/ipinfo/cli,Get information about an IP address or hostname. +jdwp,https://github.com/IOActive/jdwp-shellifier,This exploitation script is meant to be used by pentesters against active JDWP service / in order to gain Remote Code Execution. +john,https://github.com/openwall/john,John the Ripper password cracker. +joomscan,https://github.com/rezasp/joomscan,A tool to enumerate Joomla-based websites +jsluice,https://github.com/BishopFox/jsluice,Extract URLs / paths / secrets and other interesting data from JavaScript source code. +jwt,https://github.com/ticarpi/jwt_tool,a command-line tool for working with JSON Web Tokens (JWTs) +kadimus,https://github.com/P0cL4bs/Kadimus,a tool for detecting and exploiting file upload vulnerabilities +katana,https://github.com/projectdiscovery/katana,A next-generation crawling and spidering framework. +kiterunner,https://github.com/assetnote/kiterunner,Tool for operating Active Directory environments. +Kraken,https://github.com/kraken-ng/Kraken,Kraken is a modular multi-language webshell focused on web post-exploitation and defense evasion. It supports three technologies (PHP / JSP and ASPX) and is core is developed in Python. +linkedin2username,https://github.com/initstring/linkedin2username,Generate a list of LinkedIn usernames from a company name. +linkfinder,https://github.com/GerbenJavado/LinkFinder,a Python script that finds endpoints and their parameters in JavaScript files. +maigret,https://github.com/soxoj/maigret,Collects information about a target email (or domain) from Google and Bing search results +maltego,https://www.paterva.com/web7/downloads.php,A tool used for open-source intelligence and forensics +mdcat,https://github.com/swsnr/mdcat,Fancy cat for Markdown +moodlescan,https://github.com/inc0d3/moodlescan,Scan Moodle sites for information and vulnerabilities. +MurMurHash,https://github.com/QU35T-code/MurMurHash,This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. +naabu,https://github.com/projectdiscovery/naabu,A fast and reliable port scanner that can detect open ports and services. +name-that-hash,https://github.com/HashPals/Name-That-Hash,Online tool for identifying hashes. +neovim,https://neovim.io/,hyperextensible Vim-based text editor +ngrok,https://github.com/inconshreveable/ngrok,Expose a local server behind a NAT or firewall to the internet +nosqlmap,https://github.com/codingo/NoSQLMap,a Python tool for testing NoSQL databases for security vulnerabilities. +NSAKEY rules,https://github.com/NSAKEY/nsa-rules,Password cracking rules and masks for hashcat +nuclei,https://github.com/projectdiscovery/nuclei,A fast and customizable vulnerability scanner that can detect a wide range of issues / including XSS / SQL injection / and misconfigured servers. +objectwalker,https://github.com/p0dalirius/objectwalker,A python module to explore the object tree to extract paths to interesting objects in memory. +oneforall,https://github.com/shmilylty/OneForAll,a powerful subdomain collection tool. +onelistforall,https://github.com/six2dez/OneListForAll,Rockyou for web fuzzing +OneRuleToRuleThemStill rules,https://github.com/stealthsploit/OneRuleToRuleThemStill,One rule to crack all passwords. A revamped - optimised and updated version of the original OneRuleToRuleThemAll hashcat rule +osrframework,https://github.com/i3visio/osrframework,Include references to a bunch of different applications related to username checking / DNS lookups / information leaks research / deep web search / regular expressions extraction and many others. +Pantagrule rules,https://github.com/rarecoil/pantagrule,large hashcat rulesets generated from real-world compromised passwords +pass,https://github.com/hashcat/hashcat,TODO +patator,https://github.com/lanjelot/patator,Login scanner. +pdfcrack,https://github.com/robins/pdfcrack,A tool for cracking password-protected PDF files +phoneinfoga,https://github.com/sundowndev/PhoneInfoga,Information gathering & OSINT framework for phone numbers. +photon,https://github.com/s0md3v/Photon,a fast web crawler which extracts URLs / files / intel & endpoints from a target. +PHP filter chain generator,https://github.com/synacktiv/php_filter_chain_generator,A CLI to generate PHP filters chain / get your RCE without uploading a file if you control entirely the parameter passed to a require or an include in PHP! +phpggc,https://github.com/ambionics/phpggc,Exploit generation tool for the PHP platform. +pkcrack,https://github.com/keyunluo/pkcrack,tool to generate wordlists of passwords containing cities at a defined distance around the client city +postman,https://www.postman.com/,API platform for testing APIs +pp-finder,https://github.com/yeswehack/pp-finder,Prototype pollution finder tool for javascript. pp-finder lets you find prototype pollution candidates in your code. +prips,https://manpages.ubuntu.com/manpages/focal/man1/prips.1.html,A utility for quickly generating IP ranges or enumerating hosts within a specified range. +pwndb,https://github.com/davidtavarez/pwndb,A command-line tool for searching the pwndb database of compromised credentials. +pwnedornot,https://github.com/thewhiteh4t/pwnedOrNot,Check if a password has been leaked in a data breach. +pyftpdlib,https://github.com/giampaolo/pyftpdlib/,Extremely fast and scalable Python FTP server library +pymeta,https://github.com/m8sec/pymeta,Google and Bing scraping osint tool +recon-ng,https://github.com/lanmaster53/recon-ng,External recon tool. +recondog,https://github.com/s0md3v/ReconDog,a reconnaissance tool for performing information gathering on a target. +rlwrap,https://github.com/hanslub42/rlwrap,rlwrap is a small utility that wraps input and output streams of executables / making it possible to edit and re-run input history +robotstester,https://github.com/p0dalirius/robotstester,Utility for testing whether a website's robots.txt file is correctly configured. +rsync,https://packages.debian.org/sid/rsync,File synchronization tool for efficiently copying and updating data between local or remote locations +searchsploit,https://gitlab.com/exploit-database/exploitdb,A command line search tool for Exploit-DB +seclists,https://github.com/danielmiessler/SecLists,A collection of multiple types of lists used during security assessments +semgrep,https://github.com/returntocorp/semgrep/,Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. +shellerator,https://github.com/ShutdownRepo/Shellerator,a simple command-line tool for generating shellcode +Sherlock,https://github.com/sherlock-project/sherlock,Hunt down social media accounts by username across social networks. +simplyemail,https://github.com/SimplySecurity/SimplyEmail,a scriptable command line tool for sending emails +smuggler,https://github.com/defparam/smuggler,Smuggler is a tool that helps pentesters and red teamers to smuggle data into and out of the network even when there are multiple layers of security in place. +SoapUI,https://github.com/SmartBear/soapui,SoapUI is the world's leading testing tool for API testing. +spiderfoot,https://github.com/smicallef/spiderfoot,A reconnaissance tool that automatically queries over 100 public data sources +sqlmap,https://github.com/sqlmapproject/sqlmap,Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws +sslscan,https://github.com/rbsec/sslscan,a tool for testing SSL/TLS encryption on servers +ssrfmap,https://github.com/swisskyrepo/SSRFmap,a tool for testing SSRF vulnerabilities. +subfinder,https://github.com/projectdiscovery/subfinder,Tool to find subdomains associated with a domain. +sublist3r,https://github.com/aboul3la/Sublist3r,a Python tool designed to enumerate subdomains of websites. +swaks,https://github.com/jetmore/swaks,Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. +symfony-exploits,https://github.com/ambionics/symfony-exploits,Collection of Symfony exploits and PoCs. +testssl,https://github.com/drwetter/testssl.sh,a tool for testing SSL/TLS encryption on servers +theharvester,https://github.com/laramies/theHarvester,Tool for gathering e-mail accounts / subdomain names / virtual host / open ports / banners / and employee names from different public sources +tig,https://github.com/jonas/tig,Tig is an ncurses-based text-mode interface for git. +timing,https://github.com/ffleming/timing_attack,Tool to generate a timing profile for a given command. +token-exploiter,https://github.com/psyray/token-exploiter,Token Exploiter is a tool designed to analyze GitHub Personal Access Tokens. +tomcatwardeployer,https://github.com/mgeeky/tomcatwardeployer,Script to deploy war file in Tomcat. +tor,https://github.com/torproject/tor,Anonymity tool that can help protect your privacy and online identity by routing your traffic through a network of servers. +toutatis,https://github.com/megadose/Toutatis,Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails / phone numbers and more. +trevorspray,https://github.com/blacklanternsecurity/TREVORspray,TREVORspray is a modular password sprayer with threading SSH proxying loot modules / and more +TriliumNext,https://github.com/TriliumNext/Notes,Personal knowledge management system (successor to Trilium). +trufflehog,https://github.com/trufflesecurity/trufflehog,Find verify and analyze hardcoded secrets in git repositories folders buckets and more. +uberfile,https://github.com/ShutdownRepo/Uberfile,Uberfile is a simple command-line tool aimed to help pentesters quickly generate file downloader one-liners in multiple contexts (wget / curl / powershell / certutil...). This project code is based on my other similar project for one-liner reverseshell generation Shellerator. +updog,https://github.com/sc0tfree/updog,Simple replacement for Python's SimpleHTTPServer. +uploader,https://github.com/Frozenka/uploader,Tool for quickly downloading files to a remote machine based on the target operating system +username-anarchy,https://github.com/urbanadventurer/username-anarchy,Tools for generating usernames when penetration testing. Usernames are half the password brute force problem. +wafw00f,https://github.com/EnableSecurity/wafw00f,a Python tool that helps to identify and fingerprint web application firewall (WAF) products. +waybackurls,https://github.com/tomnomnom/waybackurls,Fetch all the URLs that the Wayback Machine knows about for a domain. +weevely,https://github.com/epinna/weevely3,a webshell designed for post-exploitation purposes that can be extended over the network at runtime. +wesng,https://github.com/bitsadmin/wesng,WES-NG is a tool based on the output of Windows's systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to including any exploits for these vulnerabilities. +wfuzz,https://github.com/xmendez/wfuzz,WFuzz is a web application vulnerability scanner that allows you to find vulnerabilities using a wide range of attack payloads and fuzzing techniques +whatportis,https://github.com/ncrocfer/whatportis,Command-line tool to lookup port information +whatweb,https://github.com/urbanadventurer/WhatWeb,Next generation web scanner that identifies what websites are running. +whois,https://packages.debian.org/sid/whois,See information about a specific domain name or IP address. +wpscan,https://github.com/wpscanteam/wpscan,A tool to enumerate WordPress-based websites +wuzz,https://github.com/asciimoo/wuzz,a command-line tool for interacting with HTTP(S) web services +XSpear,https://github.com/hahwul/XSpear,a powerful XSS scanning and exploitation tool. +xsrfprobe,https://github.com/0xInfection/XSRFProbe,a tool for detecting and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities +xsser,https://github.com/epsylon/xsser,XSS scanner. +xsstrike,https://github.com/s0md3v/XSStrike,a Python tool for detecting and exploiting XSS vulnerabilities. +Yalis,https://github.com/EatonChips/yalis,Yet Another LinkedIn Scraper +youtubedl,https://github.com/ytdl-org/youtube-dl,Download videos from YouTube and other sites. +ysoserial,https://github.com/frohoff/ysoserial,A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. +yt-dlp,https://github.com/yt-dlp/yt-dlp,A youtube-dl fork with additional features and fixes +Zed Attack Proxy (ZAP),https://www.zaproxy.org/,Web application security testing tool. diff --git a/docs/src/public/installed_tools/nightly.csv b/docs/src/public/installed_tools/nightly.csv new file mode 100644 index 00000000..8f6202e2 --- /dev/null +++ b/docs/src/public/installed_tools/nightly.csv @@ -0,0 +1,3 @@ +Image tag,Version,Arch,Build date,Tools list +nightly,2a0d4418,amd64,"2025-07-04T19:42:12Z",[download]() +nightly,2a0d4418,arm64,"2025-07-04T19:14:06Z",[download]() diff --git a/docs/src/public/installed_tools/releases_amd64.csv b/docs/src/public/installed_tools/releases_amd64.csv new file mode 100644 index 00000000..d36e613f --- /dev/null +++ b/docs/src/public/installed_tools/releases_amd64.csv @@ -0,0 +1,41 @@ +Image tag,Version,Build date,Tools list +osint,3.1.7,"2025-06-04T08:57:11Z",[download]() +full,3.1.7,"2025-06-04T08:25:00Z",[download]() +ad,3.1.7,"2025-06-04T02:40:47Z",[download]() +web,3.1.7,"2025-06-04T00:32:54Z",[download]() +light,3.1.7,"2025-06-03T23:56:59Z",[download]() +full,3.1.6,2025-03-20T03:56:44Z,:download:`full_3.1.6_amd64.csv ` +ad,3.1.6,2025-03-20T03:11:46Z,:download:`ad_3.1.6_amd64.csv ` +osint,3.1.6,2025-03-20T03:07:31Z,:download:`osint_3.1.6_amd64.csv ` +light,3.1.6,2025-03-20T03:07:16Z,:download:`light_3.1.6_amd64.csv ` +web,3.1.6,2025-03-20T03:06:56Z,:download:`web_3.1.6_amd64.csv ` +osint,3.1.5,2024-10-18T11:13:54Z,:download:`osint_3.1.5_amd64.csv ` +full,3.1.5,2024-10-18T11:10:19Z,:download:`full_3.1.5_amd64.csv ` +ad,3.1.5,2024-10-18T10:59:04Z,:download:`ad_3.1.5_amd64.csv ` +web,3.1.5,2024-10-18T10:42:19Z,:download:`web_3.1.5_amd64.csv ` +light,3.1.5,2024-10-18T10:30:43Z,:download:`light_3.1.5_amd64.csv ` +ad,3.1.4,2024-05-05T22:35:39Z,:download:`ad_3.1.4_amd64.csv ` +web,3.1.4,2024-05-05T22:26:58Z,:download:`web_3.1.4_amd64.csv ` +full,3.1.4,2024-05-05T22:17:31Z,:download:`full_3.1.4_amd64.csv ` +light,3.1.4,2024-05-04T21:15:16Z,:download:`light_3.1.4_amd64.csv ` +osint,3.1.4,2024-05-04T20:58:48Z,:download:`osint_3.1.4_amd64.csv ` +full,3.1.3,2024-04-14T13:29:00Z,:download:`full_3.1.3_amd64.csv ` +ad,3.1.3,2024-04-14T10:34:36Z,:download:`ad_3.1.3_amd64.csv ` +web,3.1.3,2024-04-14T10:43:47Z,:download:`web_3.1.3_amd64.csv ` +osint,3.1.3,2024-04-14T10:46:46Z,:download:`osint_3.1.3_amd64.csv ` +light,3.1.3,2024-04-14T08:47:32Z,:download:`light_3.1.3_amd64.csv ` +full,3.1.2,2023-12-22T12:04:26Z,:download:`full_3.1.2_amd64.csv ` +ad,3.1.2,2023-12-22T11:41:22Z,:download:`ad_3.1.2_amd64.csv ` +web,3.1.2,2023-12-22T11:46:29Z,:download:`web_3.1.2_amd64.csv ` +light,3.1.2,2023-12-22T00:08:53Z,:download:`light_3.1.2_amd64.csv ` +osint,3.1.2,2023-12-22T00:02:50Z,:download:`osint_3.1.2_amd64.csv ` +full,3.1.1,2023-08-18T01:36:37Z,:download:`full_3.1.1_amd64.csv ` +ad,3.1.1,2023-08-18T02:59:03Z,:download:`ad_3.1.1_amd64.csv ` +web,3.1.1,2023-08-18T01:35:14Z,:download:`web_3.1.1_amd64.csv ` +osint,3.1.1,2023-08-18T01:34:47Z,:download:`osint_3.1.1_amd64.csv ` +light,3.1.1,2023-08-18T01:35:00Z,:download:`light_3.1.1_amd64.csv ` +full,3.1.0,2023-08-09T22:27:20Z,:download:`full_3.1.0_amd64.csv ` +ad,3.1.0,2023-08-10T00:33:47Z,:download:`ad_3.1.0_amd64.csv ` +web,3.1.0,2023-08-09T11:12:12Z,:download:`web_3.1.0_amd64.csv ` +osint,3.1.0,2023-08-09T10:50:11Z,:download:`osint_3.1.0_amd64.csv ` +light,3.1.0,2023-08-09T02:53:53Z,:download:`light_3.1.0_amd64.csv ` diff --git a/docs/src/public/installed_tools/releases_arm64.csv b/docs/src/public/installed_tools/releases_arm64.csv new file mode 100644 index 00000000..1dd88c87 --- /dev/null +++ b/docs/src/public/installed_tools/releases_arm64.csv @@ -0,0 +1,41 @@ +Image tag,Version,Build date,Tools list +osint,3.1.7,"2025-06-04T08:54:54Z",[download]() +full,3.1.7,"2025-06-04T05:54:18Z",[download]() +ad,3.1.7,"2025-06-04T02:34:39Z",[download]() +web,3.1.7,"2025-06-04T00:34:30Z",[download]() +light,3.1.7,"2025-06-03T23:09:26Z",[download]() +full,3.1.6,2025-03-20T03:17:22Z,:download:`full_3.1.6_arm64.csv ` +ad,3.1.6,2025-03-20T03:17:06Z,:download:`ad_3.1.6_arm64.csv ` +osint,3.1.6,2025-03-20T03:16:36Z,:download:`osint_3.1.6_arm64.csv ` +light,3.1.6,2025-03-20T03:11:55Z,:download:`light_3.1.6_arm64.csv ` +web,3.1.6,2025-03-20T03:11:39Z,:download:`web_3.1.6_arm64.csv ` +osint,3.1.5,2024-10-18T10:57:14Z,:download:`osint_3.1.5_arm64.csv ` +full,3.1.5,2024-10-18T10:54:27Z,:download:`full_3.1.5_arm64.csv ` +ad,3.1.5,2024-10-18T10:35:55Z,:download:`ad_3.1.5_arm64.csv ` +web,3.1.5,2024-10-18T10:24:27Z,:download:`web_3.1.5_arm64.csv ` +light,3.1.5,2024-10-18T10:18:23Z,:download:`light_3.1.5_arm64.csv ` +ad,3.1.4,2024-05-05T22:24:12Z,:download:`ad_3.1.4_arm64.csv ` +web,3.1.4,2024-05-05T21:43:14Z,:download:`web_3.1.4_arm64.csv ` +full,3.1.4,2024-05-05T21:38:02Z,:download:`full_3.1.4_arm64.csv ` +osint,3.1.4,2024-05-05T00:29:32Z,:download:`osint_3.1.4_arm64.csv ` +light,3.1.4,2024-05-05T00:27:18Z,:download:`light_3.1.4_arm64.csv ` +full,3.1.3,2024-04-14T14:16:19Z,:download:`full_3.1.3_arm64.csv ` +ad,3.1.3,2024-04-14T11:47:33Z,:download:`ad_3.1.3_arm64.csv ` +web,3.1.3,2024-04-14T11:52:28Z,:download:`web_3.1.3_arm64.csv ` +osint,3.1.3,2024-04-14T11:55:04Z,:download:`osint_3.1.3_arm64.csv ` +light,3.1.3,2024-04-14T08:38:48Z,:download:`light_3.1.3_arm64.csv ` +full,3.1.2,2023-12-22T12:20:18Z,:download:`full_3.1.2_arm64.csv ` +ad,3.1.2,2023-12-22T12:03:46Z,:download:`ad_3.1.2_arm64.csv ` +web,3.1.2,2023-12-22T12:08:45Z,:download:`web_3.1.2_arm64.csv ` +light,3.1.2,2023-12-22T00:48:17Z,:download:`light_3.1.2_arm64.csv ` +osint,3.1.2,2023-12-22T00:43:53Z,:download:`osint_3.1.2_arm64.csv ` +full,3.1.1,2023-08-18T01:36:23Z,:download:`full_3.1.1_arm64.csv ` +ad,3.1.1,2023-08-18T02:58:49Z,:download:`ad_3.1.1_arm64.csv ` +web,3.1.1,2023-08-18T01:08:44Z,:download:`web_3.1.1_arm64.csv ` +osint,3.1.1,2023-08-18T01:04:50Z,:download:`osint_3.1.1_arm64.csv ` +light,3.1.1,2023-08-18T01:05:12Z,:download:`light_3.1.1_arm64.csv ` +full,3.1.0,2023-08-09T09:12:21Z,:download:`full_3.1.0_arm64.csv ` +ad,3.1.0,2023-08-10T00:11:36Z,:download:`ad_3.1.0_arm64.csv ` +web,3.1.0,2023-08-09T11:11:33Z,:download:`web_3.1.0_arm64.csv ` +osint,3.1.0,2023-08-09T10:48:56Z,:download:`osint_3.1.0_arm64.csv ` +light,3.1.0,2023-08-09T01:50:40Z,:download:`light_3.1.0_arm64.csv ` diff --git a/docs/src/resources/list.md b/docs/src/resources/list.md new file mode 100644 index 00000000..b8f3c744 --- /dev/null +++ b/docs/src/resources/list.md @@ -0,0 +1,16 @@ +# Resources + +## Exegol Resources + +Exegol's "offline resources" are a neat choice of standalone tools and scripts that are often used during penetration tests, +CTFs and red-teams. +While many penetration testers download those resources again every time they need them, Exegol users don't have to. +Everything is managed by the wrapper and they are shared with every container by default (at `/opt/resources`). + +## Resources list + +> [!TIP] +> The list featured here is automatically generated. Exegol features CI/CD pipelines that build the images, update the resources, etc. +> When a change is made on the Exegol-resources repository, it's reflected here, in the list. + + \ No newline at end of file diff --git a/docs/src/tips-and-tricks.md b/docs/src/tips-and-tricks.md new file mode 100644 index 00000000..b51b6ad7 --- /dev/null +++ b/docs/src/tips-and-tricks.md @@ -0,0 +1,163 @@ +# Tips & tricks + +Below are some of the tips and tricks that are good to keep in mind when +using Exegol. + +## Change a container's time + +Changing a container's time with `date` requires elevated permissions on +the container, and messes up with the host's time. There is however and +alternative, using `faketime` (see [faketime ubuntu +manpage](https://manpages.ubuntu.com/manpages/trusty/man1/faketime.1.html)) +that allows to change the time of the container easily, without needing +particular permissions, without affecting the host. This is especially +useful when working with Kerberos targets that are out of sync. + +Faketime manipulates the system time for a given child command. For +example with `zsh`, a new shell is opened with a spoofed time that will +only be spoofed for this extact shell session and commands executed in +it. + +``` bash +faketime 'YYYY-MM-DD hh:mm:ss' zsh +``` + +The following examples automate the synchronization of a remote domain +controller's clock to initiate a corresponding zsh session. + +``` bash +faketime "$(rdate -n $DC_IP -p | awk '{print $2, $3, $4}' | date -f - "+%Y-%m-%d %H:%M:%S")" zsh +``` + +``` bash +faketime "$(date +'%Y-%m-%d') $(net time -S $DC_IP | awk '{print $4}')" +``` + +> [!NOTE] +> Here is an example of how `faketime` can be used. +> +> When doing Active Directory attacks against Kerberos targets, a clock +> skew error could be raised such as `KRB_AP_ERR_SKEW`. This means the +> authenticating machine (operator) and the destination (Key +> Distribution Center, a.k.a. KDC) are not in sync, clock-wise. +> +> Running any [Impacket](https://github.com/fortra/impacket) with the +> `-debug` flag will print the server time. The operator can then use +> `faketime` to open a new `zsh` shell with the right time and timezone +> and conduct the scenario as previously intended. +> +> The following command can be used to print the time in UTC format and +> compare it with the server time: `date --utc`. +> +> *Note: careful with the timezones. If they differ between the operator +> and the KDC, the delta needs to be taken into account* + +## Share files or notes with targets and collaborators + +The following tools or commands can be used to pop a temporary file or +http server: `updog`, `goshs`, `http-server`, `http-put-server`, +`ftp-server`, `smbserver.py`. + +In order to **shares notes** during an engagement, `trilium` +() can be used. + +## Dynamic history commands + +Many commands in the pre-filled history rely on environment variables +such as `$DOMAIN`, `$USER`, `$PASSWORD`, etc. Those variables can be set +manually or by using the `profile.sh` file in +`/opt/tools/Exegol-history/`. The proper lines can be filled and +uncommented, and then the shell can be reloaded with `exec zsh` in order +to apply the changes. This allows users to easily look for, and use, +commands in the history, without changing the values every time. + +## The best reverse shells + +- `shellerator` can be used to generate a reverse shell command + dynamically +- on the attacker's side, a reverse shell obtained through a `netcat` + tunnel can be improved (see + [ropnop.com](https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/) + or [0xffsec.com](https://0xffsec.com/handbook/shells/full-tty/)) +- simple alternative way to have an upgrade netcat reverse shell: use + `rlwrap ` +- instead of using `netcat` and "upgrade" the shell manually, + `pwncat-cs` + ([calebstewart/pwncat](https://github.com/calebstewart/pwncat)) can be + used to obtain an even better reverse shell experience (especially + with UNIX-like targets). + +## Keyboard shortcuts + +- `ctrl+q`: when writing a command, let's say a user misses an + information (e.g. IP address). The shortcut can be used to save the + half-typed command, look for the value, and then finish the command. + The user doesn't have to cancel the command, look for the info, and + write the command all over again. This is known as the `push-line` + feature (see + [sgeb.io](https://sgeb.io/posts/bash-zsh-half-typed-commands/)). +- `ctrl + r`: look for something in the history +- `ctrl + t`: look for a file or directory with a fuzzy finder +- `ctrl + a`: move to the beginning of the line +- `ctrl + e`: move to the end of the line +- `ctrl + ←`: move one word backward +- `ctrl + →`: move one word forward +- `ctrl + l`: clear the screen + +## Useful aliases + +> [!SUCCESS] Tip +> To see every alias in your exegol image, run the command: +> +> ``` +> alias +> ``` + +> [!SUCCESS] Tip +> You can see the complete command configured for an alias with the +> command: +> +> ``` +> alias +> ``` + +> [!WARNING] +> Some aliases are not available before image `3.1.5`. + +Here's a list of useful aliases designed to save you time: + +### Network related + +- `ipa`: List network interfaces in short and colorful way +- `ipr`: List network routes in short and colorful way +- `pc`: Shortcut to `proxychains` +- `ncvz`: Shortcut to test an open TCP port + +### Shell + +- `ws`: Shortcut to `cd /workspace` +- `_`: Shortcut to `sudo` +- `xcopy`: Copy a file to clipboard +- `xpaste`: Create a file from clipboard +- `xshow`: Print clipboard +- `sed-empty-line`: Removes empty lines +- `sed-comment-line`: Removes commented lines +- `history-dump`: Export full history of commands with **date and time** + of execution + +### Quick service + +- `http-put-server`: Python web server `put` capable +- `http-server`: Shortcut to classic Python web server +- `php-server`: Server a PHP webserver on current directory using port + 8080 + +### Tools optimization + +- `hcat`: Automatic hashcat format solver with fuzzy finder wordlist +- `hjohn`: Automatic john the ripper format solver with fuzzy finder + wordlist +- `scan-range`: Nmap shortcut to find host in a specified network range +- `nse`: Find nmap NSE script +- `urlencode`: Encodes arguments in URL format +- `urldecode`: Decodes arguments from URL format diff --git a/docs/src/troubleshooting.md b/docs/src/troubleshooting.md new file mode 100644 index 00000000..cecc832e --- /dev/null +++ b/docs/src/troubleshooting.md @@ -0,0 +1,267 @@ +# Troubleshooting + +Here are the most common problems encountered when installing and using +Exegol. + +## Unable to connect to Docker + +There are multiple checks to do to make sure Docker works properly. + +:::tabs :: + +=== Docker service + +The Docker service must installed up and running. + +- For Windows users: Docker Desktop for Windows must be up and + running. +- For macOS users: Docker Desktop for Mac (or + [OrbStack](https://orbstack.dev/)) must be up and running. + +=== Docker permissions + +Make sure the Docker permissions are consistent with the Exegol +permissions. For instance, if you need `sudo` rights to use Docker, +you'll most likely need `sudo` to run Exegol smoothly. + +See [the Exegol install guidance](/wrapper/cli/install#_3-run-exegol-with-appropriate-privileges) to use +exegol correctly with sudo. + +=== Docker socket + +The following command can be used to see the docker socket that is +used by default: `docker context ls`. + +- For [OrbStack](https://orbstack.dev/) users (on macOS), the "orb + socket" must be used. +- For Docker Desktop users (macOS/Windows), the "Docker desktop + socket" must be used. +- For Linux users, the default socket should work. + +Switching context can be done with `docker context use `. For +instance, switching from a Docker Desktop to OrbStack could be done +with `docker context use orbstack`. + +=== Symbolic link + +The following symbolic link must exist `/var/run/docker.sock` and +point to the correct socket. Below is an example of what it should +look like. + +``` bash +(Host) ~ $ ls -la /var/run/docker.sock +lrwxr-xr-x 1 root daemon 38 Jul 28 09:02 /var/run/docker.sock -/Users/someuser/.orbstack/run/docker.sock +``` + +If the link does not exist, it could be created with the following +command +`ln -sf /Users/someuser/.orbstack/run/docker.sock /var/run/docker.sock`. +This is an example for [OrbStack](https://orbstack.dev/). The command +must be adapted to the user's context. +::: + +## X11 on non-Linux hosts + +X11, or X Window System, is a graphical windowing system that provides a +framework for creating and managing graphical user interfaces (GUIs) in +Unix-like operating systems. + +X11 sharing between an Exegol container and a host allows a graphical +application running within the container to display its GUI on the +host's X11 server. This means you can run graphical applications in +Exegol containers and have them appear as if they were running directly +on the host machine. It enables the execution of GUI-based applications +in isolated containers while interacting with them through the host's +graphical interface. + +For macOS users, XQuartz is needed. It's listed in the [install requirements](/wrapper/cli/install#requirements). + +> [!NOTE] +> Exegol's wrapper automatically starts XQuartz on macOS hosts when +> needed. But if for some reason it gets manually closed by the users +> while a container is running, X11 sharing will not work. Restarting +> the container with `exegol restart ` will restart XQuartz +> automatically if needed. + +## Docker download errors + +### Rate limiting + +When downloading Docker images, you may encounter rate limiting errors from Docker Hub. This happens when you exceed the anonymous pull rate limit, which is likely to occur if you're on a shared network where people pull lots of images from Docker Hub. + +To resolve this, create a Docker Hub account and authenticate (`docker login`), and retry the failing command. + +### Time synchronization + +Docker image downloads may be time-sensitive. In the case of dual-boot +systems, it is common to experience time lags of a few hours. + +To correct the problem, check that your computer's date and time are +correct. + +### Disk space + +`Docker Desktop` is a tool used for running Docker containers on +`Windows` and `macOS`. However, it uses a `virtual disk` to store Docker +images, containers, and volumes. The virtual disk used by Docker Desktop +is not dynamic; it has a fixed size, which by default is set to `64GB`. + +Docker Desktop default disk size + + +Exegol images can be quite large, with some reaching over `50GB`. This +can quickly exceed the available virtual disk space, even if your +physical disk still has free space. To resolve this issue, you need to +allocate more space to the Docker Desktop virtual disk. + +To increase the `virtual disk size`, open Docker Desktop and go to +`Settings -> Resources -> Advanced`. Locate the `Virtual disk limit` +option and increase the allocated size. Make sure to choose a value that +provides enough space for your images and containers, such as `128GB` or +more depending on your needs. + +Apply the changes and then `restart` Docker Desktop to ensure the new +configuration takes effect. + +> [!WARNING] +> If you decide to `reduce the size of the virtual disk`, be aware that +> Docker Desktop will completely `delete the virtual disk image`. This +> action will remove all Docker images, containers, and volumes stored +> on the disk. Therefore, before reducing the disk size, make sure to +> back up any important data or export your Docker images to avoid data +> loss. + +## CRLF errors on Windows + +If you have cloned the Exegol repository on Windows, you may encounter +errors when launching your container, for example: + +``` bash +/.exegol/entrypoint.sh: line 3: trap: SIGTERM : invalid signal specification +/.exegol/entrypoint.sh: line 4: $'\r': command not found +/.exegol/entrypoint.sh: line 5: syntax error near unexpected token $'{\r'' +/.exegol/entrypoint.sh: line 5: function exegol_init() { +``` + +This is caused by the automatic addition of CRLF linefeed by Windows to +ensure compatibility. To correct this problem, simply disable this +feature on the Exegol repository and reload the file of the repository: + +``` bash +cd ./Exegol +git config core.autocrlf false +git rm -rf --cached . +git reset --hard HEAD +``` + +## Environment externally managed + +When installing exegol with `python3 -m pip install exegol` on modern +operating systems (Ubuntu 23.04 and higher, Debian 12 and higher, macOS +14+), you may encounter the following error: + +``` +This environment is externally managed +To install Python packages system-wide, try apt install +python3-xyz, where xyz is the package you are trying to +install. + +If you wish to install a non-Debian-packaged Python package, +create a virtual environment using python3 -m venv path/to/venv. +Then use path/to/venv/bin/python and path/to/venv/bin/pip. Make +sure you have python3-full installed. + +If you wish to install a non-Debian packaged Python application, +it may be easiest to use pipx install xyz, which will manage a +virtual environment for you. Make sure you have pipx installed. + +See /usr/share/doc/python3.11/README.venv for more information. + +hint: See PEP 668 for the detailed specification. +``` + +As the error message suggests, this error occurs when you try to install +Python packages system-wide. To resolve this issue, you have two options : + +:::tabs + +=== Recommended Methods + +**Using pipx (Preferred)** + +The recommended way to install Exegol is using `pipx`, which +automatically handles virtual environment creation: + +``` bash +pipx install exegol +``` + +**Manual Virtual Environment** + +Alternatively, you can create and manage a virtual environment +manually: + +``` bash +python3 -m venv path/to/venv +source path/to/venv/bin/activate +python3 -m pip install exegol +``` + +=== Other Methods + +> [!WARNING] +> The following methods are not recommended as they can lead to +> conflicts with system packages. + +**User Site Installation** + +Install in the user site directory: + +``` bash +python3 -m pip install --user exegol +``` + +**System-wide Installation** + +Override system restrictions (not recommended): + +``` bash +python3 -m pip install exegol --break-system-site-packages +``` + +::: + +## TLS certificate verification issues + +When using Exegol behind an enterprise proxy that performs TLS inspection, you may encounter certificate verification errors. This happens because the proxy's Certificate Authority (CA) is not automatically trusted by the system's truststore. This effectively prevents the wrapper from listing images (`exegol info`), activating a license, etc. + +The error message raised by the wrapper may be: `TLS certificate verification failed while contacting Exegol servers`. + +For detailed instructions on how to fix this issue, please refer to the Supabase discussions [#29935](https://github.com/orgs/supabase/discussions/29935#discussioncomment-12050763) and [#35590](https://github.com/orgs/supabase/discussions/35590) which provide solutions for trusting the proxy's CA certificate. + +A quick-fix may be to add the custom CA to Exegol's virtual env's certifi's CA bundle: + +```bash +cat custom_ca.crt >> $(~/.local/pipx/venvs/exegol/bin/python -c "import certifi; print(certifi.where())") +``` + +## Arsenal TIOCSTI requirement + +The arsenal tool needs the `TIOCSTI` functionality enabled. A GitHub +issue exists to request an evolution: +. + +This feature cannot be enabled only in exegol containers (docker +limitation), it must be configured in the host with the following +command: + +``` bash +# For the current session +sudo sysctl -w dev.tty.legacy_tiocsti=1 + +# Persistent configuration (as root) +echo "dev.tty.legacy_tiocsti=1" >> /etc/sysctl.conf +``` + +For more information about installation, see the [installation section](/wrapper/cli/install). diff --git a/docs/src/wrapper/cli/activate.md b/docs/src/wrapper/cli/activate.md new file mode 100644 index 00000000..0f0991a8 --- /dev/null +++ b/docs/src/wrapper/cli/activate.md @@ -0,0 +1,47 @@ +# `activate` action + +The `activate` action is used to activate Exegol with a valid Pro/Enterprise license. This action is required to use +Exegol in a professional environment. Without activation, Exegol will run in Community edition mode with limited +features. + +When activating Exegol, you will need: + +1. A valid Exegol account (email) +2. An active license assigned to your account +3. Internet access to connect to the license server + +> [!NOTE] Offline Activation +> +> If you need to activate Exegol in an offline environment, please contact us directly. We may be able to provide +> offline activation solutions on a case-by-case basis for specific clients. + +## Activation process + +1. The wrapper will prompt you to enter your Exegol email address +2. You will need to generate a login token from the Exegol dashboard [/otp](https://dashboard.exegol.com/otp) page +3. Enter the token when prompted +4. If you have multiple licenses, you will be presented with a list to choose from +5. If the selected license is already in use on another machine, you will be asked if you want to revoke it from that + machine +6. Once activated, the license will be bound to your current machine + +> [!WARNING] Important +> +> You can only have one active license per machine at a time. If you want to activate a different license, you must +> first revoke the current one using the `--revoke` option. + +## Options + +| Option | Description | +|------------|----------------------------------| +| `--revoke` | Revoke your local Exegol license | + +## Command examples + +```bash +# Activate Exegol interactively +exegol activate + +# Revoke current license +exegol activate --revoke +``` \ No newline at end of file diff --git a/docs/src/wrapper/cli/build.md b/docs/src/wrapper/cli/build.md new file mode 100644 index 00000000..b615cb20 --- /dev/null +++ b/docs/src/wrapper/cli/build.md @@ -0,0 +1,54 @@ +# `build` action + +The `build` action allows you to build an Exegol image locally from source. This is useful when you want to customize the image or when you need to build for a specific architecture. + +When building an image, you can either: +- Use the default Exegol build profiles +- Use custom Dockerfiles + +> [!WARNING] Build Reliability +> +> Building Exegol images locally can be challenging. It's a long process, and may fail due to: +> - Regular updates and changes in the tools and dependencies +> - Incompatibilities between different versions of tools +> - Network issues during the build process +> - System-specific requirements and configurations +> +> We strongly recommend using pre-built images (`exegol install`) unless you have a specific need to build locally. + +## Build Process + +1. Choose a name for your image (if not specified in command) +2. Choose a profile (if not specified in command) +3. The build process will start + +## Options + +| Option | Description | +|--------|-------------| +| `IMAGE` | Tag used to target an Exegol image | +| `BUILD_PROFILE` | Select the build profile used to create a local image | +| `--build-log LOGFILE_PATH` | Write image building logs to a file | +| `--build-path DOCKERFILES_PATH` | Path to the dockerfiles and sources | + +## Command examples + +```bash +# Build interactively an exegol image +exegol build + +# Build interactively a local image named myimage +exegol build myimage + +# Build the myimage image based on the full profile and log the operation +exegol build myimage full --build-log /tmp/build.log +``` + +## Cross-architecture builds + +While the `--arch` parameter is supported, cross-architecture builds are not recommended because: +- They may require additional setup (QEMU, Docker buildx) +- They are significantly slower due to emulation +- Some tools may have architecture-specific dependencies + +If you need to build for a different architecture, consider using a native system of that architecture instead. \ No newline at end of file diff --git a/docs/src/wrapper/cli/exec.md b/docs/src/wrapper/cli/exec.md new file mode 100644 index 00000000..67916491 --- /dev/null +++ b/docs/src/wrapper/cli/exec.md @@ -0,0 +1,67 @@ +# `exec` action + +This action allows to run a single command in a single container instead +of loading a full interactive shell. + +When this action is used it is possible to execute a command either in: + +- a **temporary** container created especially to execute the command, + and **automatically deleted** at the end of the execution: the name of + an exegol **image** must be provided from which a temporary container + will be created +- a standard Exegol container (already existing, or not): the name of an + exegol **container** must then be provided. This container will be + created in interactive mode if it does not already exist + +The executed command can be executed either: + +- in the **background** mode (i.e. like a daemon): exegol **terminates + immediately** after the command is launched and does not wait for its + execution to be completed. No process is left hanging (useful when + running GUI apps for instance). +- in **standard mode**: exegol will **wait** for the end of the process + to stop the container (and delete it if + +> [!TIP] +> In standard execution mode, it is possible to ask exegol to display +> the command **output** (stdout/stderr) in the terminal by adding `-v` +> parameter. + +## Options + +Since the exec action can also create containers, it shares the same +parameters as the [start action](/wrapper/cli/start#Options). + +There are also additional parameters, unique to the `exec` action: + +| Option | Description | +|---------------------------------|-------------| +| `CONTAINER` or `IMAGE` | This option indicates the **container** name to use to execute the command. If the `--tmp` parameter is used, this name will be used to target an **image**. | +| `COMMAND` | Single command to execute in the container. | +| `-b`, `--background` | Executes the command in background as a daemon. | +| `--tmp` | Creates a dedicated and temporary container to execute the command. | + +## Command examples + +``` bash +# Execute the command bloodhound in the container demo: +exegol exec demo bloodhound + +# Execute the command 'nmap -h' with console output in the container demo: +exegol exec -v demo 'nmap -h' + +# Execute a command in background within the demo container: +exegol exec -b demo bloodhound + +# Execute the command bloodhound in a temporary container based on the full image: +exegol exec --tmp full bloodhound + +# Execute a command in background with a temporary container: +exegol exec -b --tmp full bloodhound + +# Execute Wireshark in background, in a privileged temporary container: +exegol exec --background --tmp --privileged "nightly" "wireshark" + +# Execute the command wireshark with network admin privileged: +exegol exec -b --tmp --cap NET_ADMIN full wireshark +``` diff --git a/docs/src/wrapper/cli/info.md b/docs/src/wrapper/cli/info.md new file mode 100644 index 00000000..0acc08ac --- /dev/null +++ b/docs/src/wrapper/cli/info.md @@ -0,0 +1,122 @@ +# `info` action + +The `info` action aims at displaying all the information specific to the +Exegol project on the current system. This action can also be used by +targeting a specific container to display its configuration in detail. + +Depending on the verbosity level specified in the command-line, the +information displayed will be more or less detailed accordingly. + +:::tabs + +== Standard (default) + + ``` bash +exegol info +``` + +- List of available Exegol Images + - Name of the image + - Size of each image (disk space if the image is installed, otherwise its compressed size to download for installation) + - Status of each image + - Not installed (Image available for download from dockerhub) + - Up to date (The latest version of the image is installed and ready to be used) + - Update available (A new version is available for download on dockerhub) + - Outdated (Old version of an image that has been updated since) + - Local image (Locally built image) + - Discontinued (if your image is no longer available on dockerhub) +- List of Exegol Containers + - Name of each container + - Container status (Stopped or running) + - Image name (Exegol image used as a base to create the container) + - Configurations (Display of non-default configurations) + +== Verbose + +``` bash +exegol info -v +``` + +In the verbose mode, the following additional elements are displayed. +Everything from the lower verbosity level is still displayed. + +- Enumerate every user configuration (see details [here](/wrapper/features#exegol-configuration)) +- In the list of available Exegol Images + - Image ID + - Build date + - Image architecture (AMD64 / ARM64) +- In the list of Exegol Containers + - Container id + - Full configuration + - List of non-technical volumes + - List of Devices + - List of Ports (Applicable if network sharing with host is not enabled) + - List of custom environment variables + +== Advanced + +``` bash +exegol info -vv +``` +In the advanced mode, the following additional elements are displayed. +Everything from the lower verbosity levels is still displayed. + +- Enumerate the settings from the user configuration at + `~/.exegol/config.yml` (see details [here](/wrapper/features#exegol-configuration)) +- List the different exegol modules + - Modules name + - Their update status + - Their git branch (if applicable) + +== Debug + +``` bash +exegol info -vvv +``` + +In the debug mode, everything from the lower verbosity levels is still +displayed, as well as logs from internal methods and functions. Those +logs can be useful for maintainers and developers in case of bug, or +for making sure everything works properly. + +::: + +## Options + +The info action does not have many parameters, its use is relatively +simple. This action can either be used to gather general information +(available images, containers, user configs, etc.), or gather +information about a specific container and display its configuration. + +| Option | Description | +|----|----| +| `CONTAINER` | Optional positional argument to indicate the container tag of which to display the configuration. | + +Global options can still be used, like for any action. + +| Option | Description | +|----|----| +| `-h`, `--help` | Show the help message of any action | +| `-v`, `--verbose` | Verbosity level (-v for verbose, -vv for advanced, -vvv for debug) | +| `-q`, `--quiet` | Show no information at all | +| `--offline` | Run exegol in offline mode, no request will be made on internet (default: Disable) | +| `--arch {arm64,amd64}` | Overwrite default image architecture (default: host's arch) | + +## Command examples + +``` bash +# Print containers and images essentials information: +exegol info + +# Print the detailed configuration of the "demo" container: +exegol info demo + +# Print verbose information: +exegol info -v + +# Print advanced information: +exegol info -vv + +# Print debug information: +exegol info -vvv +``` diff --git a/docs/src/wrapper/cli/install.md b/docs/src/wrapper/cli/install.md new file mode 100644 index 00000000..c33d53ce --- /dev/null +++ b/docs/src/wrapper/cli/install.md @@ -0,0 +1,27 @@ +# `install` action + +This action can be used to install an Exegol image. At least one Exegol +image is required to create and start a container and enjoy Exegol. + +When this action is used, the image will be downloaded (i.e. "pulled" in Docker terms) from [the official +Dockerhub registry](https://hub.docker.com/repository/docker/nwodtuhs/exegol). +A compressed and pre-built image is downloaded in the form of layers, and then uncompressed. + +> [!NOTE] +> Enterprise users can configure custom registries in their Exegol configuration file (`~/.exegol/config.yml`). When custom registries are configured, Exegol will also search for images in those registries. See [Enterprise Features](/wrapper/features#enterprise-features) for more details. + +## Options + +| Option | Description | +|--------|-------------| +| `IMAGE` | Optional positional argument to indicate the image to install. | + +## Command examples + +```bash +# Install interactively an exegol image +exegol install + +# Install or update the full image +exegol install full +``` diff --git a/docs/src/wrapper/cli/remove.md b/docs/src/wrapper/cli/remove.md new file mode 100644 index 00000000..b5deecf8 --- /dev/null +++ b/docs/src/wrapper/cli/remove.md @@ -0,0 +1,41 @@ +# `remove` action + +The purpose of the `remove` action is to remove one or more Exegol +container. + +If the deleted container was using an outdated image, the wrapper will +(by default) try to delete that outdated image automatically (unless +this default behavior is changed in the +[exegol configuration file](/wrapper/features#exegol-configuration), which is not advised +since disk space is not limited and Exegol images can take up to 30GB). + +When deleting the container, the wrapper will check if the content of +the `/workspace` volume is empty. If the workspace is **empty**, exegol +will **automatically delete** the folder on the host, otherwise it will +**explicitly ask the user** if the workspace content should be +**deleted** or not. + +## Options + +The options of the `remove` action are limited to selecting the +container(s) to be removed and forcing the removal without asking the +user for interactive confirmation. + +| Option | Description | +|-----------------|---------------------------------------------------------------------------------------------------------------------------------| +| `CONTAINER` | Tag used to target one or more Exegol containers | +| `--all` | Select every Exegol containers available for removal | +| `-F`, `--force` | Remove container without interactive user confirmation (confirmation will still be required for removing non-empty workspaces). | + +## Command examples + +``` bash +# Remove interactively one or more containers: +exegol remove + +# Remove the "demo" container: +exegol remove "demo" + +# Remove the "demo", "test" and "dev" container without asking for user confirmation: +exegol remove -F "demo" "test" "dev" +``` diff --git a/docs/src/wrapper/cli/restart.md b/docs/src/wrapper/cli/restart.md new file mode 100644 index 00000000..78e2d7db --- /dev/null +++ b/docs/src/wrapper/cli/restart.md @@ -0,0 +1,32 @@ +# `restart` action + +The purpose of the `restart` action is to stop and directly restart an +Exegol container. + +If these containers have a `privileged` or `device` configuration, +restarting the container will refresh the available devices inside the +container. + +> [!WARNING] +> Restarting a container will reset the `hosts`, `resolv.conf` files +> (and probably more). + +## Options + +The options of the restart action are limited to selecting the container +to be restarted and some starting options that can be also found on the +[start action](/wrapper/cli/start#Options). + +| Option | Description | +|-------------|-----------------------------------------------------| +| `CONTAINER` | Tag used to target the Exegol containers to restart | + +## Command examples + +``` bash +# Restart interactively one container: +exegol restart + +# Restart the "demo" container: +exegol restart "demo" +``` diff --git a/docs/src/wrapper/cli/start.md b/docs/src/wrapper/cli/start.md new file mode 100644 index 00000000..d8702e3e --- /dev/null +++ b/docs/src/wrapper/cli/start.md @@ -0,0 +1,217 @@ +# `start` action + +This action can be used to start a container. At least one Exegol image +is required to create and start a container and enjoy Exegol. Installing +an image can be done with `exegol install` documentation +[here](/wrapper/cli/install). + +When this action is used, the following process is applied: + +- if no Exegol image is installed, the user is asked to specify which + one to install of build, and the process continues +- then, if the container to start doesn't already exist, it is created + based on an Exegol image and a few settings to specify, and the + process continues +- then, the container is started and a shell is opened + +## Options + +A single option exist to target an Exegol container. If this container +exists, it will be started if it is not already the case and a shell +will be spawned to offer an interactive console to the user + +| Option | Description | +|-------------|----------------------------------------| +| `CONTAINER` | Tag used to target an Exegol container | + +Many options exist to customize the creation of exegol container. + +> [!TIP] +> The default options of some commands can be changed in +> the [exegol configuration file](/wrapper/features#exegol-configuration). + +### Global options + +| Option | Description | +|---------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| `IMAGE` | Tag of the exegol image to use to create a new exegol container | +| `-w WORKSPACE_PATH`, `--workspace WORKSPACE_PATH` | The specified host folder will be linked to the /workspace folder in the container. | +| `-cwd`, `--cwd-mount` | This option is a shortcut to set the /workspace folder to the user's current working directory (pwd). | +| `-fs`, `--update-fs` | Modifies the permissions of folders and sub-folders shared in your workspace to access the files created within the container using your host user account. (default: Disabled) | +| `-V VOLUMES`, `--volume VOLUMES` | Share a new volume between host and exegol (format: --volume /path/on/host/:/path/in/container/\[:ro\|rw\]). | +| `-p PORTS`, `--port PORTS` | Share a network port between host and exegol (format: `--port [:][-][:[-]][:]`. This configuration will disable the shared network with the host. | +| `--hostname HOSTNAME` | Set a custom hostname to the exegol container (default: exegol-\) | +| `--cap CAPABILITIES` | **(dangerous)** Capabilities allow to add specific privileges to the container (e.g. need to mount volumes, perform low-level operations on the network, etc). | +| `--privileged` | **(dangerous)** give extended privileges at the container creation (e.g. needed to mount things, to use wifi or bluetooth) | +| `-d DEVICES`, `--device DEVICES` | Add host device(s) at the container creation (example: -d /dev/ttyACM0 -d /dev/bus/usb/). | +| `--disable-X11` | Disable X11 sharing to run GUI-based applications. (default: Enabled) | +| `--disable-my-resources` | Disable the mount of the shared resources (/opt/my-resources) from the host (/home/dramelac/.exegol/my-resources) (default: Enabled) | +| `--disable-exegol-resources` | Disable the mount of the exegol resources (/opt/resources) from the host (/home/dramelac/Documents/tools/Exegol/exegol-resources) (default: Enabled) | +| `--network NETWORK` | Configure the container's network mode (default: host). See [Network Modes](#network-modes) for details. | +| `--disable-shared-timezones` | Disable the sharing of the host's time and timezone configuration with exegol (default: Enabled) | + +### Network modes + +Exegol supports different network modes to suit various use cases: + +| Mode | Description | Use Case | +|------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| `host` (default) | Container shares the host's network interfaces (IP and MAC addresses of every interface of your host). | - When you need to use the host's network interfaces directly
- For low-level network operations
- When you need to share the host's IP and MAC address | +| `docker` | Container uses Docker's default bridge network. All containers (not just Exegol) share this network and can communicate with each other. | - When you need basic network isolation
- When you want to publish specific ports
- For most standard use cases
- When you want to allow communication between containers | +| `nat` | Creates a dedicated isolated network for the container with its own subnet. Each container gets a unique network namespace with a /28 subnet (16 IP addresses), providing complete isolation from other containers. Requires Pro/Enterprise license. | - When you need complete network isolation
- For sensitive operations requiring dedicated network resources
- When you need to control all network traffic
- When you want automatic network cleanup on container removal | +| `disable` | Disables all network connectivity for the container. | - When you need maximum isolation
- For offline operations
- When network access is not required | + +> [!CAUTION] +> OrbStack currently has a known limitation where containers connected to different user-defined **networks can +communicate with each other**, bypassing expected network isolation obtained with the `nat` option. See the issue for +> more information [orbstack/orbstack#1944](https://github.com/orbstack/orbstack/issues/1944), as of 21/05/2025, it's +> considered as intended and "won't fix". + +There are some limitations and considerations that users should be aware of: + +:::tabs + +=== Host Mode Limitations + +- **Port Publishing**: When using host mode, the `--port` option is not possible, and unnecessary since the container + already has direct access to all host network interfaces and ports. Any service running in the container will be + automatically accessible on the host's network. +- **Docker Desktop**: On Windows and macOS systems using Docker Desktop, host mode has reduced functionality: + - Limited access to host network interfaces + - Potential performance impact + - May not work as expected with certain network tools + +=== Docker vs NAT Mode + +- **Network Creation**: + - Docker mode uses Docker's default bridge network where all containers share the same network space + - NAT mode creates a dedicated network for each container with: + - A unique /28 subnet (16 IP addresses) within the configured range + - Complete isolation from other containers + - Automatic network cleanup +- **Isolation Level**: + - Docker mode provides basic network isolation but allows container-to-container communication + - NAT mode offers complete network isolation with dedicated resources +- **Resource Management**: + - Docker mode shares network resources with all containers on the system + - NAT mode allocates dedicated network resources per container +- **License Requirements**: + - Docker mode is available in all versions + - NAT mode requires Pro/Enterprise license + +=== General Considerations + +- **Container creation**: Network mode is a fundamental container setting that can only be set at creation time. This + means: + - You cannot change the network mode of an existing container + - To use a different network mode, you must create a new container + - Any custom configurations will need to be reapplied to the new container + - The container's state will be reset + - You'll need to ensure all necessary data is backed up before making the change +- **Performance Impact**: Different network modes can affect performance: + - Host mode typically offers the best performance but least isolation + - Docker mode provides a good balance of performance and isolation + - NAT mode offers maximum isolation but may have higher overhead + +::: + +The network behavior can be configured in your Exegol configuration file (`~/.exegol/config.yml`). See +the [network configuration section](/wrapper/configuration#network) in the configuration documentation for details about +network settings. + +### Graphical desktop + +As an alternative to X11 sharing, Exegol provides a complete graphical desktop environment within the container. This +environment can be accessed through multiple protocols, with a web-based interface being the default method. This gives +users a full-featured desktop experience directly from their browser. + +| Option | Description | +|--------------------|--------------------------------------------------------------------------------------------------------------------------------------| +| `--desktop` | Enable or disable the Exegol desktop feature (default: Disabled) | +| `--desktop-config` | Configure the desktop protocol (vnc/http) and network settings (format: `protocol[:ip[:port]]`) (default: `http:127.0.0.1:`) | + +### VPN + +An additional feature of Exegol is the VPN tunnel option (OpenVPN). Just provide an ovpn configuration to exegol and the +container will take care of starting the tunnel at each startup. + +> [!INFO] +> When using the `--vpn` feature, network mode defaults to `docker`, or `nat` if the user has a +> valid or subscription. This isolates the container. The VPN connection +> is not opened directly on the host's network interface. It protects the host. + +| Option | Description | +|-----------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| `--vpn VPN` | Setup an OpenVPN connection at the container creation (example: `--vpn /home/user/vpn/conf.ovpn`) | +| `--vpn-auth VPN_AUTH` | Enter the credentials with a file (first line: username, second line: password) to establish the VPN connection automatically (example: `--vpn-auth /home/user/vpn/auth.txt`) | + +> [!IMPORTANT] +> All the options seen previously are taken into account **only** for +> the creation of a **new container**. It is **not possible** to modify +> the configuration of an existing container. These options will be +> **ignored** if a container with the same name already exists. + +### Shell logging + +One of the functions of exegol very useful in a professional context is the shell logging. This feature allows the user +to record **everything** that happens in the exegol container (commands typed and responses). + +| Option | Description | +|------------------|-------------------------------------------------------------------------------------------------------| +| `-l`, `--log` | Enable shell logging (commands and outputs) on exegol to /workspace/logs/ (default: Disabled) | +| `--log-method` | Select a shell logging method used to record the session (default: `asciinema`) | +| `--log-compress` | Enable or disable the automatic compression of log files at the end of the session (default: Enabled) | + +> [!TIP] +> When the `-l`/`--log` option is enabled during the **creation** of a +> **new** container, all future shells will be **automatically logged** +> for this container. + +### Session specific + +The options specific to the start of the interactive session. + +| Option | Description | +|-----------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| `-e ENVS`, `--env ENVS` | And an environment variable on Exegol (format: --env KEY=value). The variables configured during the creation of the container will be persistent in all shells. If the container already exists, the variable will be present only in the current shell. | +| `-s SHELL`, `--shell SHELL` | Select a shell environment to launch at startup (default: zsh) | + +> [!info] +> The environment variables configured with `--env ENVS` during the +> **creation** of a **new** container will be available to **all** +> processes of the container during the **entire life cycle** of the +> container. + +## Command examples + +``` bash +# Start interactively a container +exegol start + +# Create a demo container using full image +exegol start demo full + +# Spawn a shell from demo container +exegol start demo + +# Create a container test with a custom shared workspace +exegol start test full -w "./project/pentest/" + +# Create a container test sharing the current working directory +exegol start test full -cwd + +# Create a container htb with a VPN +exegol start htb full --vpn "~/vpn/lab_Dramelac.ovpn" + +# Create a container app with custom volume +exegol start app full -V "/var/app/:/app/" + +# Get a shell based on tmux +exegol start --shell tmux + +# Share a specific hardware device (like Proxmark) +exegol start -d "/dev/ttyACM0" + +# Share every USB device connected to the host +exegol start -d "/dev/bus/usb/" +``` diff --git a/docs/src/wrapper/cli/stop.md b/docs/src/wrapper/cli/stop.md new file mode 100644 index 00000000..98d9206c --- /dev/null +++ b/docs/src/wrapper/cli/stop.md @@ -0,0 +1,30 @@ +# `stop` action + +The purpose of the `stop` action is to stop one or more Exegol +containers. + +If these containers have a VPN configuration, shutting down the +container will cause the VPN tunnel to be disconnected. + +## Options + +The options of the stop action are limited to selecting the container(s) +to be stopped. + +| Option | Description | +|-------------|--------------------------------------------------| +| `CONTAINER` | Tag used to target one or more Exegol containers | +| `--all` | Select every Exegol running containers | + +## Command examples + +``` bash +# Stop interactively one or more containers: +exegol stop + +# Stop the "demo" container: +exegol stop "demo" + +# Stop the "demo", "test" and "dev" container: +exegol stop "demo" "test" "dev" +``` diff --git a/docs/src/wrapper/cli/uninstall.md b/docs/src/wrapper/cli/uninstall.md new file mode 100644 index 00000000..cfa124cd --- /dev/null +++ b/docs/src/wrapper/cli/uninstall.md @@ -0,0 +1,35 @@ +# `uninstall` action + +The purpose of the `uninstall` action is to remove one or more Exegol +images. + +> [!WARNING] +> The wrapper will try to delete the selected exegol images but this can +> only work if the selected images are **not used by any container** +> anymore. A container based on an image that doesn't exist anymore +> cannot run. + +## Options + +The options of the `uninstall` action are limited to selecting the +image(s) to be removed, and forcing the removal without asking the user +for interactive confirmation. + +| Option | Description | +|-----------------|-----------------------------------------------------| +| `IMAGE` | Tag used to target one or more Exegol images | +| `--all` | Select every Exegol images available for removal | +| `-F`, `--force` | Remove image without interactive user confirmation. | + +## Command examples + +``` bash +# Remove interactively one or more containers: +exegol uninstall + +# Remove the "full" container: +exegol uninstall "full" + +# Remove the "full", "ad" and "web" container without asking for user confirmation: +exegol uninstall -F "full" "ad" "web" +``` diff --git a/docs/src/wrapper/cli/update.md b/docs/src/wrapper/cli/update.md new file mode 100644 index 00000000..11e9e736 --- /dev/null +++ b/docs/src/wrapper/cli/update.md @@ -0,0 +1,72 @@ +# `update` action + +## The update process + +The exegol wrapper has an `update` action dedicated to updating the +different modules (wrapper, resources, etc.) of the project as well as +the (docker) Exegol images. + +### Modules updates + +This action make sure the local copies of the following repositories are +up to date: + +- [Exegol](https://github.com/ThePorgs/Exegol) (wrapper code). If the + wrapper has been installed with Pip, it will not be able to + self-update, updating the package through Pip will be required (e.g. + `python3 -m pip install --upgrade exegol`). +- [Exegol-images](https://github.com/ThePorgs/Exegol-images) (docker + building files) +- [Exegol-resources](https://github.com/ThePorgs/Exegol-resources) + (offline resources, `exegol-resources`). This module + is optional, and users can choose to install/update it at any time. + +> [!TIP] +> When running `exegol update -v`, the user will be able to choose from +> what branch them module should be synchronized with, allowing to +> switch easily between release and dev versions. + +### Images updates + +Once the local code base is updated, the wrapper compares the installed +Exegol images with those offered on the Dockerhub registry. If no +parameters have been provided at command-line, an interactive selection +will be possible to choose the images to update (if updates are +available). + + +> [!SUCCESS] Hint +> Older versions of images will be automatically deleted if they are no +> longer used by any container and if a newer version of the same image is +> installed. This automatic deletion behavior is a default configuration +> that can be modified in the [configuration file](/wrapper/features#exegol-configuration) +> if needed, but it's advised not to change it as disk space is not +> unlimited and Exegol image can take up to 30GB. + + + +## Options + +The options of the `update` action are the following. + +| Option | Description | +|-----------------|---------------------------------------------| +| IMAGE | This option specifies what image to update. | +| `--skip-git` | Skip `modules updates `. | +| `--skip-images` | Skip `images updates `. | + +## Command examples + +``` bash +# Update interactively an exegol image: +exegol update + +# Update the full image: +exegol update full + +# Update the full image without updating exegol modules: +exegol update --skip-git full + +# Update exegol modules and have the option to change branch without updating docker image: +exegol update -v --skip-images +``` diff --git a/docs/src/wrapper/cli/version.md b/docs/src/wrapper/cli/version.md new file mode 100644 index 00000000..7c9a2875 --- /dev/null +++ b/docs/src/wrapper/cli/version.md @@ -0,0 +1,30 @@ +# `version` action + +The `version` action is mostly used for debugging purposes, it only +displays information about the Exegol setup on the system. + +In debug mode (`-vvv`), it also displays information about the system +and wrapper installation context. + +## Options + +The options available for the version action are the global options that +affect the behavior of all exegol actions. + +| Option | Description | +|----|----| +| `-h`, `--help` | Show the help message of any action | +| `-v`, `--verbose` | Verbosity level (-v for verbose, -vv for advanced, -vvv for debug) | +| `-q`, `--quiet` | Show no information at all | +| `--offline` | Run exegol in offline mode, no request will be made on internet (default: Disable) | +| `--arch {arm64,amd64}` | Overwrite default image architecture (default: host's arch) | + +## Command examples + +``` bash +# Show version information +exegol version + +# Show version and system information +exegol version -vvv +``` diff --git a/docs/src/wrapper/configuration.md b/docs/src/wrapper/configuration.md new file mode 100644 index 00000000..507da48f --- /dev/null +++ b/docs/src/wrapper/configuration.md @@ -0,0 +1,119 @@ +# Configuration + +## Home directory + +The `~/.exegol` folder exists in the user's home folder to centralize +["exegol resources"](/resources/list), +["my-resources"](/images/my-resources), workspaces, and the +configuration file. + +By default, every exegol container has a **workspace volume**. If the +path of this volume is not specified by the user +[see start parameters](/wrapper/cli/start), a folder with the +name of the container will be created in the +["private workspace"](/wrapper/features#exegol-configuration) folder. By default, +this folder is located at `~/.exegol/workspaces/`. + +## Configuration file + +The **configuration file** (YAML) is located at `~/.exegol/config.yml` +and is generated by the wrapper during the first execution, with the +default configurations. + +The Exegol wrapper is configured with many default settings. Most of +them can be modified with a simple argument. For productivity purposes, +setting a different default behavior once and not have to add the same +options everytime is interesting. For this exact purpose, a +configuration file exists that allows users to persistently change the +behavior and operations to be performed by default. + +The user configuration currently in place can be viewed with the +command: `exegol info -v`. More information on the +[info page](/wrapper/cli/info). + +Within the `~/.exegol/config.yml` file, several settings can be +configured to customize the Exegol experience, all distributed in +multiple sections below. + +### Volumes + +The volume section allows to change the default path for various volumes. + +> [!WARNING] +> Volume path can be changed at any time but already existing +> containers will not be affected by the update and will keep the +> original paths they were created with. + +- `my_resources_path`: the "my-resources" volume is a storage space + dedicated to the user to customize his environment and tools. This volume is, by default, shared across all exegol containers. See [details about it](/wrapper/features#exegol-configuration). Be careful **not** to use a folder with **existing data**, in which case their permissions will be automatically modified to enable access sharing. This change will not be applied to already existing exegol containers. +- `exegol_resources_path`: exegol-resources are data and static tools downloaded in addition to docker images. These tools are complementary and are accessible directly from the host. See [details](/resources/list). +- `private_workspace_path`: when containers do not have an explicitly declared workspace at their creation (i.e. with `--cwd-mount`, or `--workspace`), a dedicated folder will be created at this location to share the workspace with the host but also to save the data after deleting the container. + +### Config + +The config section allows you to modify the default behavior of the Exegol wrapper. +- `auto_check_update`: enables automatic check for wrapper update. (Default: `True`) +- `auto_remove_image`: automatically remove outdated image when they are no longer used. (Default: `True`) +- `auto_update_workspace_fs`: automatically modifies the permissions of folders and sub-folders in your workspace by default to enable file sharing between the container with your host user. (Default: `False`) +- `default_start_shell`: default shell command to start. (Default:`zsh`) +- `enable_exegol_resources`: Enables or not the exegol resources module by default on any new container. (Default: `True`) + +#### Shell logging +Change the configuration of the shell logging functionality. +- `logging_method`: Choice of the method used to record the sessions, `script` or `asciinema`. (Default: `asciinema`) +- `enable_log_compression`: Enable automatic compression of log files (with gzip). (Default: `True`) + +#### Desktop + +Change the configuration of the virtual Desktop feature. +- `enabled_by_default`: Enables or not the desktop mode by default. If +this attribute is set to True, then using the CLI `--desktop` option +will be inverted and will **DISABLE** the feature (Default: `False`) +- `default_protocol`: Default desktop protocol,can be `http`, or `vnc` +depending on your wrapper / image version. (Default: `http`) +- `localhost_by_default`: Desktop service is exposed on localhost by +default. If set to true, services will be exposed on `localhost` +(127.0.0.1) otherwise it will be exposed on `0.0.0.0`. This setting +can be overwritten with [--desktop-config](/wrapper/cli/start). +(Default: `True`) + +#### Network + +Configure the network behavior of Exegol containers. + +- `default_network`: Default network mode for any new container. (Default: `host`) + - `host`: Container shares host's network interfaces + - `docker`: Uses shared Docker's bridge network + - `nat`: Creates a network for each container + - `disable`: Disables all network connectivity + +- `fallback_network`: Network mode to use if the default mode is not available. (Default: `nat`, or `docker` if the use doesn't have the required Subscription level) + +- `exegol_dedicated_range`: Network range for NAT mode containers. (Default: `172.31.0.0/16`) + - Each container using NAT mode gets a dedicated subnet within this range + - Must be a valid CIDR notation (e.g., `172.31.0.0/16`) + +- `exegol_default_netmask`: Subnet mask size for `nat` mode containers. (Default: `28`) + - Controls the size of each container's subnet + - Smaller values create larger subnets + - Must be between `16` and `30` + +For more details about network modes and their use cases, see the [Network Modes section](/wrapper/cli/start#network-modes) in the start command documentation. + + +#### Custom images + +Enterprise users can configure custom image names to be recognized by Exegol. This configuration allows the wrapper to identify and work with Exegol images that have different names than the official ones. + +- `custom_images`: List of image names/registries that should be recognized as Exegol images. The wrapper will take those into account in commands like `start`, `info`, and `exec`. + ```yaml + custom_images: + - your-org/exegol + - registry.your-domain.com/exegol + ``` + +Note that images must be pulled manually as they may be in private registries requiring specific authentication + +> [!SUCCESS] +> For organizations requiring a managed Exegol private registry, with managed private images, and a full integration with with the wrapper, contact us for a quote. Read more at [Custom registry](features#custom-registry) + diff --git a/docs/src/wrapper/features.md b/docs/src/wrapper/features.md new file mode 100644 index 00000000..3591cede --- /dev/null +++ b/docs/src/wrapper/features.md @@ -0,0 +1,614 @@ +# Wrapper features + +Below is a, non-exhaustive, list of what the wrapper supports: + +| Feature | Description | +|---------|-------------| +| [Graphical desktop](#desktop) | Hosts a complete graphics environment available via a web page or VNC | +| [X11 sharing](#x11-sharing-gui) | Sharing of the graphic environment between the container and the host | +| [Workspace](#workspace) | Persistent and shared workspace with the host | +| [Update-fs](#update-fs) | Permission sharing between the container and the host | +| [OpenVPN connection](#openvpn-connection) | Opening an isolated VPN tunnel dedicated to the Exegol container | +| [Shell logging](#shell-logging) | Recording of sessions (input and output) in log files with date and time | +| [Network modes](#network-modes) | Different network configurations for container isolation and connectivity | +| [Shared timezones](#shared-timezones) | Sharing the host's timezone configuration | +| [Exegol-resources](#exegol-resources) | Easy access to a collection of resources and tools | +| [My-resources](#my-resources) | User space dedicated to customization | +| [Volume sharing](#volume-sharing) | Support for specific volume addition | +| [Port sharing](#port-sharing) | Support for port publishing | +| [Env. variables](#env-variables) | Support for environment variable configuration | +| [Device sharing](#device-sharing) | Support for hardware sharing | +| [Custom hostname](#custom-hostname) | Support for customizing a specific container hostname | +| [Comments](#comments) | User can add any text comments to the container | +| [Capabilities](#capabilities) | Support for adding specific capabilities | +| [Privileged](#privileged) | Support of the privileged mode | +| [Multi-architecture](#multi-architecture) | Support for AMD64 and ARM64 architectures | +| [Local image](#local-image-building) | Customized local image building | +| [Remote image](#remote-image-pulling) | Pre-built image available for download | +| [Custom images](#custom-images) | Using different images names | +| [Custom registry](#custom-registry) | Pre-built image available for download | +| [Command execution](#command-execution) | Execution of specific command | +| [Daemon execution](#daemon-execution) | Support of the command execution in the background | +| [Temporary containers](#temporary-containers) | Support for command execution in a dedicated and temporary environment | + + +> [!TIP] +> Exegol uses Docker images and containers. Understanding the difference +> is essential to understand Exegol. +> +> - **image**: think of it as an immutable template. They cannot be +> executed as-is and serve as input for containers. It's not possible +> to open a shell in an image. +> - **container**: a container rests upon an image. A container is +> created for a certain image at a certain time. It's possible to open +> a shell in a container. Careful though, once a container is created, +> updating the image it was created upon won't have any impact on the +> container. In order to enjoy the new things, a new container must be +> created upon that updated image. + +## Features + +The Exegol wrapper has many features to automatically and transparently +manage different configurations to facilitate the use and creation of +docker containers. + +### Desktop + + + +On some systems, it may be difficult to have or share an X11 +environment. Some users prefer to have a full graphical desktop +environment rather than just graphical applications. + +To meet this need, Exegol is able to host a complete graphical +environment within its container since version `4.3.0` of the wrapper +and `3.1.2` of the images. + +This environment can then be made available to others in a variety of +ways. The default protocol is currently **HTTP**, but the user can +change the configuration to use the **VNC** alternative. + +This feature can be enabled manually with the option `--desktop` of the +[start action](./cli/start#options). + +> [!TIP] +> The default behavior and configuration of the desktop mode can be +> changed in the [configuration of Exegol](/wrapper/features#exegol-configuration). + +Desktop access is protected by **PAM authentication**. To log in, it is +essential to retrieve the login credentials and the **URL** where the +desktop is accessible. These details can be obtained from the +container's information, either at the time of container launch or by +using the following command : + +``` bash +exegol info CONTAINER_NAME +``` + +``` +⭐ Container summary +┌──────────────────┬───────────────────────────────────────┐ +│ Name │ gui │ +│ Image │ nightly - v.d34db33f (Up to date) │ +├──────────────────┼───────────────────────────────────────┤ +│ Credentials │ root : iozLHIjJFxoOLTTaNymO50uKT2RlvI │ +│ Remote Desktop │ http://localhost:58089 │ +│ Console GUI │ On ✔ (X11) │ +│ Network │ host │ +│ Timezone │ Off 🪓 │ +│ Exegol resources │ On ✔ (/opt/resources) │ +│ My resources │ On ✔ (/opt/my-resources) │ +│ Shell logging │ Off 🪓 │ +│ Privileged │ Off ✔ │ +│ Workspace │ Dedicated (/workspace) │ +└──────────────────┴───────────────────────────────────────┘ +``` + +### X11 sharing (GUI) + +By default exegol configures the new container and host to allow the +execution to the display of graphical window launched from an exegol +container. This is achieved through X11 sharing. + +For example, if bloodhound is launched in an exegol container, the +graphical window (GUI) will be displayed in the user's graphic +environment. + +This feature can be disabled manually with the option `--disable-X11` of +the [start action](./cli/start#options). + +### Workspace + +Exegol always creates within a container a **persistent** workspace +(even after deleting the container) and **shared** with the host. + +By default a folder will be created on the host and shared with the +container. This folder will be created in `~/.exegol/workspaces/` with +the name of the exegol container. + +> [!TIP] +> The default location of workspace volumes can be changed in the +> [configuration of Exegol](/wrapper/features#exegol-configuration). + +The user can also create an Exegol container with an **existing custom +workspace folder** (with already existing data) regardless of its +location in the file system. + +See the options `-w WORKSPACE_PATH` and `-cwd` of the +[start action](./cli/start#options) for more details. + +#### Update-fs + +The root user is used by default in Exegol containers which poses +problems of permissions when accessing the project documents from the +host. To remedy this without compromising, a **shared permission +system** exists allowing the host user to have read and write access to +files created from the container. + +This system is **automatically activated** when a **new** default +workspace is created. + +> [!WARNING] +> When the user uses an existing custom folder as workspace, this system +> is **disabled** by default! This feature can be **enabled by default** +> by changing the `configuration of Exegol` of the [start action](./cli/start#options) +) but it will lead to the +> **modification** of the folder and its sub-folders **permissions** (as +> `g+rws`). +> +> If the user does not have the rights to perform such an operation, a +> **sudo command** will be proposed to the user that he will have to +> **execute manually** to apply the necessary permissions for the proper +> functioning of the functionality (as `chgrp` + `g+rws`). + +> [!TIP] +> When the default configuration of this feature is changed and the +> update will be **enabled by default**, the option `--update-fs` can +> still be used to manually **disable** the feature in specific cases. + +### OpenVPN connection + +Exegol supports OpenVPN tunnel configuration to **automatically** +establish a VPN tunnel at container **startup**. + +Exegol supports **certificate authentication** but also **user/password +authentication** through an authentication file (to allow +non-interactive and transparent authentication) with an additinal +parameter. + +When preparing your VPN configuration file: + +- All files (CA, user cert, user Key, etc) should preferably be included + in a single `.ovpn` file, otherwise a dedicated folder must be + prepared (cf. next tip) + +> [!TIP] +> A folder can also be used in the case of a **multi-file +> configuration** (with **relative** paths!) and the configuration file +> must have the `.ovpn` extension (Only **one** .ovpn file will be +> loaded by exegol). For example, the directory structure: +> +> ``` +> . my_vpn/ +> |- configuration.ovpn => This file contains the OpenVPN configuration with relative path to the various external files +> |- root_ca.pem => Certificat Authority file referenced as `./root_ca.pem` in configuration.ovpn +> |- my_user.crt => User's personal certificate file referenced as `./my_user.crt` in configuration.ovpn +> |- my_user.key => User's personal key file referenced as `./my_user.key` in configuration.ovpn (password protected file are not supported for non-interactive logon) +> ``` +> +> And the exegol wrapper command: `exegol start --vpn ./my_vpn` + + +- If you're using a login / password authentication, prepare an **auth + file** to enable passive authentification with Exegol (See the option + `--vpn-auth VPN_AUTH`) +- Password protected certificate keys are **not supported** for passive + authentification +- Once the container is created, you **cannot move or rename** your VPN + configuration file +- If you want to **update your VPN configuration**, you can update the + same `.ovpn` file on your host and restart the container with + `exegol restart` +- If you want your Exegol container to automatically update its **DNS** + configuration according to the **VPN server** settings, add this + configuration to your `.ovpn` file: + +``` +script-security 2 +up /etc/openvpn/update-resolv-conf +down /etc/openvpn/update-resolv-conf" +``` + +See the options `--vpn VPN` and `--vpn-auth VPN_AUTH` of the +[start action](./cli/start#options) for more details. + +> [!TIP] +> In the case of a problem, to troubleshoot a VPN connection, OpenVPN +> logs can be retrieved within the container in the file +> `/var/log/exegol/vpn.log`. + +> [!TIP] +> If you want to create a container that is able to start **VPN +> manually**, you can create your container with the following +> parameters: `exegol start -d /dev/net/tun --cap NET_ADMIN` + +### Shell logging + +Within the framework of a mission, it is necessary to **log all +actions** performed during a pentest, red team etc. To meet this need, +Exegol has a feature to **automatically record everything** that is +displayed (stdout / stderr) but also all entries (stdin). + +See the option `--log` of the [start action](./cli/start#options) to enable the feature. + +> [!SUCCESS] Hint +> When the option is enabled upon **creation** of a new container, all +> shells created for this container **will be automatically logged**. +> +> If the container was created **without** this option, the shells can +> still be logged **individually** by adding the option in the **start** +> command of **each** shell. + + +The date and time of each command is displayed thanks to the PS1 of +`zsh`. + +The logs are automatically saved in the `/workspace/logs` folder. Each +log file is **automatically compressed** with `gzip` at the end of the +session to optimize disk space. The automatic compression of log files +can be **disabled** manually with the [start action](./cli/start#options) + +`--log-compress` parameter or change the default behavior in the +[Exegol configuration file](/wrapper/features#exegol-configuration). + +> [!SUCCESS] Hint +> When the default configuration of the log compression is changed from +> the config file and the feature will be **disabled by default**, the +> option `--log-compress` can still be used to manually **enable** the + >feature in specific cases. + + +> [!WARNING] +> The logs should **NOT** be consulted from the exegol container but +> **from the host** to avoid loops and duplication of data in the logs. + +There are (since exegol images version `3.0.0`) different methods of +shell logging. The shell logging method can be selected manually with +the [start action](./cli/start#options) + `--log-method` parameter or by +default in the [configuration file of Exegol](/wrapper/features#exegol-configuration). + +:::tabs :: + +=== asciinema (default) + +The shell logging method **asciinema** is available from exegol images +version `3.0.0`. This new mode allows to consult sessions in **video** +format taking into account the interactive environment. It is also +possible to **manually upload** and **share** recordings, useful for +**demonstrations** for example + +Here is a quick demonstration: + + + +To view/replay the logs from your host, you must **install** `asciinema` on your **host** machine. + +> [!TIP] +> - Logs in `.gz` format can be replay directly **without unpacking** +> them with the command: `gunzip -c | asciinema play -` +> - To display the whole session **without** the "video" mode, it is +> possible to use the command: `asciinema cat ` +> - When you share or play an `asciinema` video, you can **copy** and +> **paste** any command/text it contains. + + +=== script +**script** is the "classic" method of session logging, it was also the +only option available before version `3.0.0` of exegol images. This +method simply records **all** incoming (stdin) and outgoing +(stdout/stderr) shell actions in a file. + +> [!TIP] +> Logs in `.gz` format can be viewed directly **without unpacking** them +> with the `zcat`, `zgrep`, `zdiff` or `zmore` command! + +> [!WARNING] +> Shell logging saves **EVERYTHING** including keyboard shortcuts, +> display refreshes, etc. +> +> Complex graphical environments (such as tmux) can make it difficult to +> read the logs. + +::: + +### Network modes + +By default, containers created by Exegol use the `host` network mode, which means that the **network interfaces** of the host are **shared** with the container. + +This configuration is useful to: +- dynamically open ports and services +- have a low level access on a physical network (some operation might need privileged mode) +- share a unique ip address on the target network +- share a MAC address on the target network (to be considered as a single physical machine) + +> [!TIP] +> Even without ``host`` mode, ports can be exposed with parameter ``--port`` when creating a new container. + +However, Exegol supports different network modes to suit various use cases: + +- `host`: Container shares host's network interfaces, just like as a classic host process. Use for direct interface access, low-level operations, or sharing host IP/MAC. +- `docker`: Uses Docker's default bridge network where all containers (not just Exegol) share the same network space and can communicate with each other. Use for standard cases requiring basic network isolation and port control. +- `nat` : Creates an isolated network with a dedicated /28 subnet (14 IP addresses available) for each container, providing complete isolation from other containers. Use for sensitive operations requiring dedicated network with isolation. +- `disable`: Blocks all network connectivity. Use for maximum isolation or offline operations. + +See the `--network` option of the [start action](/wrapper/cli/start#network-modes) for more details. + +> [!WARNING] +> Full sharing of host network interfaces is only possible on Linux. +> +> Adaptations of this mode exist on Windows and Mac with Docker Desktop or Orbstack, but there might be some **limitations**. + +### Shared timezones + +For convenience and precision in the date and time of the logs of each +command, exegol allows to share the timezone of the host in the +container. + +This feature is active by default and can be disabled with the option +`--disable-shared-timezones` of the [start action](./cli/start#options). + +### Exegol-resources + +To save time and have at hand many tools, scripts and other resources, +exegol maintains a repository [exegol-resources](/resources/list) +contains many updated tools that are available to the host and exegol +containers. + +This module is not mandatory and can be downloaded later. + +> [!SUCCESS] Hint +> If an antivirus is present on your host, be careful to exclude the +> destination folder of the `exegol-resources` module before downloading +> it. + +This feature is active and shared by default and can be disabled with +the option `--disable-exegol-resources` of the +[start action](./cli/start#options). + +### My-resources + +The my-resources feature is a space dedicated to the user and shared +with all the containers. This space allows to store configurations and +to install personal tools. + +More details on the functionality of the wrapper +[here](/wrapper/features#my-resources) and how to take advantage of the customization system [`here`](/images/my-resources). + +### Volume sharing + +For specific needs, the exegol wrapper allows to add additional custom +volumes (type bind mounts) when creating an exegol container. + +See the option `--volume VOLUMES` of the [`start action`](./cli/start#options) for more details. + +### Port sharing + +When the host network is not shared, it is still possible to **publish** +specific ports to expose **services** or **port** ranges. + +> [!SUCCESS] Hint +> This configuration is **compatible** even with installations based on +> Docker Desktop. + +This feature allows the user to select: + +- a specific network interface (for example 127.0.0.1) or by default all + interfaces (0.0.0.0). +- the port to open on the host interface. +- the destination port to be linked in the container. +- the protocol to use, docker supports `TCP`, `UDP` and `SCTP` protocols + (default is TCP). + +See the option `--port PORTS` of the [start action](./cli/start#options) for more details. + +### Env. variables + +Exegol can configure custom environment variables defined by the user. + +When the environment variables are defined at the first time of the +container creation, these variables will be: + +- accessible in the container by all processes +- present during the whole lifetime of the container + +The environment variables can be defined when opening a shell in an +**existing** container and will be available **only** in the user's +shell until it is closed. + +See the option `--env ENVS` of the [start action](./cli/start#options) for more details. + +### Device sharing + +For the needs of some applications running on physical hardware (such as +proxmark3), exegol can supply the container with one or more physical +devices. + +See the option `--device DEVICES` of the [start action](./cli/start#options) for more details. + +> [!WARNING] +> This feature is only available on **Linux** installations! +> +> Windows and MacOS installations are subject to the constraints and +> limitations of [Docker +> Desktop](https://docs.docker.com/desktop/faqs/#can-i-pass-through-a-usb-device-to-a-container). + +> [!WARNING] +> Docker only load shared device at container **startup**. If you have +> to unplug / plug again your device it might **no longer works** until +> you **restart** the container with `exegol restart `. +> +> This bug occurs even if the `/dev/ttyACM0` device is still present in +> your container. + +### Custom hostname + +In some environments with OPSEC requirements, it may be necessary to +change the hostname of your exegol container. + +See the option `--hostname HOSTNAME` of the +[start action](./cli/start#options) for more details. + +### Comments + +To add more context information about an exegol container, it is +possible to add **comments** to each Exegol container. The comment of an +exegol container can be displayed with the command +`exegol info ` + +See the option `--comment COMMENT` of the [start action](./cli/start#options) for more details. + +### Capabilities + +Exegol supports adding **Linux capabilities** to the Exegol +**container** to perform tasks that require **administrative** rights +**without** allowing everything. + +This feature gives control to the user to configure his container but +giving administrator rights remains a dangerous practice and should be +used by experienced users only. + +For more details on the capabilities supported by docker [check +here](https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilities). + +> [!WARNING] +> Not all Linux capabilities are allowed by the Exegol wrapper, here is +> the list of available capabilities: +> +> `NET_ADMIN`, `NET_BROADCAST`, `SYS_MODULE`, `SYS_PTRACE`, `SYS_RAWIO`, +> `SYS_ADMIN`, `LINUX_IMMUTABLE`, `MAC_ADMIN`, `SYSLOG` +> +> For all other needs, consider the [privileged](/wrapper/features#privileged) +> mode. + +### Privileged + +For particular needs, it is sometimes necessary to have **privileged +rights** to perform certain actions. If Exegol does **not** allow you to +have specifically the rights necessary, you can configure your container +in privileged mode to get **full administrator rights**. + +> [!WARNING] +> This configuration is particularly **dangerous** because it gives the +> container **full admin control** over the **kernel** of the **host** +> machine. +> +> Use this option **only** if you know **exactly** what you are doing!! +> +> If the need is specifically identified, consider adding +> [capabilities](/wrapper/features#capabilities) instead! + +See the option `--privileged` of the [start action](./cli/start#options) for more details. + +### Multi-architecture + +Exegol supports `ARM64` architecture (in addition to the classic +`AMD64`) since version `4.1.0` of the wrapper and `3.0.0` of the images. + +This support allows you to fully use exegol on hardware equipped with an +**ARM** processor (such as Mac M1 / M2 but also some Raspberry Pi). + +> [!WARNING] +> Exegol only supports **64-bit ARM** architecture! If your ARM +> processor supports 64-bit, make sure your **OS** is also installed in +> **64-bit version** to use exegol! + +> [!TIP] +> For experienced users or developers, it is possible to explicitly +> modify the architecture used by the Exegol wrapper with the +> [general option](/wrapper/cli/version#general-options) `--arch ARCH`. +> +> But be **careful**, the modification of this parameter can lead to +> **malfunctions**! + +### Local image building + +The wrapper allows users to build custom Exegol images locally. This feature is useful for: +- Customizing the image with specific tools or configurations +- Building for a different architecture than your host +- Testing new features or modifications + +> [!WARNING] +> Building images locally can be challenging and time-consuming. We recommend using pre-built images (`exegol install`) unless you have a specific need to build locally. + +See the [build action](/wrapper/cli/build) for detailed usage and options. + +### Remote image pulling + +To save time, pre-built images are available for download. These images can be downloaded and installed / updated from +the exegol wrapper with the [install](/wrapper/cli/install) and [update](/wrapper/cli/update) actions. + +### Custom images + +Enterprise users can configure custom image names to be recognized by Exegol. This configuration allows the wrapper to identify and work with Exegol images that have different names than the official ones. Useful for sharing customized images with your team through a private registry. + +To configure custom images, add them to your [Exegol configuration file](/wrapper/configuration#configuration-file): + +Note that images must be pulled manually as they may be in private registries requiring specific authentication. + +### Custom registry + +For organizations requiring a complete private registry solution, we offer a managed Exegol private registry service. This enterprise solution includes: + +- A fully managed private Docker registry for Exegol images +- Custom Exegol images maintained and updated by our team +- Full integration with the Exegol wrapper +- Automatic updates and maintenance of your private images +- Dedicated support and customization options +- The appropriate NDA and IP agreements, to protect your knowledge and content + +This service is ideal for organizations that need: +- Complete control over their Exegol image distribution +- Private, organization-specific Exegol images +- Full integration with their existing infrastructure +- Regular updates and maintenance of their private images + +Contact us for a quote and to discuss your organization's specific requirements. + +### Command execution + +The Exegol wrapper does not only allow the opening of interactive +shells, it is also possible to execute **single commands** in several +ways. + +> [!TIP] +> To see the execution logs of the command, the user must add the +> parameter `-v`. + +The details of this functionality are detailed in the +[exec](./cli/exec#exec-options) action. + +#### Daemon execution + +One of the execution modes can be in the **background** like a daemon +service. In this way the wrapper executes the **user's command**, for +example an application such as bloodhound. The wrapper **launches** the +task in an exegol container and **finishes immediately** without +occupying the user's terminal, leaving the application **open**. + +See the option `--background` of the [exec action](./cli/exec#exec-options) for more details. + +#### Temporary containers + +Another feature of the [exec](./cli/exec) action is the +execution in a **temporary** container. + +In this mode, a **temporary** container will be created and +**dedicated** to the execution of the command specified by the user. + +This mode can be useful to run a given command with the most +**up-to-date** image already installed on the host, for any **test** or +for special **privacy** needs. + +See the option `--tmp` of the [exec](./cli/exec#exec-options) for more details. diff --git a/make.bat b/make.bat deleted file mode 100644 index 747ffb7b..00000000 --- a/make.bat +++ /dev/null @@ -1,35 +0,0 @@ -@ECHO OFF - -pushd %~dp0 - -REM Command file for Sphinx documentation - -if "%SPHINXBUILD%" == "" ( - set SPHINXBUILD=sphinx-build -) -set SOURCEDIR=source -set BUILDDIR=build - -%SPHINXBUILD% >NUL 2>NUL -if errorlevel 9009 ( - echo. - echo.The 'sphinx-build' command was not found. Make sure you have Sphinx - echo.installed, then set the SPHINXBUILD environment variable to point - echo.to the full path of the 'sphinx-build' executable. Alternatively you - echo.may add the Sphinx directory to PATH. - echo. - echo.If you don't have Sphinx installed, grab it from - echo.https://www.sphinx-doc.org/ - exit /b 1 -) - -if "%1" == "" goto help - -%SPHINXBUILD% -M %1 %SOURCEDIR% %BUILDDIR% %SPHINXOPTS% %O% -goto end - -:help -%SPHINXBUILD% -M help %SOURCEDIR% %BUILDDIR% %SPHINXOPTS% %O% - -:end -popd diff --git a/package-lock.json b/package-lock.json new file mode 100644 index 00000000..a8ac16d4 --- /dev/null +++ b/package-lock.json @@ -0,0 +1,2590 @@ +{ + "name": "Exegol-docs-v2", + "lockfileVersion": 3, + "requires": true, + "packages": { + "": { + "dependencies": { + "lucide-static": "^0.487.0", + "lucide-vue-next": "^0.487.0", + "medium-zoom": "^1.1.0", + "papaparse": "^5.5.2" + }, + "devDependencies": { + "vitepress-plugin-tabs": "^0.5.0" + } + }, + "node_modules/@algolia/autocomplete-core": { + "version": "1.17.7", + "resolved": "https://registry.npmjs.org/@algolia/autocomplete-core/-/autocomplete-core-1.17.7.tgz", + "integrity": "sha512-BjiPOW6ks90UKl7TwMv7oNQMnzU+t/wk9mgIDi6b1tXpUek7MW0lbNOUHpvam9pe3lVCf4xPFT+lK7s+e+fs7Q==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/autocomplete-plugin-algolia-insights": "1.17.7", + "@algolia/autocomplete-shared": "1.17.7" + } + }, + "node_modules/@algolia/autocomplete-plugin-algolia-insights": { + "version": "1.17.7", + "resolved": "https://registry.npmjs.org/@algolia/autocomplete-plugin-algolia-insights/-/autocomplete-plugin-algolia-insights-1.17.7.tgz", + "integrity": "sha512-Jca5Ude6yUOuyzjnz57og7Et3aXjbwCSDf/8onLHSQgw1qW3ALl9mrMWaXb5FmPVkV3EtkD2F/+NkT6VHyPu9A==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/autocomplete-shared": "1.17.7" + }, + "peerDependencies": { + "search-insights": ">= 1 < 3" + } + }, + "node_modules/@algolia/autocomplete-preset-algolia": { + "version": "1.17.7", + "resolved": "https://registry.npmjs.org/@algolia/autocomplete-preset-algolia/-/autocomplete-preset-algolia-1.17.7.tgz", + "integrity": "sha512-ggOQ950+nwbWROq2MOCIL71RE0DdQZsceqrg32UqnhDz8FlO9rL8ONHNsI2R1MH0tkgVIDKI/D0sMiUchsFdWA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/autocomplete-shared": "1.17.7" + }, + "peerDependencies": { + "@algolia/client-search": ">= 4.9.1 < 6", + "algoliasearch": ">= 4.9.1 < 6" + } + }, + "node_modules/@algolia/autocomplete-shared": { + "version": "1.17.7", + "resolved": "https://registry.npmjs.org/@algolia/autocomplete-shared/-/autocomplete-shared-1.17.7.tgz", + "integrity": "sha512-o/1Vurr42U/qskRSuhBH+VKxMvkkUVTLU6WZQr+L5lGZZLYWyhdzWjW0iGXY7EkwRTjBqvN2EsR81yCTGV/kmg==", + "dev": true, + "license": "MIT", + "peer": true, + "peerDependencies": { + "@algolia/client-search": ">= 4.9.1 < 6", + "algoliasearch": ">= 4.9.1 < 6" + } + }, + "node_modules/@algolia/client-abtesting": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/client-abtesting/-/client-abtesting-5.20.0.tgz", + "integrity": "sha512-YaEoNc1Xf2Yk6oCfXXkZ4+dIPLulCx8Ivqj0OsdkHWnsI3aOJChY5qsfyHhDBNSOhqn2ilgHWxSfyZrjxBcAww==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/client-analytics": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/client-analytics/-/client-analytics-5.20.0.tgz", + "integrity": "sha512-CIT9ni0+5sYwqehw+t5cesjho3ugKQjPVy/iPiJvtJX4g8Cdb6je6SPt2uX72cf2ISiXCAX9U3cY0nN0efnRDw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/client-common": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/client-common/-/client-common-5.20.0.tgz", + "integrity": "sha512-iSTFT3IU8KNpbAHcBUJw2HUrPnMXeXLyGajmCL7gIzWOsYM4GabZDHXOFx93WGiXMti1dymz8k8R+bfHv1YZmA==", + "dev": true, + "license": "MIT", + "peer": true, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/client-insights": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/client-insights/-/client-insights-5.20.0.tgz", + "integrity": "sha512-w9RIojD45z1csvW1vZmAko82fqE/Dm+Ovsy2ElTsjFDB0HMAiLh2FO86hMHbEXDPz6GhHKgGNmBRiRP8dDPgJg==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/client-personalization": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/client-personalization/-/client-personalization-5.20.0.tgz", + "integrity": "sha512-p/hftHhrbiHaEcxubYOzqVV4gUqYWLpTwK+nl2xN3eTrSW9SNuFlAvUBFqPXSVBqc6J5XL9dNKn3y8OA1KElSQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/client-query-suggestions": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/client-query-suggestions/-/client-query-suggestions-5.20.0.tgz", + "integrity": "sha512-m4aAuis5vZi7P4gTfiEs6YPrk/9hNTESj3gEmGFgfJw3hO2ubdS4jSId1URd6dGdt0ax2QuapXufcrN58hPUcw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/client-search": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/client-search/-/client-search-5.20.0.tgz", + "integrity": "sha512-KL1zWTzrlN4MSiaK1ea560iCA/UewMbS4ZsLQRPoDTWyrbDKVbztkPwwv764LAqgXk0fvkNZvJ3IelcK7DqhjQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/ingestion": { + "version": "1.20.0", + "resolved": "https://registry.npmjs.org/@algolia/ingestion/-/ingestion-1.20.0.tgz", + "integrity": "sha512-shj2lTdzl9un4XJblrgqg54DoK6JeKFO8K8qInMu4XhE2JuB8De6PUuXAQwiRigZupbI0xq8aM0LKdc9+qiLQA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/monitoring": { + "version": "1.20.0", + "resolved": "https://registry.npmjs.org/@algolia/monitoring/-/monitoring-1.20.0.tgz", + "integrity": "sha512-aF9blPwOhKtWvkjyyXh9P5peqmhCA1XxLBRgItT+K6pbT0q4hBDQrCid+pQZJYy4HFUKjB/NDDwyzFhj/rwKhw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/recommend": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/recommend/-/recommend-5.20.0.tgz", + "integrity": "sha512-T6B/WPdZR3b89/F9Vvk6QCbt/wrLAtrGoL8z4qPXDFApQ8MuTFWbleN/4rHn6APWO3ps+BUePIEbue2rY5MlRw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/requester-browser-xhr": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/requester-browser-xhr/-/requester-browser-xhr-5.20.0.tgz", + "integrity": "sha512-t6//lXsq8E85JMenHrI6mhViipUT5riNhEfCcvtRsTV+KIBpC6Od18eK864dmBhoc5MubM0f+sGpKOqJIlBSCg==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/requester-fetch": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/requester-fetch/-/requester-fetch-5.20.0.tgz", + "integrity": "sha512-FHxYGqRY+6bgjKsK4aUsTAg6xMs2S21elPe4Y50GB0Y041ihvw41Vlwy2QS6K9ldoftX4JvXodbKTcmuQxywdQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@algolia/requester-node-http": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/@algolia/requester-node-http/-/requester-node-http-5.20.0.tgz", + "integrity": "sha512-kmtQClq/w3vtPteDSPvaW9SPZL/xrIgMrxZyAgsFwrJk0vJxqyC5/hwHmrCraDnStnGSADnLpBf4SpZnwnkwWw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-common": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/@babel/helper-string-parser": { + "version": "7.25.9", + "resolved": "https://registry.npmjs.org/@babel/helper-string-parser/-/helper-string-parser-7.25.9.tgz", + "integrity": "sha512-4A/SCr/2KLd5jrtOMFzaKjVtAei3+2r/NChoBNoZ3EyP/+GlhoaEGoWOZUmFmoITP7zOJyHIMm+DYRd8o3PvHA==", + "license": "MIT", + "peer": true, + "engines": { + "node": ">=6.9.0" + } + }, + "node_modules/@babel/helper-validator-identifier": { + "version": "7.25.9", + "resolved": "https://registry.npmjs.org/@babel/helper-validator-identifier/-/helper-validator-identifier-7.25.9.tgz", + "integrity": "sha512-Ed61U6XJc3CVRfkERJWDz4dJwKe7iLmmJsbOGu9wSloNSFttHV0I8g6UAgb7qnK5ly5bGLPd4oXZlxCdANBOWQ==", + "license": "MIT", + "peer": true, + "engines": { + "node": ">=6.9.0" + } + }, + "node_modules/@babel/parser": { + "version": "7.26.7", + "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.26.7.tgz", + "integrity": "sha512-kEvgGGgEjRUutvdVvZhbn/BxVt+5VSpwXz1j3WYXQbXDo8KzFOPNG2GQbdAiNq8g6wn1yKk7C/qrke03a84V+w==", + "license": "MIT", + "peer": true, + "dependencies": { + "@babel/types": "^7.26.7" + }, + "bin": { + "parser": "bin/babel-parser.js" + }, + "engines": { + "node": ">=6.0.0" + } + }, + "node_modules/@babel/types": { + "version": "7.26.7", + "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.26.7.tgz", + "integrity": "sha512-t8kDRGrKXyp6+tjUh7hw2RLyclsW4TRoRvRHtSyAX9Bb5ldlFh+90YAYY6awRXrlB4G5G2izNeGySpATlFzmOg==", + "license": "MIT", + "peer": true, + "dependencies": { + "@babel/helper-string-parser": "^7.25.9", + "@babel/helper-validator-identifier": "^7.25.9" + }, + "engines": { + "node": ">=6.9.0" + } + }, + "node_modules/@docsearch/css": { + "version": "3.8.2", + "resolved": "https://registry.npmjs.org/@docsearch/css/-/css-3.8.2.tgz", + "integrity": "sha512-y05ayQFyUmCXze79+56v/4HpycYF3uFqB78pLPrSV5ZKAlDuIAAJNhaRi8tTdRNXh05yxX/TyNnzD6LwSM89vQ==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/@docsearch/js": { + "version": "3.8.2", + "resolved": "https://registry.npmjs.org/@docsearch/js/-/js-3.8.2.tgz", + "integrity": "sha512-Q5wY66qHn0SwA7Taa0aDbHiJvaFJLOJyHmooQ7y8hlwwQLQ/5WwCcoX0g7ii04Qi2DJlHsd0XXzJ8Ypw9+9YmQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@docsearch/react": "3.8.2", + "preact": "^10.0.0" + } + }, + "node_modules/@docsearch/react": { + "version": "3.8.2", + "resolved": "https://registry.npmjs.org/@docsearch/react/-/react-3.8.2.tgz", + "integrity": "sha512-xCRrJQlTt8N9GU0DG4ptwHRkfnSnD/YpdeaXe02iKfqs97TkZJv60yE+1eq/tjPcVnTW8dP5qLP7itifFVV5eg==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/autocomplete-core": "1.17.7", + "@algolia/autocomplete-preset-algolia": "1.17.7", + "@docsearch/css": "3.8.2", + "algoliasearch": "^5.14.2" + }, + "peerDependencies": { + "@types/react": ">= 16.8.0 < 19.0.0", + "react": ">= 16.8.0 < 19.0.0", + "react-dom": ">= 16.8.0 < 19.0.0", + "search-insights": ">= 1 < 3" + }, + "peerDependenciesMeta": { + "@types/react": { + "optional": true + }, + "react": { + "optional": true + }, + "react-dom": { + "optional": true + }, + "search-insights": { + "optional": true + } + } + }, + "node_modules/@esbuild/aix-ppc64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/aix-ppc64/-/aix-ppc64-0.21.5.tgz", + "integrity": "sha512-1SDgH6ZSPTlggy1yI6+Dbkiz8xzpHJEVAlF/AM1tHPLsf5STom9rwtjE4hKAF20FfXXNTFqEYXyJNWh1GiZedQ==", + "cpu": [ + "ppc64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "aix" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/android-arm": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/android-arm/-/android-arm-0.21.5.tgz", + "integrity": "sha512-vCPvzSjpPHEi1siZdlvAlsPxXl7WbOVUBBAowWug4rJHb68Ox8KualB+1ocNvT5fjv6wpkX6o/iEpbDrf68zcg==", + "cpu": [ + "arm" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "android" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/android-arm64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/android-arm64/-/android-arm64-0.21.5.tgz", + "integrity": "sha512-c0uX9VAUBQ7dTDCjq+wdyGLowMdtR/GoC2U5IYk/7D1H1JYC0qseD7+11iMP2mRLN9RcCMRcjC4YMclCzGwS/A==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "android" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/android-x64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/android-x64/-/android-x64-0.21.5.tgz", + "integrity": "sha512-D7aPRUUNHRBwHxzxRvp856rjUHRFW1SdQATKXH2hqA0kAZb1hKmi02OpYRacl0TxIGz/ZmXWlbZgjwWYaCakTA==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "android" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/darwin-arm64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/darwin-arm64/-/darwin-arm64-0.21.5.tgz", + "integrity": "sha512-DwqXqZyuk5AiWWf3UfLiRDJ5EDd49zg6O9wclZ7kUMv2WRFr4HKjXp/5t8JZ11QbQfUS6/cRCKGwYhtNAY88kQ==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "darwin" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/darwin-x64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/darwin-x64/-/darwin-x64-0.21.5.tgz", + "integrity": "sha512-se/JjF8NlmKVG4kNIuyWMV/22ZaerB+qaSi5MdrXtd6R08kvs2qCN4C09miupktDitvh8jRFflwGFBQcxZRjbw==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "darwin" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/freebsd-arm64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/freebsd-arm64/-/freebsd-arm64-0.21.5.tgz", + "integrity": "sha512-5JcRxxRDUJLX8JXp/wcBCy3pENnCgBR9bN6JsY4OmhfUtIHe3ZW0mawA7+RDAcMLrMIZaf03NlQiX9DGyB8h4g==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "freebsd" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/freebsd-x64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/freebsd-x64/-/freebsd-x64-0.21.5.tgz", + "integrity": "sha512-J95kNBj1zkbMXtHVH29bBriQygMXqoVQOQYA+ISs0/2l3T9/kj42ow2mpqerRBxDJnmkUDCaQT/dfNXWX/ZZCQ==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "freebsd" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/linux-arm": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/linux-arm/-/linux-arm-0.21.5.tgz", + "integrity": "sha512-bPb5AHZtbeNGjCKVZ9UGqGwo8EUu4cLq68E95A53KlxAPRmUyYv2D6F0uUI65XisGOL1hBP5mTronbgo+0bFcA==", + "cpu": [ + "arm" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/linux-arm64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/linux-arm64/-/linux-arm64-0.21.5.tgz", + "integrity": "sha512-ibKvmyYzKsBeX8d8I7MH/TMfWDXBF3db4qM6sy+7re0YXya+K1cem3on9XgdT2EQGMu4hQyZhan7TeQ8XkGp4Q==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/linux-ia32": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/linux-ia32/-/linux-ia32-0.21.5.tgz", + "integrity": "sha512-YvjXDqLRqPDl2dvRODYmmhz4rPeVKYvppfGYKSNGdyZkA01046pLWyRKKI3ax8fbJoK5QbxblURkwK/MWY18Tg==", + "cpu": [ + "ia32" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/linux-loong64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/linux-loong64/-/linux-loong64-0.21.5.tgz", + "integrity": "sha512-uHf1BmMG8qEvzdrzAqg2SIG/02+4/DHB6a9Kbya0XDvwDEKCoC8ZRWI5JJvNdUjtciBGFQ5PuBlpEOXQj+JQSg==", + "cpu": [ + "loong64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/linux-mips64el": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/linux-mips64el/-/linux-mips64el-0.21.5.tgz", + "integrity": "sha512-IajOmO+KJK23bj52dFSNCMsz1QP1DqM6cwLUv3W1QwyxkyIWecfafnI555fvSGqEKwjMXVLokcV5ygHW5b3Jbg==", + "cpu": [ + "mips64el" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/linux-ppc64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/linux-ppc64/-/linux-ppc64-0.21.5.tgz", + "integrity": "sha512-1hHV/Z4OEfMwpLO8rp7CvlhBDnjsC3CttJXIhBi+5Aj5r+MBvy4egg7wCbe//hSsT+RvDAG7s81tAvpL2XAE4w==", + "cpu": [ + "ppc64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/linux-riscv64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/linux-riscv64/-/linux-riscv64-0.21.5.tgz", + "integrity": "sha512-2HdXDMd9GMgTGrPWnJzP2ALSokE/0O5HhTUvWIbD3YdjME8JwvSCnNGBnTThKGEB91OZhzrJ4qIIxk/SBmyDDA==", + "cpu": [ + "riscv64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/linux-s390x": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/linux-s390x/-/linux-s390x-0.21.5.tgz", + "integrity": "sha512-zus5sxzqBJD3eXxwvjN1yQkRepANgxE9lgOW2qLnmr8ikMTphkjgXu1HR01K4FJg8h1kEEDAqDcZQtbrRnB41A==", + "cpu": [ + "s390x" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/linux-x64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/linux-x64/-/linux-x64-0.21.5.tgz", + "integrity": "sha512-1rYdTpyv03iycF1+BhzrzQJCdOuAOtaqHTWJZCWvijKD2N5Xu0TtVC8/+1faWqcP9iBCWOmjmhoH94dH82BxPQ==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/netbsd-x64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/netbsd-x64/-/netbsd-x64-0.21.5.tgz", + "integrity": "sha512-Woi2MXzXjMULccIwMnLciyZH4nCIMpWQAs049KEeMvOcNADVxo0UBIQPfSmxB3CWKedngg7sWZdLvLczpe0tLg==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "netbsd" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/openbsd-x64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/openbsd-x64/-/openbsd-x64-0.21.5.tgz", + "integrity": "sha512-HLNNw99xsvx12lFBUwoT8EVCsSvRNDVxNpjZ7bPn947b8gJPzeHWyNVhFsaerc0n3TsbOINvRP2byTZ5LKezow==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "openbsd" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/sunos-x64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/sunos-x64/-/sunos-x64-0.21.5.tgz", + "integrity": "sha512-6+gjmFpfy0BHU5Tpptkuh8+uw3mnrvgs+dSPQXQOv3ekbordwnzTVEb4qnIvQcYXq6gzkyTnoZ9dZG+D4garKg==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "sunos" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/win32-arm64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/win32-arm64/-/win32-arm64-0.21.5.tgz", + "integrity": "sha512-Z0gOTd75VvXqyq7nsl93zwahcTROgqvuAcYDUr+vOv8uHhNSKROyU961kgtCD1e95IqPKSQKH7tBTslnS3tA8A==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "win32" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/win32-ia32": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/win32-ia32/-/win32-ia32-0.21.5.tgz", + "integrity": "sha512-SWXFF1CL2RVNMaVs+BBClwtfZSvDgtL//G/smwAc5oVK/UPu2Gu9tIaRgFmYFFKrmg3SyAjSrElf0TiJ1v8fYA==", + "cpu": [ + "ia32" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "win32" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@esbuild/win32-x64": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/@esbuild/win32-x64/-/win32-x64-0.21.5.tgz", + "integrity": "sha512-tQd/1efJuzPC6rCFwEvLtci/xNFcTZknmXs98FYDfGE4wP9ClFV98nyKrzJKVPMhdDnjzLhdUyMX4PsQAPjwIw==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "win32" + ], + "peer": true, + "engines": { + "node": ">=12" + } + }, + "node_modules/@iconify-json/simple-icons": { + "version": "1.2.22", + "resolved": "https://registry.npmjs.org/@iconify-json/simple-icons/-/simple-icons-1.2.22.tgz", + "integrity": "sha512-0UzThRMwHuOJfgpp+tyV/y2uEBLjFVrxC4igv9iWjSEQEBK4tNjWZNTRCBCYyv/FwWVYyKAsA8tZQ8vUYzvFnw==", + "dev": true, + "license": "CC0-1.0", + "peer": true, + "dependencies": { + "@iconify/types": "*" + } + }, + "node_modules/@iconify/types": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/@iconify/types/-/types-2.0.0.tgz", + "integrity": "sha512-+wluvCrRhXrhyOmRDJ3q8mux9JkKy5SJ/v8ol2tu4FVjyYvtEzkc/3pK15ET6RKg4b4w4BmTk1+gsCUhf21Ykg==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/@jridgewell/sourcemap-codec": { + "version": "1.5.0", + "resolved": "https://registry.npmjs.org/@jridgewell/sourcemap-codec/-/sourcemap-codec-1.5.0.tgz", + "integrity": "sha512-gv3ZRaISU3fjPAgNsriBRqGWQL6quFx04YMPW/zD8XMLsU32mhCCbfbO6KZFLjvYpCZ8zyDEgqsgf+PwPaM7GQ==", + "license": "MIT", + "peer": true + }, + "node_modules/@rollup/rollup-android-arm-eabi": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-android-arm-eabi/-/rollup-android-arm-eabi-4.32.1.tgz", + "integrity": "sha512-/pqA4DmqyCm8u5YIDzIdlLcEmuvxb0v8fZdFhVMszSpDTgbQKdw3/mB3eMUHIbubtJ6F9j+LtmyCnHTEqIHyzA==", + "cpu": [ + "arm" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "android" + ], + "peer": true + }, + "node_modules/@rollup/rollup-android-arm64": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-android-arm64/-/rollup-android-arm64-4.32.1.tgz", + "integrity": "sha512-If3PDskT77q7zgqVqYuj7WG3WC08G1kwXGVFi9Jr8nY6eHucREHkfpX79c0ACAjLj3QIWKPJR7w4i+f5EdLH5Q==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "android" + ], + "peer": true + }, + "node_modules/@rollup/rollup-darwin-arm64": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-darwin-arm64/-/rollup-darwin-arm64-4.32.1.tgz", + "integrity": "sha512-zCpKHioQ9KgZToFp5Wvz6zaWbMzYQ2LJHQ+QixDKq52KKrF65ueu6Af4hLlLWHjX1Wf/0G5kSJM9PySW9IrvHA==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "darwin" + ], + "peer": true + }, + "node_modules/@rollup/rollup-darwin-x64": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-darwin-x64/-/rollup-darwin-x64-4.32.1.tgz", + "integrity": "sha512-sFvF+t2+TyUo/ZQqUcifrJIgznx58oFZbdHS9TvHq3xhPVL9nOp+yZ6LKrO9GWTP+6DbFtoyLDbjTpR62Mbr3Q==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "darwin" + ], + "peer": true + }, + "node_modules/@rollup/rollup-freebsd-arm64": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-freebsd-arm64/-/rollup-freebsd-arm64-4.32.1.tgz", + "integrity": "sha512-NbOa+7InvMWRcY9RG+B6kKIMD/FsnQPH0MWUvDlQB1iXnF/UcKSudCXZtv4lW+C276g3w5AxPbfry5rSYvyeYA==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "freebsd" + ], + "peer": true + }, + "node_modules/@rollup/rollup-freebsd-x64": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-freebsd-x64/-/rollup-freebsd-x64-4.32.1.tgz", + "integrity": "sha512-JRBRmwvHPXR881j2xjry8HZ86wIPK2CcDw0EXchE1UgU0ubWp9nvlT7cZYKc6bkypBt745b4bglf3+xJ7hXWWw==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "freebsd" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-arm-gnueabihf": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm-gnueabihf/-/rollup-linux-arm-gnueabihf-4.32.1.tgz", + "integrity": "sha512-PKvszb+9o/vVdUzCCjL0sKHukEQV39tD3fepXxYrHE3sTKrRdCydI7uldRLbjLmDA3TFDmh418XH19NOsDRH8g==", + "cpu": [ + "arm" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-arm-musleabihf": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm-musleabihf/-/rollup-linux-arm-musleabihf-4.32.1.tgz", + "integrity": "sha512-9WHEMV6Y89eL606ReYowXuGF1Yb2vwfKWKdD1A5h+OYnPZSJvxbEjxTRKPgi7tkP2DSnW0YLab1ooy+i/FQp/Q==", + "cpu": [ + "arm" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-arm64-gnu": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm64-gnu/-/rollup-linux-arm64-gnu-4.32.1.tgz", + "integrity": "sha512-tZWc9iEt5fGJ1CL2LRPw8OttkCBDs+D8D3oEM8mH8S1ICZCtFJhD7DZ3XMGM8kpqHvhGUTvNUYVDnmkj4BDXnw==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-arm64-musl": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-arm64-musl/-/rollup-linux-arm64-musl-4.32.1.tgz", + "integrity": "sha512-FTYc2YoTWUsBz5GTTgGkRYYJ5NGJIi/rCY4oK/I8aKowx1ToXeoVVbIE4LGAjsauvlhjfl0MYacxClLld1VrOw==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-loongarch64-gnu": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-loongarch64-gnu/-/rollup-linux-loongarch64-gnu-4.32.1.tgz", + "integrity": "sha512-F51qLdOtpS6P1zJVRzYM0v6MrBNypyPEN1GfMiz0gPu9jN8ScGaEFIZQwteSsGKg799oR5EaP7+B2jHgL+d+Kw==", + "cpu": [ + "loong64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-powerpc64le-gnu": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-powerpc64le-gnu/-/rollup-linux-powerpc64le-gnu-4.32.1.tgz", + "integrity": "sha512-wO0WkfSppfX4YFm5KhdCCpnpGbtgQNj/tgvYzrVYFKDpven8w2N6Gg5nB6w+wAMO3AIfSTWeTjfVe+uZ23zAlg==", + "cpu": [ + "ppc64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-riscv64-gnu": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-riscv64-gnu/-/rollup-linux-riscv64-gnu-4.32.1.tgz", + "integrity": "sha512-iWswS9cIXfJO1MFYtI/4jjlrGb/V58oMu4dYJIKnR5UIwbkzR0PJ09O0PDZT0oJ3LYWXBSWahNf/Mjo6i1E5/g==", + "cpu": [ + "riscv64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-s390x-gnu": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-s390x-gnu/-/rollup-linux-s390x-gnu-4.32.1.tgz", + "integrity": "sha512-RKt8NI9tebzmEthMnfVgG3i/XeECkMPS+ibVZjZ6mNekpbbUmkNWuIN2yHsb/mBPyZke4nlI4YqIdFPgKuoyQQ==", + "cpu": [ + "s390x" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-x64-gnu": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-x64-gnu/-/rollup-linux-x64-gnu-4.32.1.tgz", + "integrity": "sha512-WQFLZ9c42ECqEjwg/GHHsouij3pzLXkFdz0UxHa/0OM12LzvX7DzedlY0SIEly2v18YZLRhCRoHZDxbBSWoGYg==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-linux-x64-musl": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-linux-x64-musl/-/rollup-linux-x64-musl-4.32.1.tgz", + "integrity": "sha512-BLoiyHDOWoS3uccNSADMza6V6vCNiphi94tQlVIL5de+r6r/CCQuNnerf+1g2mnk2b6edp5dk0nhdZ7aEjOBsA==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "linux" + ], + "peer": true + }, + "node_modules/@rollup/rollup-win32-arm64-msvc": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-win32-arm64-msvc/-/rollup-win32-arm64-msvc-4.32.1.tgz", + "integrity": "sha512-w2l3UnlgYTNNU+Z6wOR8YdaioqfEnwPjIsJ66KxKAf0p+AuL2FHeTX6qvM+p/Ue3XPBVNyVSfCrfZiQh7vZHLQ==", + "cpu": [ + "arm64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "win32" + ], + "peer": true + }, + "node_modules/@rollup/rollup-win32-ia32-msvc": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-win32-ia32-msvc/-/rollup-win32-ia32-msvc-4.32.1.tgz", + "integrity": "sha512-Am9H+TGLomPGkBnaPWie4F3x+yQ2rr4Bk2jpwy+iV+Gel9jLAu/KqT8k3X4jxFPW6Zf8OMnehyutsd+eHoq1WQ==", + "cpu": [ + "ia32" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "win32" + ], + "peer": true + }, + "node_modules/@rollup/rollup-win32-x64-msvc": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/@rollup/rollup-win32-x64-msvc/-/rollup-win32-x64-msvc-4.32.1.tgz", + "integrity": "sha512-ar80GhdZb4DgmW3myIS9nRFYcpJRSME8iqWgzH2i44u+IdrzmiXVxeFnExQ5v4JYUSpg94bWjevMG8JHf1Da5Q==", + "cpu": [ + "x64" + ], + "dev": true, + "license": "MIT", + "optional": true, + "os": [ + "win32" + ], + "peer": true + }, + "node_modules/@shikijs/core": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@shikijs/core/-/core-2.1.0.tgz", + "integrity": "sha512-v795KDmvs+4oV0XD05YLzfDMe9ISBgNjtFxP4PAEv5DqyeghO1/TwDqs9ca5/E6fuO95IcAcWqR6cCX9TnqLZA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@shikijs/engine-javascript": "2.1.0", + "@shikijs/engine-oniguruma": "2.1.0", + "@shikijs/types": "2.1.0", + "@shikijs/vscode-textmate": "^10.0.1", + "@types/hast": "^3.0.4", + "hast-util-to-html": "^9.0.4" + } + }, + "node_modules/@shikijs/engine-javascript": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@shikijs/engine-javascript/-/engine-javascript-2.1.0.tgz", + "integrity": "sha512-cgIUdAliOsoaa0rJz/z+jvhrpRd+fVAoixVFEVxUq5FA+tHgBZAIfVJSgJNVRj2hs/wZ1+4hMe82eKAThVh0nQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@shikijs/types": "2.1.0", + "@shikijs/vscode-textmate": "^10.0.1", + "oniguruma-to-es": "^2.3.0" + } + }, + "node_modules/@shikijs/engine-oniguruma": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@shikijs/engine-oniguruma/-/engine-oniguruma-2.1.0.tgz", + "integrity": "sha512-Ujik33wEDqgqY2WpjRDUBECGcKPv3eGGkoXPujIXvokLaRmGky8NisSk8lHUGeSFxo/Cz5sgFej9sJmA9yeepg==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@shikijs/types": "2.1.0", + "@shikijs/vscode-textmate": "^10.0.1" + } + }, + "node_modules/@shikijs/langs": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@shikijs/langs/-/langs-2.1.0.tgz", + "integrity": "sha512-Jn0gS4rPgerMDPj1ydjgFzZr5fAIoMYz4k7ZT3LJxWWBWA6lokK0pumUwVtb+MzXtlpjxOaQejLprmLbvMZyww==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@shikijs/types": "2.1.0" + } + }, + "node_modules/@shikijs/themes": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@shikijs/themes/-/themes-2.1.0.tgz", + "integrity": "sha512-oS2mU6+bz+8TKutsjBxBA7Z3vrQk21RCmADLpnu8cy3tZD6Rw0FKqDyXNtwX52BuIDKHxZNmRlTdG3vtcYv3NQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@shikijs/types": "2.1.0" + } + }, + "node_modules/@shikijs/transformers": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@shikijs/transformers/-/transformers-2.1.0.tgz", + "integrity": "sha512-3sfvh6OKUVkT5wZFU1xxiq1qqNIuCwUY3yOb9ZGm19y80UZ/eoroLE2orGNzfivyTxR93GfXXZC/ghPR0/SBow==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@shikijs/core": "2.1.0", + "@shikijs/types": "2.1.0" + } + }, + "node_modules/@shikijs/types": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@shikijs/types/-/types-2.1.0.tgz", + "integrity": "sha512-OFOdHA6VEVbiQvepJ8yqicC6VmBrKxFFhM2EsHHrZESqLVAXOSeRDiuSYV185lIgp15TVic5vYBYNhTsk1xHLg==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@shikijs/vscode-textmate": "^10.0.1", + "@types/hast": "^3.0.4" + } + }, + "node_modules/@shikijs/vscode-textmate": { + "version": "10.0.1", + "resolved": "https://registry.npmjs.org/@shikijs/vscode-textmate/-/vscode-textmate-10.0.1.tgz", + "integrity": "sha512-fTIQwLF+Qhuws31iw7Ncl1R3HUDtGwIipiJ9iU+UsDUwMhegFcQKQHd51nZjb7CArq0MvON8rbgCGQYWHUKAdg==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/@types/estree": { + "version": "1.0.6", + "resolved": "https://registry.npmjs.org/@types/estree/-/estree-1.0.6.tgz", + "integrity": "sha512-AYnb1nQyY49te+VRAVgmzfcgjYS91mY5P0TKUDCLEM+gNnA+3T6rWITXRLYCpahpqSQbN5cE+gHpnPyXjHWxcw==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/@types/hast": { + "version": "3.0.4", + "resolved": "https://registry.npmjs.org/@types/hast/-/hast-3.0.4.tgz", + "integrity": "sha512-WPs+bbQw5aCj+x6laNGWLH3wviHtoCv/P3+otBhbOhJgG8qtpdAMlTCxLtsTWA7LH1Oh/bFCHsBn0TPS5m30EQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/unist": "*" + } + }, + "node_modules/@types/linkify-it": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/@types/linkify-it/-/linkify-it-5.0.0.tgz", + "integrity": "sha512-sVDA58zAw4eWAffKOaQH5/5j3XeayukzDk+ewSsnv3p4yJEZHCCzMDiZM8e0OUrRvmpGZ85jf4yDHkHsgBNr9Q==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/@types/markdown-it": { + "version": "14.1.2", + "resolved": "https://registry.npmjs.org/@types/markdown-it/-/markdown-it-14.1.2.tgz", + "integrity": "sha512-promo4eFwuiW+TfGxhi+0x3czqTYJkG8qB17ZUJiVF10Xm7NLVRSLUsfRTU/6h1e24VvRnXCx+hG7li58lkzog==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/linkify-it": "^5", + "@types/mdurl": "^2" + } + }, + "node_modules/@types/mdast": { + "version": "4.0.4", + "resolved": "https://registry.npmjs.org/@types/mdast/-/mdast-4.0.4.tgz", + "integrity": "sha512-kGaNbPh1k7AFzgpud/gMdvIm5xuECykRR+JnWKQno9TAXVa6WIVCGTPvYGekIDL4uwCZQSYbUxNBSb1aUo79oA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/unist": "*" + } + }, + "node_modules/@types/mdurl": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/@types/mdurl/-/mdurl-2.0.0.tgz", + "integrity": "sha512-RGdgjQUZba5p6QEFAVx2OGb8rQDL/cPRG7GiedRzMcJ1tYnUANBncjbSB1NRGwbvjcPeikRABz2nshyPk1bhWg==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/@types/unist": { + "version": "3.0.3", + "resolved": "https://registry.npmjs.org/@types/unist/-/unist-3.0.3.tgz", + "integrity": "sha512-ko/gIFJRv177XgZsZcBwnqJN5x/Gien8qNOn0D5bQU/zAzVf9Zt3BlcUiLqhV9y4ARk0GbT3tnUiPNgnTXzc/Q==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/@types/web-bluetooth": { + "version": "0.0.20", + "resolved": "https://registry.npmjs.org/@types/web-bluetooth/-/web-bluetooth-0.0.20.tgz", + "integrity": "sha512-g9gZnnXVq7gM7v3tJCWV/qw7w+KeOlSHAhgF9RytFyifW6AF61hdT2ucrYhPq9hLs5JIryeupHV3qGk95dH9ow==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/@ungap/structured-clone": { + "version": "1.3.0", + "resolved": "https://registry.npmjs.org/@ungap/structured-clone/-/structured-clone-1.3.0.tgz", + "integrity": "sha512-WmoN8qaIAo7WTYWbAZuG8PYEhn5fkz7dZrqTBZ7dtt//lL2Gwms1IcnQ5yHqjDfX8Ft5j4YzDM23f87zBfDe9g==", + "dev": true, + "license": "ISC", + "peer": true + }, + "node_modules/@vitejs/plugin-vue": { + "version": "5.2.1", + "resolved": "https://registry.npmjs.org/@vitejs/plugin-vue/-/plugin-vue-5.2.1.tgz", + "integrity": "sha512-cxh314tzaWwOLqVes2gnnCtvBDcM1UMdn+iFR+UjAn411dPT3tOmqrJjbMd7koZpMAmBM/GqeV4n9ge7JSiJJQ==", + "dev": true, + "license": "MIT", + "peer": true, + "engines": { + "node": "^18.0.0 || >=20.0.0" + }, + "peerDependencies": { + "vite": "^5.0.0 || ^6.0.0", + "vue": "^3.2.25" + } + }, + "node_modules/@vue/compiler-core": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/@vue/compiler-core/-/compiler-core-3.5.13.tgz", + "integrity": "sha512-oOdAkwqUfW1WqpwSYJce06wvt6HljgY3fGeM9NcVA1HaYOij3mZG9Rkysn0OHuyUAGMbEbARIpsG+LPVlBJ5/Q==", + "license": "MIT", + "peer": true, + "dependencies": { + "@babel/parser": "^7.25.3", + "@vue/shared": "3.5.13", + "entities": "^4.5.0", + "estree-walker": "^2.0.2", + "source-map-js": "^1.2.0" + } + }, + "node_modules/@vue/compiler-dom": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/@vue/compiler-dom/-/compiler-dom-3.5.13.tgz", + "integrity": "sha512-ZOJ46sMOKUjO3e94wPdCzQ6P1Lx/vhp2RSvfaab88Ajexs0AHeV0uasYhi99WPaogmBlRHNRuly8xV75cNTMDA==", + "license": "MIT", + "peer": true, + "dependencies": { + "@vue/compiler-core": "3.5.13", + "@vue/shared": "3.5.13" + } + }, + "node_modules/@vue/compiler-sfc": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/@vue/compiler-sfc/-/compiler-sfc-3.5.13.tgz", + "integrity": "sha512-6VdaljMpD82w6c2749Zhf5T9u5uLBWKnVue6XWxprDobftnletJ8+oel7sexFfM3qIxNmVE7LSFGTpv6obNyaQ==", + "license": "MIT", + "peer": true, + "dependencies": { + "@babel/parser": "^7.25.3", + "@vue/compiler-core": "3.5.13", + "@vue/compiler-dom": "3.5.13", + "@vue/compiler-ssr": "3.5.13", + "@vue/shared": "3.5.13", + "estree-walker": "^2.0.2", + "magic-string": "^0.30.11", + "postcss": "^8.4.48", + "source-map-js": "^1.2.0" + } + }, + "node_modules/@vue/compiler-ssr": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/@vue/compiler-ssr/-/compiler-ssr-3.5.13.tgz", + "integrity": "sha512-wMH6vrYHxQl/IybKJagqbquvxpWCuVYpoUJfCqFZwa/JY1GdATAQ+TgVtgrwwMZ0D07QhA99rs/EAAWfvG6KpA==", + "license": "MIT", + "peer": true, + "dependencies": { + "@vue/compiler-dom": "3.5.13", + "@vue/shared": "3.5.13" + } + }, + "node_modules/@vue/devtools-api": { + "version": "7.7.1", + "resolved": "https://registry.npmjs.org/@vue/devtools-api/-/devtools-api-7.7.1.tgz", + "integrity": "sha512-Cexc8GimowoDkJ6eNelOPdYIzsu2mgNyp0scOQ3tiaYSb9iok6LOESSsJvHaI+ib3joRfqRJNLkHFjhNuWA5dg==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@vue/devtools-kit": "^7.7.1" + } + }, + "node_modules/@vue/devtools-kit": { + "version": "7.7.1", + "resolved": "https://registry.npmjs.org/@vue/devtools-kit/-/devtools-kit-7.7.1.tgz", + "integrity": "sha512-yhZ4NPnK/tmxGtLNQxmll90jIIXdb2jAhPF76anvn5M/UkZCiLJy28bYgPIACKZ7FCosyKoaope89/RsFJll1w==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@vue/devtools-shared": "^7.7.1", + "birpc": "^0.2.19", + "hookable": "^5.5.3", + "mitt": "^3.0.1", + "perfect-debounce": "^1.0.0", + "speakingurl": "^14.0.1", + "superjson": "^2.2.1" + } + }, + "node_modules/@vue/devtools-shared": { + "version": "7.7.1", + "resolved": "https://registry.npmjs.org/@vue/devtools-shared/-/devtools-shared-7.7.1.tgz", + "integrity": "sha512-BtgF7kHq4BHG23Lezc/3W2UhK2ga7a8ohAIAGJMBr4BkxUFzhqntQtCiuL1ijo2ztWnmusymkirgqUrXoQKumA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "rfdc": "^1.4.1" + } + }, + "node_modules/@vue/reactivity": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/@vue/reactivity/-/reactivity-3.5.13.tgz", + "integrity": "sha512-NaCwtw8o48B9I6L1zl2p41OHo/2Z4wqYGGIK1Khu5T7yxrn+ATOixn/Udn2m+6kZKB/J7cuT9DbWWhRxqixACg==", + "license": "MIT", + "peer": true, + "dependencies": { + "@vue/shared": "3.5.13" + } + }, + "node_modules/@vue/runtime-core": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/@vue/runtime-core/-/runtime-core-3.5.13.tgz", + "integrity": "sha512-Fj4YRQ3Az0WTZw1sFe+QDb0aXCerigEpw418pw1HBUKFtnQHWzwojaukAs2X/c9DQz4MQ4bsXTGlcpGxU/RCIw==", + "license": "MIT", + "peer": true, + "dependencies": { + "@vue/reactivity": "3.5.13", + "@vue/shared": "3.5.13" + } + }, + "node_modules/@vue/runtime-dom": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/@vue/runtime-dom/-/runtime-dom-3.5.13.tgz", + "integrity": "sha512-dLaj94s93NYLqjLiyFzVs9X6dWhTdAlEAciC3Moq7gzAc13VJUdCnjjRurNM6uTLFATRHexHCTu/Xp3eW6yoog==", + "license": "MIT", + "peer": true, + "dependencies": { + "@vue/reactivity": "3.5.13", + "@vue/runtime-core": "3.5.13", + "@vue/shared": "3.5.13", + "csstype": "^3.1.3" + } + }, + "node_modules/@vue/server-renderer": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/@vue/server-renderer/-/server-renderer-3.5.13.tgz", + "integrity": "sha512-wAi4IRJV/2SAW3htkTlB+dHeRmpTiVIK1OGLWV1yeStVSebSQQOwGwIq0D3ZIoBj2C2qpgz5+vX9iEBkTdk5YA==", + "license": "MIT", + "peer": true, + "dependencies": { + "@vue/compiler-ssr": "3.5.13", + "@vue/shared": "3.5.13" + }, + "peerDependencies": { + "vue": "3.5.13" + } + }, + "node_modules/@vue/shared": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/@vue/shared/-/shared-3.5.13.tgz", + "integrity": "sha512-/hnE/qP5ZoGpol0a5mDi45bOd7t3tjYJBjsgCsivow7D48cJeV5l05RD82lPqi7gRiphZM37rnhW1l6ZoCNNnQ==", + "license": "MIT", + "peer": true + }, + "node_modules/@vueuse/core": { + "version": "12.5.0", + "resolved": "https://registry.npmjs.org/@vueuse/core/-/core-12.5.0.tgz", + "integrity": "sha512-GVyH1iYqNANwcahAx8JBm6awaNgvR/SwZ1fjr10b8l1HIgDp82ngNbfzJUgOgWEoxjL+URAggnlilAEXwCOZtg==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/web-bluetooth": "^0.0.20", + "@vueuse/metadata": "12.5.0", + "@vueuse/shared": "12.5.0", + "vue": "^3.5.13" + }, + "funding": { + "url": "https://github.com/sponsors/antfu" + } + }, + "node_modules/@vueuse/integrations": { + "version": "12.5.0", + "resolved": "https://registry.npmjs.org/@vueuse/integrations/-/integrations-12.5.0.tgz", + "integrity": "sha512-HYLt8M6mjUfcoUOzyBcX2RjpfapIwHPBmQJtTmXOQW845Y/Osu9VuTJ5kPvnmWJ6IUa05WpblfOwZ+P0G4iZsQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@vueuse/core": "12.5.0", + "@vueuse/shared": "12.5.0", + "vue": "^3.5.13" + }, + "funding": { + "url": "https://github.com/sponsors/antfu" + }, + "peerDependencies": { + "async-validator": "^4", + "axios": "^1", + "change-case": "^5", + "drauu": "^0.4", + "focus-trap": "^7", + "fuse.js": "^7", + "idb-keyval": "^6", + "jwt-decode": "^4", + "nprogress": "^0.2", + "qrcode": "^1.5", + "sortablejs": "^1", + "universal-cookie": "^7" + }, + "peerDependenciesMeta": { + "async-validator": { + "optional": true + }, + "axios": { + "optional": true + }, + "change-case": { + "optional": true + }, + "drauu": { + "optional": true + }, + "focus-trap": { + "optional": true + }, + "fuse.js": { + "optional": true + }, + "idb-keyval": { + "optional": true + }, + "jwt-decode": { + "optional": true + }, + "nprogress": { + "optional": true + }, + "qrcode": { + "optional": true + }, + "sortablejs": { + "optional": true + }, + "universal-cookie": { + "optional": true + } + } + }, + "node_modules/@vueuse/metadata": { + "version": "12.5.0", + "resolved": "https://registry.npmjs.org/@vueuse/metadata/-/metadata-12.5.0.tgz", + "integrity": "sha512-Ui7Lo2a7AxrMAXRF+fAp9QsXuwTeeZ8fIB9wsLHqzq9MQk+2gMYE2IGJW48VMJ8ecvCB3z3GsGLKLbSasQ5Qlg==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "url": "https://github.com/sponsors/antfu" + } + }, + "node_modules/@vueuse/shared": { + "version": "12.5.0", + "resolved": "https://registry.npmjs.org/@vueuse/shared/-/shared-12.5.0.tgz", + "integrity": "sha512-vMpcL1lStUU6O+kdj6YdHDixh0odjPAUM15uJ9f7MY781jcYkIwFA4iv2EfoIPO6vBmvutI1HxxAwmf0cx5ISQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "vue": "^3.5.13" + }, + "funding": { + "url": "https://github.com/sponsors/antfu" + } + }, + "node_modules/algoliasearch": { + "version": "5.20.0", + "resolved": "https://registry.npmjs.org/algoliasearch/-/algoliasearch-5.20.0.tgz", + "integrity": "sha512-groO71Fvi5SWpxjI9Ia+chy0QBwT61mg6yxJV27f5YFf+Mw+STT75K6SHySpP8Co5LsCrtsbCH5dJZSRtkSKaQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@algolia/client-abtesting": "5.20.0", + "@algolia/client-analytics": "5.20.0", + "@algolia/client-common": "5.20.0", + "@algolia/client-insights": "5.20.0", + "@algolia/client-personalization": "5.20.0", + "@algolia/client-query-suggestions": "5.20.0", + "@algolia/client-search": "5.20.0", + "@algolia/ingestion": "1.20.0", + "@algolia/monitoring": "1.20.0", + "@algolia/recommend": "5.20.0", + "@algolia/requester-browser-xhr": "5.20.0", + "@algolia/requester-fetch": "5.20.0", + "@algolia/requester-node-http": "5.20.0" + }, + "engines": { + "node": ">= 14.0.0" + } + }, + "node_modules/birpc": { + "version": "0.2.19", + "resolved": "https://registry.npmjs.org/birpc/-/birpc-0.2.19.tgz", + "integrity": "sha512-5WeXXAvTmitV1RqJFppT5QtUiz2p1mRSYU000Jkft5ZUCLJIk4uQriYNO50HknxKwM6jd8utNc66K1qGIwwWBQ==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "url": "https://github.com/sponsors/antfu" + } + }, + "node_modules/ccount": { + "version": "2.0.1", + "resolved": "https://registry.npmjs.org/ccount/-/ccount-2.0.1.tgz", + "integrity": "sha512-eyrF0jiFpY+3drT6383f1qhkbGsLSifNAjA61IUjZjmLCWjItY6LB9ft9YhoDgwfmclB2zhu51Lc7+95b8NRAg==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/character-entities-html4": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/character-entities-html4/-/character-entities-html4-2.1.0.tgz", + "integrity": "sha512-1v7fgQRj6hnSwFpq1Eu0ynr/CDEw0rXo2B61qXrLNdHZmPKgb7fqS1a2JwF0rISo9q77jDI8VMEHoApn8qDoZA==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/character-entities-legacy": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/character-entities-legacy/-/character-entities-legacy-3.0.0.tgz", + "integrity": "sha512-RpPp0asT/6ufRm//AJVwpViZbGM/MkjQFxJccQRHmISF/22NBtsHqAWmL+/pmkPWoIUJdWyeVleTl1wydHATVQ==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/comma-separated-tokens": { + "version": "2.0.3", + "resolved": "https://registry.npmjs.org/comma-separated-tokens/-/comma-separated-tokens-2.0.3.tgz", + "integrity": "sha512-Fu4hJdvzeylCfQPp9SGWidpzrMs7tTrlu6Vb8XGaRGck8QSNZJJp538Wrb60Lax4fPwR64ViY468OIUTbRlGZg==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/copy-anything": { + "version": "3.0.5", + "resolved": "https://registry.npmjs.org/copy-anything/-/copy-anything-3.0.5.tgz", + "integrity": "sha512-yCEafptTtb4bk7GLEQoM8KVJpxAfdBJYaXyzQEgQQQgYrZiDp8SJmGKlYza6CYjEDNstAdNdKA3UuoULlEbS6w==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "is-what": "^4.1.8" + }, + "engines": { + "node": ">=12.13" + }, + "funding": { + "url": "https://github.com/sponsors/mesqueeb" + } + }, + "node_modules/csstype": { + "version": "3.1.3", + "resolved": "https://registry.npmjs.org/csstype/-/csstype-3.1.3.tgz", + "integrity": "sha512-M1uQkMl8rQK/szD0LNhtqxIPLpimGm8sOBwU7lLnCpSbTyY3yeU1Vc7l4KT5zT4s/yOxHH5O7tIuuLOCnLADRw==", + "license": "MIT", + "peer": true + }, + "node_modules/dequal": { + "version": "2.0.3", + "resolved": "https://registry.npmjs.org/dequal/-/dequal-2.0.3.tgz", + "integrity": "sha512-0je+qPKHEMohvfRTCEo3CrPG6cAzAYgmzKyxRiYSSDkS6eGJdyVJm7WaYA5ECaAD9wLB2T4EEeymA5aFVcYXCA==", + "dev": true, + "license": "MIT", + "peer": true, + "engines": { + "node": ">=6" + } + }, + "node_modules/devlop": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/devlop/-/devlop-1.1.0.tgz", + "integrity": "sha512-RWmIqhcFf1lRYBvNmr7qTNuyCt/7/ns2jbpp1+PalgE/rDQcBT0fioSMUpJ93irlUhC5hrg4cYqe6U+0ImW0rA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "dequal": "^2.0.0" + }, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/emoji-regex-xs": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/emoji-regex-xs/-/emoji-regex-xs-1.0.0.tgz", + "integrity": "sha512-LRlerrMYoIDrT6jgpeZ2YYl/L8EulRTt5hQcYjy5AInh7HWXKimpqx68aknBFpGL2+/IcogTcaydJEgaTmOpDg==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/entities": { + "version": "4.5.0", + "resolved": "https://registry.npmjs.org/entities/-/entities-4.5.0.tgz", + "integrity": "sha512-V0hjH4dGPh9Ao5p0MoRY6BVqtwCjhz6vI5LT8AJ55H+4g9/4vbHx1I54fS0XuclLhDHArPQCiMjDxjaL8fPxhw==", + "license": "BSD-2-Clause", + "peer": true, + "engines": { + "node": ">=0.12" + }, + "funding": { + "url": "https://github.com/fb55/entities?sponsor=1" + } + }, + "node_modules/esbuild": { + "version": "0.21.5", + "resolved": "https://registry.npmjs.org/esbuild/-/esbuild-0.21.5.tgz", + "integrity": "sha512-mg3OPMV4hXywwpoDxu3Qda5xCKQi+vCTZq8S9J/EpkhB2HzKXq4SNFZE3+NK93JYxc8VMSep+lOUSC/RVKaBqw==", + "dev": true, + "hasInstallScript": true, + "license": "MIT", + "peer": true, + "bin": { + "esbuild": "bin/esbuild" + }, + "engines": { + "node": ">=12" + }, + "optionalDependencies": { + "@esbuild/aix-ppc64": "0.21.5", + "@esbuild/android-arm": "0.21.5", + "@esbuild/android-arm64": "0.21.5", + "@esbuild/android-x64": "0.21.5", + "@esbuild/darwin-arm64": "0.21.5", + "@esbuild/darwin-x64": "0.21.5", + "@esbuild/freebsd-arm64": "0.21.5", + "@esbuild/freebsd-x64": "0.21.5", + "@esbuild/linux-arm": "0.21.5", + "@esbuild/linux-arm64": "0.21.5", + "@esbuild/linux-ia32": "0.21.5", + "@esbuild/linux-loong64": "0.21.5", + "@esbuild/linux-mips64el": "0.21.5", + "@esbuild/linux-ppc64": "0.21.5", + "@esbuild/linux-riscv64": "0.21.5", + "@esbuild/linux-s390x": "0.21.5", + "@esbuild/linux-x64": "0.21.5", + "@esbuild/netbsd-x64": "0.21.5", + "@esbuild/openbsd-x64": "0.21.5", + "@esbuild/sunos-x64": "0.21.5", + "@esbuild/win32-arm64": "0.21.5", + "@esbuild/win32-ia32": "0.21.5", + "@esbuild/win32-x64": "0.21.5" + } + }, + "node_modules/estree-walker": { + "version": "2.0.2", + "resolved": "https://registry.npmjs.org/estree-walker/-/estree-walker-2.0.2.tgz", + "integrity": "sha512-Rfkk/Mp/DL7JVje3u18FxFujQlTNR2q6QfMSMB7AvCBx91NGj/ba3kCfza0f6dVDbw7YlRf/nDrn7pQrCCyQ/w==", + "license": "MIT", + "peer": true + }, + "node_modules/focus-trap": { + "version": "7.6.4", + "resolved": "https://registry.npmjs.org/focus-trap/-/focus-trap-7.6.4.tgz", + "integrity": "sha512-xx560wGBk7seZ6y933idtjJQc1l+ck+pI3sKvhKozdBV1dRZoKhkW5xoCaFv9tQiX5RH1xfSxjuNu6g+lmN/gw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "tabbable": "^6.2.0" + } + }, + "node_modules/fsevents": { + "version": "2.3.3", + "resolved": "https://registry.npmjs.org/fsevents/-/fsevents-2.3.3.tgz", + "integrity": "sha512-5xoDfX+fL7faATnagmWPpbFtwh/R77WmMMqqHGS65C3vvB0YHrgF+B1YmZ3441tMj5n63k0212XNoJwzlhffQw==", + "dev": true, + "hasInstallScript": true, + "license": "MIT", + "optional": true, + "os": [ + "darwin" + ], + "peer": true, + "engines": { + "node": "^8.16.0 || ^10.6.0 || >=11.0.0" + } + }, + "node_modules/hast-util-to-html": { + "version": "9.0.4", + "resolved": "https://registry.npmjs.org/hast-util-to-html/-/hast-util-to-html-9.0.4.tgz", + "integrity": "sha512-wxQzXtdbhiwGAUKrnQJXlOPmHnEehzphwkK7aluUPQ+lEc1xefC8pblMgpp2w5ldBTEfveRIrADcrhGIWrlTDA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/hast": "^3.0.0", + "@types/unist": "^3.0.0", + "ccount": "^2.0.0", + "comma-separated-tokens": "^2.0.0", + "hast-util-whitespace": "^3.0.0", + "html-void-elements": "^3.0.0", + "mdast-util-to-hast": "^13.0.0", + "property-information": "^6.0.0", + "space-separated-tokens": "^2.0.0", + "stringify-entities": "^4.0.0", + "zwitch": "^2.0.4" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/hast-util-whitespace": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/hast-util-whitespace/-/hast-util-whitespace-3.0.0.tgz", + "integrity": "sha512-88JUN06ipLwsnv+dVn+OIYOvAuvBMy/Qoi6O7mQHxdPXpjy+Cd6xRkWwux7DKO+4sYILtLBRIKgsdpS2gQc7qw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/hast": "^3.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/hookable": { + "version": "5.5.3", + "resolved": "https://registry.npmjs.org/hookable/-/hookable-5.5.3.tgz", + "integrity": "sha512-Yc+BQe8SvoXH1643Qez1zqLRmbA5rCL+sSmk6TVos0LWVfNIB7PGncdlId77WzLGSIB5KaWgTaNTs2lNVEI6VQ==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/html-void-elements": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/html-void-elements/-/html-void-elements-3.0.0.tgz", + "integrity": "sha512-bEqo66MRXsUGxWHV5IP0PUiAWwoEjba4VCzg0LjFJBpchPaTfyfCKTG6bc5F8ucKec3q5y6qOdGyYTSBEvhCrg==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/is-what": { + "version": "4.1.16", + "resolved": "https://registry.npmjs.org/is-what/-/is-what-4.1.16.tgz", + "integrity": "sha512-ZhMwEosbFJkA0YhFnNDgTM4ZxDRsS6HqTo7qsZM08fehyRYIYa0yHu5R6mgo1n/8MgaPBXiPimPD77baVFYg+A==", + "dev": true, + "license": "MIT", + "peer": true, + "engines": { + "node": ">=12.13" + }, + "funding": { + "url": "https://github.com/sponsors/mesqueeb" + } + }, + "node_modules/lucide-static": { + "version": "0.487.0", + "resolved": "https://registry.npmjs.org/lucide-static/-/lucide-static-0.487.0.tgz", + "integrity": "sha512-voCG76ciX9Ri74MN4THwJbKY6iLBEvtiaWUKJwd0nk+ff4X247GPlukxvgUzCgYHpejrHLNdiVjlT0xOIayMLQ==", + "license": "ISC" + }, + "node_modules/lucide-vue-next": { + "version": "0.487.0", + "resolved": "https://registry.npmjs.org/lucide-vue-next/-/lucide-vue-next-0.487.0.tgz", + "integrity": "sha512-ilVgu9EHkfId7WSjmoPkzp13cuzpSGO5J16AmltjRHFoj6MlCBGY8BzsBU/ISKVlDheUxM+MsIYjNo/1hSEa6w==", + "license": "ISC", + "peerDependencies": { + "vue": ">=3.0.1" + } + }, + "node_modules/magic-string": { + "version": "0.30.17", + "resolved": "https://registry.npmjs.org/magic-string/-/magic-string-0.30.17.tgz", + "integrity": "sha512-sNPKHvyjVf7gyjwS4xGTaW/mCnF8wnjtifKBEhxfZ7E/S8tQ0rssrwGNn6q8JH/ohItJfSQp9mBtQYuTlH5QnA==", + "license": "MIT", + "peer": true, + "dependencies": { + "@jridgewell/sourcemap-codec": "^1.5.0" + } + }, + "node_modules/mark.js": { + "version": "8.11.1", + "resolved": "https://registry.npmjs.org/mark.js/-/mark.js-8.11.1.tgz", + "integrity": "sha512-1I+1qpDt4idfgLQG+BNWmrqku+7/2bi5nLf4YwF8y8zXvmfiTBY3PV3ZibfrjBueCByROpuBjLLFCajqkgYoLQ==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/mdast-util-to-hast": { + "version": "13.2.0", + "resolved": "https://registry.npmjs.org/mdast-util-to-hast/-/mdast-util-to-hast-13.2.0.tgz", + "integrity": "sha512-QGYKEuUsYT9ykKBCMOEDLsU5JRObWQusAolFMeko/tYPufNkRffBAQjIE+99jbA87xv6FgmjLtwjh9wBWajwAA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/hast": "^3.0.0", + "@types/mdast": "^4.0.0", + "@ungap/structured-clone": "^1.0.0", + "devlop": "^1.0.0", + "micromark-util-sanitize-uri": "^2.0.0", + "trim-lines": "^3.0.0", + "unist-util-position": "^5.0.0", + "unist-util-visit": "^5.0.0", + "vfile": "^6.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/medium-zoom": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/medium-zoom/-/medium-zoom-1.1.0.tgz", + "integrity": "sha512-ewyDsp7k4InCUp3jRmwHBRFGyjBimKps/AJLjRSox+2q/2H4p/PNpQf+pwONWlJiOudkBXtbdmVbFjqyybfTmQ==", + "license": "MIT" + }, + "node_modules/micromark-util-character": { + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/micromark-util-character/-/micromark-util-character-2.1.1.tgz", + "integrity": "sha512-wv8tdUTJ3thSFFFJKtpYKOYiGP2+v96Hvk4Tu8KpCAsTMs6yi+nVmGh1syvSCsaxz45J6Jbw+9DD6g97+NV67Q==", + "dev": true, + "funding": [ + { + "type": "GitHub Sponsors", + "url": "https://github.com/sponsors/unifiedjs" + }, + { + "type": "OpenCollective", + "url": "https://opencollective.com/unified" + } + ], + "license": "MIT", + "peer": true, + "dependencies": { + "micromark-util-symbol": "^2.0.0", + "micromark-util-types": "^2.0.0" + } + }, + "node_modules/micromark-util-encode": { + "version": "2.0.1", + "resolved": "https://registry.npmjs.org/micromark-util-encode/-/micromark-util-encode-2.0.1.tgz", + "integrity": "sha512-c3cVx2y4KqUnwopcO9b/SCdo2O67LwJJ/UyqGfbigahfegL9myoEFoDYZgkT7f36T0bLrM9hZTAaAyH+PCAXjw==", + "dev": true, + "funding": [ + { + "type": "GitHub Sponsors", + "url": "https://github.com/sponsors/unifiedjs" + }, + { + "type": "OpenCollective", + "url": "https://opencollective.com/unified" + } + ], + "license": "MIT", + "peer": true + }, + "node_modules/micromark-util-sanitize-uri": { + "version": "2.0.1", + "resolved": "https://registry.npmjs.org/micromark-util-sanitize-uri/-/micromark-util-sanitize-uri-2.0.1.tgz", + "integrity": "sha512-9N9IomZ/YuGGZZmQec1MbgxtlgougxTodVwDzzEouPKo3qFWvymFHWcnDi2vzV1ff6kas9ucW+o3yzJK9YB1AQ==", + "dev": true, + "funding": [ + { + "type": "GitHub Sponsors", + "url": "https://github.com/sponsors/unifiedjs" + }, + { + "type": "OpenCollective", + "url": "https://opencollective.com/unified" + } + ], + "license": "MIT", + "peer": true, + "dependencies": { + "micromark-util-character": "^2.0.0", + "micromark-util-encode": "^2.0.0", + "micromark-util-symbol": "^2.0.0" + } + }, + "node_modules/micromark-util-symbol": { + "version": "2.0.1", + "resolved": "https://registry.npmjs.org/micromark-util-symbol/-/micromark-util-symbol-2.0.1.tgz", + "integrity": "sha512-vs5t8Apaud9N28kgCrRUdEed4UJ+wWNvicHLPxCa9ENlYuAY31M0ETy5y1vA33YoNPDFTghEbnh6efaE8h4x0Q==", + "dev": true, + "funding": [ + { + "type": "GitHub Sponsors", + "url": "https://github.com/sponsors/unifiedjs" + }, + { + "type": "OpenCollective", + "url": "https://opencollective.com/unified" + } + ], + "license": "MIT", + "peer": true + }, + "node_modules/micromark-util-types": { + "version": "2.0.1", + "resolved": "https://registry.npmjs.org/micromark-util-types/-/micromark-util-types-2.0.1.tgz", + "integrity": "sha512-534m2WhVTddrcKVepwmVEVnUAmtrx9bfIjNoQHRqfnvdaHQiFytEhJoTgpWJvDEXCO5gLTQh3wYC1PgOJA4NSQ==", + "dev": true, + "funding": [ + { + "type": "GitHub Sponsors", + "url": "https://github.com/sponsors/unifiedjs" + }, + { + "type": "OpenCollective", + "url": "https://opencollective.com/unified" + } + ], + "license": "MIT", + "peer": true + }, + "node_modules/minisearch": { + "version": "7.1.1", + "resolved": "https://registry.npmjs.org/minisearch/-/minisearch-7.1.1.tgz", + "integrity": "sha512-b3YZEYCEH4EdCAtYP7OlDyx7FdPwNzuNwLQ34SfJpM9dlbBZzeXndGavTrC+VCiRWomL21SWfMc6SCKO/U2ZNw==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/mitt": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/mitt/-/mitt-3.0.1.tgz", + "integrity": "sha512-vKivATfr97l2/QBCYAkXYDbrIWPM2IIKEl7YPhjCvKlG3kE2gm+uBo6nEXK3M5/Ffh/FLpKExzOQ3JJoJGFKBw==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/nanoid": { + "version": "3.3.8", + "resolved": "https://registry.npmjs.org/nanoid/-/nanoid-3.3.8.tgz", + "integrity": "sha512-WNLf5Sd8oZxOm+TzppcYk8gVOgP+l58xNy58D0nbUnOxOWRWvlcCV4kUF7ltmI6PsrLl/BgKEyS4mqsGChFN0w==", + "funding": [ + { + "type": "github", + "url": "https://github.com/sponsors/ai" + } + ], + "license": "MIT", + "peer": true, + "bin": { + "nanoid": "bin/nanoid.cjs" + }, + "engines": { + "node": "^10 || ^12 || ^13.7 || ^14 || >=15.0.1" + } + }, + "node_modules/oniguruma-to-es": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/oniguruma-to-es/-/oniguruma-to-es-2.3.0.tgz", + "integrity": "sha512-bwALDxriqfKGfUufKGGepCzu9x7nJQuoRoAFp4AnwehhC2crqrDIAP/uN2qdlsAvSMpeRC3+Yzhqc7hLmle5+g==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "emoji-regex-xs": "^1.0.0", + "regex": "^5.1.1", + "regex-recursion": "^5.1.1" + } + }, + "node_modules/papaparse": { + "version": "5.5.2", + "resolved": "https://registry.npmjs.org/papaparse/-/papaparse-5.5.2.tgz", + "integrity": "sha512-PZXg8UuAc4PcVwLosEEDYjPyfWnTEhOrUfdv+3Bx+NuAb+5NhDmXzg5fHWmdCh1mP5p7JAZfFr3IMQfcntNAdA==", + "license": "MIT" + }, + "node_modules/perfect-debounce": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/perfect-debounce/-/perfect-debounce-1.0.0.tgz", + "integrity": "sha512-xCy9V055GLEqoFaHoC1SoLIaLmWctgCUaBaWxDZ7/Zx4CTyX7cJQLJOok/orfjZAh9kEYpjJa4d0KcJmCbctZA==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/picocolors": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/picocolors/-/picocolors-1.1.1.tgz", + "integrity": "sha512-xceH2snhtb5M9liqDsmEw56le376mTZkEX/jEb/RxNFyegNul7eNslCXP9FDj/Lcu0X8KEyMceP2ntpaHrDEVA==", + "license": "ISC", + "peer": true + }, + "node_modules/postcss": { + "version": "8.5.1", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-8.5.1.tgz", + "integrity": "sha512-6oz2beyjc5VMn/KV1pPw8fliQkhBXrVn1Z3TVyqZxU8kZpzEKhBdmCFqI6ZbmGtamQvQGuU1sgPTk8ZrXDD7jQ==", + "funding": [ + { + "type": "opencollective", + "url": "https://opencollective.com/postcss/" + }, + { + "type": "tidelift", + "url": "https://tidelift.com/funding/github/npm/postcss" + }, + { + "type": "github", + "url": "https://github.com/sponsors/ai" + } + ], + "license": "MIT", + "peer": true, + "dependencies": { + "nanoid": "^3.3.8", + "picocolors": "^1.1.1", + "source-map-js": "^1.2.1" + }, + "engines": { + "node": "^10 || ^12 || >=14" + } + }, + "node_modules/preact": { + "version": "10.25.4", + "resolved": "https://registry.npmjs.org/preact/-/preact-10.25.4.tgz", + "integrity": "sha512-jLdZDb+Q+odkHJ+MpW/9U5cODzqnB+fy2EiHSZES7ldV5LK7yjlVzTp7R8Xy6W6y75kfK8iWYtFVH7lvjwrCMA==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/preact" + } + }, + "node_modules/property-information": { + "version": "6.5.0", + "resolved": "https://registry.npmjs.org/property-information/-/property-information-6.5.0.tgz", + "integrity": "sha512-PgTgs/BlvHxOu8QuEN7wi5A0OmXaBcHpmCSTehcs6Uuu9IkDIEo13Hy7n898RHfrQ49vKCoGeWZSaAK01nwVig==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/regex": { + "version": "5.1.1", + "resolved": "https://registry.npmjs.org/regex/-/regex-5.1.1.tgz", + "integrity": "sha512-dN5I359AVGPnwzJm2jN1k0W9LPZ+ePvoOeVMMfqIMFz53sSwXkxaJoxr50ptnsC771lK95BnTrVSZxq0b9yCGw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "regex-utilities": "^2.3.0" + } + }, + "node_modules/regex-recursion": { + "version": "5.1.1", + "resolved": "https://registry.npmjs.org/regex-recursion/-/regex-recursion-5.1.1.tgz", + "integrity": "sha512-ae7SBCbzVNrIjgSbh7wMznPcQel1DNlDtzensnFxpiNpXt1U2ju/bHugH422r+4LAVS1FpW1YCwilmnNsjum9w==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "regex": "^5.1.1", + "regex-utilities": "^2.3.0" + } + }, + "node_modules/regex-utilities": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/regex-utilities/-/regex-utilities-2.3.0.tgz", + "integrity": "sha512-8VhliFJAWRaUiVvREIiW2NXXTmHs4vMNnSzuJVhscgmGav3g9VDxLrQndI3dZZVVdp0ZO/5v0xmX516/7M9cng==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/rfdc": { + "version": "1.4.1", + "resolved": "https://registry.npmjs.org/rfdc/-/rfdc-1.4.1.tgz", + "integrity": "sha512-q1b3N5QkRUWUl7iyylaaj3kOpIT0N2i9MqIEQXP73GVsN9cw3fdx8X63cEmWhJGi2PPCF23Ijp7ktmd39rawIA==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/rollup": { + "version": "4.32.1", + "resolved": "https://registry.npmjs.org/rollup/-/rollup-4.32.1.tgz", + "integrity": "sha512-z+aeEsOeEa3mEbS1Tjl6sAZ8NE3+AalQz1RJGj81M+fizusbdDMoEJwdJNHfaB40Scr4qNu+welOfes7maKonA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/estree": "1.0.6" + }, + "bin": { + "rollup": "dist/bin/rollup" + }, + "engines": { + "node": ">=18.0.0", + "npm": ">=8.0.0" + }, + "optionalDependencies": { + "@rollup/rollup-android-arm-eabi": "4.32.1", + "@rollup/rollup-android-arm64": "4.32.1", + "@rollup/rollup-darwin-arm64": "4.32.1", + "@rollup/rollup-darwin-x64": "4.32.1", + "@rollup/rollup-freebsd-arm64": "4.32.1", + "@rollup/rollup-freebsd-x64": "4.32.1", + "@rollup/rollup-linux-arm-gnueabihf": "4.32.1", + "@rollup/rollup-linux-arm-musleabihf": "4.32.1", + "@rollup/rollup-linux-arm64-gnu": "4.32.1", + "@rollup/rollup-linux-arm64-musl": "4.32.1", + "@rollup/rollup-linux-loongarch64-gnu": "4.32.1", + "@rollup/rollup-linux-powerpc64le-gnu": "4.32.1", + "@rollup/rollup-linux-riscv64-gnu": "4.32.1", + "@rollup/rollup-linux-s390x-gnu": "4.32.1", + "@rollup/rollup-linux-x64-gnu": "4.32.1", + "@rollup/rollup-linux-x64-musl": "4.32.1", + "@rollup/rollup-win32-arm64-msvc": "4.32.1", + "@rollup/rollup-win32-ia32-msvc": "4.32.1", + "@rollup/rollup-win32-x64-msvc": "4.32.1", + "fsevents": "~2.3.2" + } + }, + "node_modules/search-insights": { + "version": "2.17.3", + "resolved": "https://registry.npmjs.org/search-insights/-/search-insights-2.17.3.tgz", + "integrity": "sha512-RQPdCYTa8A68uM2jwxoY842xDhvx3E5LFL1LxvxCNMev4o5mLuokczhzjAgGwUZBAmOKZknArSxLKmXtIi2AxQ==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/shiki": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/shiki/-/shiki-2.1.0.tgz", + "integrity": "sha512-yvKPdNGLXZv7WC4bl7JBbU3CEcUxnBanvMez8MG3gZXKpClGL4bHqFyLhTx+2zUvbjClUANs/S22HXb7aeOgmA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@shikijs/core": "2.1.0", + "@shikijs/engine-javascript": "2.1.0", + "@shikijs/engine-oniguruma": "2.1.0", + "@shikijs/langs": "2.1.0", + "@shikijs/themes": "2.1.0", + "@shikijs/types": "2.1.0", + "@shikijs/vscode-textmate": "^10.0.1", + "@types/hast": "^3.0.4" + } + }, + "node_modules/source-map-js": { + "version": "1.2.1", + "resolved": "https://registry.npmjs.org/source-map-js/-/source-map-js-1.2.1.tgz", + "integrity": "sha512-UXWMKhLOwVKb728IUtQPXxfYU+usdybtUrK/8uGE8CQMvrhOpwvzDBwj0QhSL7MQc7vIsISBG8VQ8+IDQxpfQA==", + "license": "BSD-3-Clause", + "peer": true, + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/space-separated-tokens": { + "version": "2.0.2", + "resolved": "https://registry.npmjs.org/space-separated-tokens/-/space-separated-tokens-2.0.2.tgz", + "integrity": "sha512-PEGlAwrG8yXGXRjW32fGbg66JAlOAwbObuqVoJpv/mRgoWDQfgH1wDPvtzWyUSNAXBGSk8h755YDbbcEy3SH2Q==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/speakingurl": { + "version": "14.0.1", + "resolved": "https://registry.npmjs.org/speakingurl/-/speakingurl-14.0.1.tgz", + "integrity": "sha512-1POYv7uv2gXoyGFpBCmpDVSNV74IfsWlDW216UPjbWufNf+bSU6GdbDsxdcxtfwb4xlI3yxzOTKClUosxARYrQ==", + "dev": true, + "license": "BSD-3-Clause", + "peer": true, + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/stringify-entities": { + "version": "4.0.4", + "resolved": "https://registry.npmjs.org/stringify-entities/-/stringify-entities-4.0.4.tgz", + "integrity": "sha512-IwfBptatlO+QCJUo19AqvrPNqlVMpW9YEL2LIVY+Rpv2qsjCGxaDLNRgeGsQWJhfItebuJhsGSLjaBbNSQ+ieg==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "character-entities-html4": "^2.0.0", + "character-entities-legacy": "^3.0.0" + }, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/superjson": { + "version": "2.2.2", + "resolved": "https://registry.npmjs.org/superjson/-/superjson-2.2.2.tgz", + "integrity": "sha512-5JRxVqC8I8NuOUjzBbvVJAKNM8qoVuH0O77h4WInc/qC2q5IreqKxYwgkga3PfA22OayK2ikceb/B26dztPl+Q==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "copy-anything": "^3.0.2" + }, + "engines": { + "node": ">=16" + } + }, + "node_modules/tabbable": { + "version": "6.2.0", + "resolved": "https://registry.npmjs.org/tabbable/-/tabbable-6.2.0.tgz", + "integrity": "sha512-Cat63mxsVJlzYvN51JmVXIgNoUokrIaT2zLclCXjRd8boZ0004U4KCs/sToJ75C6sdlByWxpYnb5Boif1VSFew==", + "dev": true, + "license": "MIT", + "peer": true + }, + "node_modules/trim-lines": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/trim-lines/-/trim-lines-3.0.1.tgz", + "integrity": "sha512-kRj8B+YHZCc9kQYdWfJB2/oUl9rA99qbowYYBtr4ui4mZyAQ2JpvVBd/6U2YloATfqBhBTSMhTpgBHtU0Mf3Rg==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + }, + "node_modules/unist-util-is": { + "version": "6.0.0", + "resolved": "https://registry.npmjs.org/unist-util-is/-/unist-util-is-6.0.0.tgz", + "integrity": "sha512-2qCTHimwdxLfz+YzdGfkqNlH0tLi9xjTnHddPmJwtIG9MGsdbutfTc4P+haPD7l7Cjxf/WZj+we5qfVPvvxfYw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/unist": "^3.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/unist-util-position": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/unist-util-position/-/unist-util-position-5.0.0.tgz", + "integrity": "sha512-fucsC7HjXvkB5R3kTCO7kUjRdrS0BJt3M/FPxmHMBOm8JQi2BsHAHFsy27E0EolP8rp0NzXsJ+jNPyDWvOJZPA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/unist": "^3.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/unist-util-stringify-position": { + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/unist-util-stringify-position/-/unist-util-stringify-position-4.0.0.tgz", + "integrity": "sha512-0ASV06AAoKCDkS2+xw5RXJywruurpbC4JZSm7nr7MOt1ojAzvyyaO+UxZf18j8FCF6kmzCZKcAgN/yu2gm2XgQ==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/unist": "^3.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/unist-util-visit": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/unist-util-visit/-/unist-util-visit-5.0.0.tgz", + "integrity": "sha512-MR04uvD+07cwl/yhVuVWAtw+3GOR/knlL55Nd/wAdblk27GCVt3lqpTivy/tkJcZoNPzTwS1Y+KMojlLDhoTzg==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/unist": "^3.0.0", + "unist-util-is": "^6.0.0", + "unist-util-visit-parents": "^6.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/unist-util-visit-parents": { + "version": "6.0.1", + "resolved": "https://registry.npmjs.org/unist-util-visit-parents/-/unist-util-visit-parents-6.0.1.tgz", + "integrity": "sha512-L/PqWzfTP9lzzEa6CKs0k2nARxTdZduw3zyh8d2NVBnsyvHjSX4TWse388YrrQKbvI8w20fGjGlhgT96WwKykw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/unist": "^3.0.0", + "unist-util-is": "^6.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/vfile": { + "version": "6.0.3", + "resolved": "https://registry.npmjs.org/vfile/-/vfile-6.0.3.tgz", + "integrity": "sha512-KzIbH/9tXat2u30jf+smMwFCsno4wHVdNmzFyL+T/L3UGqqk6JKfVqOFOZEpZSHADH1k40ab6NUIXZq422ov3Q==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/unist": "^3.0.0", + "vfile-message": "^4.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/vfile-message": { + "version": "4.0.2", + "resolved": "https://registry.npmjs.org/vfile-message/-/vfile-message-4.0.2.tgz", + "integrity": "sha512-jRDZ1IMLttGj41KcZvlrYAaI3CfqpLpfpf+Mfig13viT6NKvRzWZ+lXz0Y5D60w6uJIBAOGq9mSHf0gktF0duw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@types/unist": "^3.0.0", + "unist-util-stringify-position": "^4.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/unified" + } + }, + "node_modules/vite": { + "version": "5.4.14", + "resolved": "https://registry.npmjs.org/vite/-/vite-5.4.14.tgz", + "integrity": "sha512-EK5cY7Q1D8JNhSaPKVK4pwBFvaTmZxEnoKXLG/U9gmdDcihQGNzFlgIvaxezFR4glP1LsuiedwMBqCXH3wZccA==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "esbuild": "^0.21.3", + "postcss": "^8.4.43", + "rollup": "^4.20.0" + }, + "bin": { + "vite": "bin/vite.js" + }, + "engines": { + "node": "^18.0.0 || >=20.0.0" + }, + "funding": { + "url": "https://github.com/vitejs/vite?sponsor=1" + }, + "optionalDependencies": { + "fsevents": "~2.3.3" + }, + "peerDependencies": { + "@types/node": "^18.0.0 || >=20.0.0", + "less": "*", + "lightningcss": "^1.21.0", + "sass": "*", + "sass-embedded": "*", + "stylus": "*", + "sugarss": "*", + "terser": "^5.4.0" + }, + "peerDependenciesMeta": { + "@types/node": { + "optional": true + }, + "less": { + "optional": true + }, + "lightningcss": { + "optional": true + }, + "sass": { + "optional": true + }, + "sass-embedded": { + "optional": true + }, + "stylus": { + "optional": true + }, + "sugarss": { + "optional": true + }, + "terser": { + "optional": true + } + } + }, + "node_modules/vitepress": { + "version": "1.6.3", + "resolved": "https://registry.npmjs.org/vitepress/-/vitepress-1.6.3.tgz", + "integrity": "sha512-fCkfdOk8yRZT8GD9BFqusW3+GggWYZ/rYncOfmgcDtP3ualNHCAg+Robxp2/6xfH1WwPHtGpPwv7mbA3qomtBw==", + "dev": true, + "license": "MIT", + "peer": true, + "dependencies": { + "@docsearch/css": "3.8.2", + "@docsearch/js": "3.8.2", + "@iconify-json/simple-icons": "^1.2.21", + "@shikijs/core": "^2.1.0", + "@shikijs/transformers": "^2.1.0", + "@shikijs/types": "^2.1.0", + "@types/markdown-it": "^14.1.2", + "@vitejs/plugin-vue": "^5.2.1", + "@vue/devtools-api": "^7.7.0", + "@vue/shared": "^3.5.13", + "@vueuse/core": "^12.4.0", + "@vueuse/integrations": "^12.4.0", + "focus-trap": "^7.6.4", + "mark.js": "8.11.1", + "minisearch": "^7.1.1", + "shiki": "^2.1.0", + "vite": "^5.4.14", + "vue": "^3.5.13" + }, + "bin": { + "vitepress": "bin/vitepress.js" + }, + "peerDependencies": { + "markdown-it-mathjax3": "^4", + "postcss": "^8" + }, + "peerDependenciesMeta": { + "markdown-it-mathjax3": { + "optional": true + }, + "postcss": { + "optional": true + } + } + }, + "node_modules/vitepress-plugin-tabs": { + "version": "0.5.0", + "resolved": "https://registry.npmjs.org/vitepress-plugin-tabs/-/vitepress-plugin-tabs-0.5.0.tgz", + "integrity": "sha512-SIhFWwGsUkTByfc2b279ray/E0Jt8vDTsM1LiHxmCOBAEMmvzIBZSuYYT1DpdDTiS3SuJieBheJkYnwCq/yD9A==", + "dev": true, + "license": "MIT", + "peerDependencies": { + "vitepress": "^1.0.0-rc.27", + "vue": "^3.3.8" + } + }, + "node_modules/vue": { + "version": "3.5.13", + "resolved": "https://registry.npmjs.org/vue/-/vue-3.5.13.tgz", + "integrity": "sha512-wmeiSMxkZCSc+PM2w2VRsOYAZC8GdipNFRTsLSfodVqI9mbejKeXEGr8SckuLnrQPGe3oJN5c3K0vpoU9q/wCQ==", + "license": "MIT", + "peer": true, + "dependencies": { + "@vue/compiler-dom": "3.5.13", + "@vue/compiler-sfc": "3.5.13", + "@vue/runtime-dom": "3.5.13", + "@vue/server-renderer": "3.5.13", + "@vue/shared": "3.5.13" + }, + "peerDependencies": { + "typescript": "*" + }, + "peerDependenciesMeta": { + "typescript": { + "optional": true + } + } + }, + "node_modules/zwitch": { + "version": "2.0.4", + "resolved": "https://registry.npmjs.org/zwitch/-/zwitch-2.0.4.tgz", + "integrity": "sha512-bXE4cR/kVZhKZX/RjPEflHaKVhUVl85noU3v6b8apfQEc1x4A+zBxjZ4lN8LqGd6WZ3dl98pY4o717VFmoPp+A==", + "dev": true, + "license": "MIT", + "peer": true, + "funding": { + "type": "github", + "url": "https://github.com/sponsors/wooorm" + } + } + } +} diff --git a/package.json b/package.json new file mode 100644 index 00000000..2be1f68a --- /dev/null +++ b/package.json @@ -0,0 +1,16 @@ +{ + "scripts": { + "docs:dev": "vitepress dev docs", + "docs:build": "vitepress build docs", + "docs:preview": "vitepress preview docs" + }, + "devDependencies": { + "vitepress-plugin-tabs": "^0.5.0" + }, + "dependencies": { + "lucide-static": "^0.487.0", + "lucide-vue-next": "^0.487.0", + "medium-zoom": "^1.1.0", + "papaparse": "^5.5.2" + } +} diff --git a/requirements.txt b/requirements.txt deleted file mode 100644 index 27ae890e..00000000 --- a/requirements.txt +++ /dev/null @@ -1,6 +0,0 @@ -myst_parser -sphinx_rtd_theme -sphinx-tabs -sphinx-copybutton -sphinxcontrib-jquery -sphinxcontrib-googleanalytics \ No newline at end of file diff --git a/source/_static/logo_round.ico b/source/_static/logo_round.ico deleted file mode 100644 index 58f80b12..00000000 Binary files a/source/_static/logo_round.ico and /dev/null differ diff --git a/source/_static/rounded_social_preview.png b/source/_static/rounded_social_preview.png deleted file mode 100644 index 13f99864..00000000 Binary files a/source/_static/rounded_social_preview.png and /dev/null differ diff --git a/source/assets/flawed_designs.png b/source/assets/flawed_designs.png deleted file mode 100644 index 06b94a31..00000000 Binary files a/source/assets/flawed_designs.png and /dev/null differ diff --git a/source/assets/gh_roadmap.png b/source/assets/gh_roadmap.png deleted file mode 100644 index 28d4c8d5..00000000 Binary files a/source/assets/gh_roadmap.png and /dev/null differ diff --git a/source/assets/installed_tools/nightly.csv b/source/assets/installed_tools/nightly.csv deleted file mode 100644 index dc82faca..00000000 --- a/source/assets/installed_tools/nightly.csv +++ /dev/null @@ -1,3 +0,0 @@ -Image tag,Version,Arch,Build date,Tools list -nightly,9590653c,amd64,2025-06-02T11:31:01Z,:download:`nightly_9590653c_amd64.csv ` -nightly,9590653c,arm64,2025-06-02T10:32:04Z,:download:`nightly_9590653c_arm64.csv ` diff --git a/source/assets/logo_round.png b/source/assets/logo_round.png deleted file mode 100644 index e69a7499..00000000 Binary files a/source/assets/logo_round.png and /dev/null differ diff --git a/source/assets/rounded_social_preview_with_border.png b/source/assets/rounded_social_preview_with_border.png deleted file mode 100644 index 48d11fa7..00000000 Binary files a/source/assets/rounded_social_preview_with_border.png and /dev/null differ diff --git a/source/community/contributors.rst b/source/community/contributors.rst deleted file mode 100644 index 10c6cc4d..00000000 --- a/source/community/contributors.rst +++ /dev/null @@ -1,577 +0,0 @@ -============ -Contributors -============ - -This part of the documentation is meant for Exegol contributors, those who write code and open pull requests. If adds up to the :doc:`users ` documentation. - -First things first, once you know on what module you want to contribute (`wrapper `_, `images `_, `documentation `_, `resources `_, etc.) `fork it `_, `checkout `_ to the ``dev`` branch, then come back to this page to start coding. - -.. contents:: - :local: - -Documentation -============== - -A new feature, whether it's on the wrapper, images, or any other module, must be documented accordingly. Make sure to open a pull request to the appropriate `Exegol docs `_ branch on top of your wrapper/images/whatever pull request. - -.. list-table:: Exegol-docs branches - :header-rows: 1 - - * - Branch - - Purpose - * - main - - nothing gets pushed there. This branch is made to merge with the other branches. - * - dev-wrapper - - Related to the wrapper (`Exegol `_ ) - * - dev-images - - Related to the images (`Exegol-images `_ ) - * - dev - - General purpose - -Before pushing a pull request on the documentation repository, it is advised to try and compile locally to make sure there are no errors and everything renders as expected. First, the requirements listed in ``requirements.txt`` must be installed (e.g. ``pip install --user -r ./requirements.txt``). Then, the one-liner below can be used to remove any previous build, compile again and open the build in a browser. - -.. code-block:: bash - - rm -r build; make html; open "build/html/community/contributors.html" - -**Nota bene**: in the example above, the ``open`` command opens an Internet browser (it's a macOS command), but it can be replaced by anything else that fits the contributor's environement (e.g. ``firefox``). - -Images -====== - -The Docker images are the heart of the Exegol project. A neat choice of tools, configurations, aliases, history commands, and various customizations are prepared in multiple images adapted for multiple uses: web hacking, Active Directory, OSINT (Open Source INTelligence), etc. - -If you want to contribute to this part of the project, there are some things you need to know and some rules you need to follow. - -.. _adding_a_tool: - -Adding a new tool -~~~~~~~~~~~~~~~~~ - -In order to add a new tool to an image, here is how it goes. First, you need to figure out in what package your tool installation function must go to: `packages `_. - -Function structure ------------------- - -When preparing the install function to the package, don't forget to include the following functions: - -* ``colorecho "Installing yourtool"``: this is needed to raise logs inside the CI/CD pipeline - -* ``catch_and_retry ``: this one is optional. When a command uses the Internet and could potentially fail randomly, the ``catch_and_retry`` wrapper is here to retry that commands multiple times with increasing time intervals in order to avoid having a whole build fail because of one temporary network error. Nota bene: most standard Internet-involved commands are transparently put behind a ``catch_and_retry`` (e.g. ``git``, ``wget``, ``curl``, ``go``, etc.). - -* ``add-aliases yourtool``: if your tool needs to have one or multiple aliases to work properly. You will need to create the aliases file in ``/sources/assets/shells/aliases.d/`` named after your tool. This file must contain the alias(es) to set as follows. - - .. code-block:: bash - - alias tool.py='python3 /opt/tools/yourtool/tool.py' - -* ``add-history yourtool``: if it's relevant to give some command example of your tool. No need to populate the history with a command that's very short or never used. Using long arguments is preferred. Using environment variables is preferred (e.g. ``$USER``, ``$PASSWORD``, ``$TARGET``, etc.). You will need to create the history file in ``/sources/assets/shells/history.d/`` named after your tool. This file must contain the history command(s) like the example below. - - .. code-block:: bash - - yourtool.py --user "$USER" --password "$PASSWORD" --target "$TARGET" - yourtool.py --mode enum --user "$USER" --target "$TARGET" - yourtool.py --mode unauthenticated - -* ``add-test-command "testcommand"``: this is needed by the CI/CD pipeline to conduct unit tests for all tools to make sure they are installed properly before publishing new images. The test command needs to return ``0`` if the tool works properly, anything else if it doesn't. For instance, something like ``yourtool.py --help`` usually works, but not always! In order to find what command can be used for unit tests, you can do something like ``yourtool.py --help; echo $?`` to see what code is returned after the command is executed. Once trick that can be used when the ``--help`` command returns something ``!=0`` is to do some grep like ``yourtool.py --help|& grep 'Usage:'``. - -* ``add-to-list "yourtool,https://link.to/the/tool,description"``: this is used by the CI/CD pipeline to automatically export tools in the :doc:`Tools list `. The format of the entry is standard 3-columns CSV (comma separated values). The first column is the tool name, then the link to the tool, then the description. Be careful to not have more than 2 commas and replace any comma in the description by something else. - -In case your tool doesn't need aliases or history commands, add the following comment at the beggining of the tool install function: ``# CODE-CHECK-WHITELIST=``. Then add a comma-separated list of the exclusions. Below are some examples. - -.. code-block:: bash - - # CODE-CHECK-WHITELIST=add-aliases - # CODE-CHECK-WHITELIST=add-aliases,add-history - -**TL;DR**, your tool installation function should look something like this: - -.. code-block:: bash - - function install_yourtool() { - colorecho "Installing yourtool" - # tool install commands [...] - add-aliases yourtool - add-history yourtool - add-test-command "yourtool.py --help" - add-to-list "yourtool,https://link.to/the/tool,description" - } - -Install standards ------------------ - -When installing a tool, depending on how it gets installed, here are the rules. - -* Most tools have their virtual environment, in order to avoid dependencies conflicts. Python virtual environments must have access to the system site-packages, to avoid redundancy on already install common dependencies. -* Most tools are installed either in their own directory in ``/opt/tools/`` or have the binary (or a symlink) in ``/opt/tools/bin/``. -* Disk space being limited, we're not pulling every code source around. When possible, add the ``--depth 1`` option to your usual ``git clone`` command. - -To manage tool versions, we use ``asdf`` (`asdf-vm/asdf `_), a version management tool that allows the installation and management of multiple versions of various programming languages and tools across different projects. ``asdf`` uses a system of shims to ensure that the correct version of a tool is used based on your project's configuration. Currently, on Exegol, asdf only manages the ``Go`` programming language (``golang``). - - -.. tabs:: - - .. tab:: Python sources (pipx) - - The easiest way to install a Python tool is to use pipx. - - .. code-block:: bash - - # from github.com example - python3 -m pipx install git+https://github.com/AUTHOR/REPO - - # from local sources - git -C /opt/tools/ clone --depth 1 https://github.com/AUTHOR/REPO - python3 -m pipx install --system-site-packages /opt/tools/yourtool/ - - But some tools cannot be installed this way, either because they're missing the ``setup.py`` or for any other obscure reason. In that case, opt for the "Python (venv)" solution. - - .. tab:: Python sources (venv) - - In this example, the tool sources are downloaded, a virtual python environment is set up, requirements are installed, and an alias is created. - - **Nota bene 1**: when the requirements are installed, it's better to have the command put behind a ``catch_and_retry`` so that if their is a temporary network outage during the build, the command will be tried multiple times with increased delays to avoid having the whole build fail. - - **Nota bene 2**: there is no need to put standard ``git``, ``wget``, ``curl``, ``go``, and similar commands behind a ``catch_and_retry`` as its already handled transparently. - - .. code-block:: bash - - git -C /opt/tools/ clone --depth 1 https://github.com/AUTHOR/REPO - cd /opt/tools/yourtool || exit - python3 -m venv --system-site-packages ./venv/ - source ./venv/bin/activate - pip3 install -r requirements.txt - deactivate - add-aliases yourtool - - And add the following alias to your new alias file in ``/sources/assets/shells/aliases.d/`` - - .. code-block:: bash - - alias yourtool='/opt/tools/yourtool/venv/bin/python3 /opt/tools/yourtool/yourtool.py' - - .. tab:: APT install - - APT installations are regrouped to go faster and save some bandwith. In the ``package_whatever.sh`` file you're editing, look for a function called ``install_*_apt_tools()``. - The package you want to install needs to be added there, along with the ``add-history``, ``add-test-command`` and ``add-to-list`` instructions. - - .. tab:: Go - If you choose to install a new golang tool in your container using the ``go install -v github.com/AUTHOR/REPO@latest`` command, you will need to follow it up with the ``asdf reshim golang`` command. This additional step is necessary for asdf to recognize and integrate the newly installed tool into the environment. - - .. code-block:: bash - - go install -v github.com/patrickhener/goshs@latest - asdf reshim golang - goshs --help - - - .. tab:: Ruby - - A typical Ruby tool install will look like this: - - .. code-block:: bash - - function install_yourtool() { - colorecho "Installing yourtool" - rvm use 3.0.0@yourtool --create - gem install yourtool - rvm use 3.0.0@default - add-aliases yourtool - add-history yourtool - add-test-command "yourtool --help" - add-to-list "yourtool,https://github.com/AUTHOR/REPO,description" - } - - And the alias file will look something like this. - - .. code-block:: bash - - alias yourtool='/usr/local/rvm/gems/ruby-3.0.0@yourtool/wrappers/ruby /usr/local/rvm/gems/ruby-3.0.0@yourtool/bin/yourtool' - - .. tab:: Compile sources - - When installing a binary tool (pre-compiled or compiled live), it needs to be moved or linked in ``/opt/tools/bin``. - Below is an example of tool compilation and installation. - - .. code-block:: bash - - function install_yourtool() { - colorecho "Installing yourtool" - git -C /opt/tools/ clone --depth 1 https://github.com/AUTHOR/REPO - cd /opt/tools/yourtool - ./configure - make - ln -s "/opt/tools/yourtool/bin/yourtool" "/opt/tools/bin/yourtool" - add-history yourtool - add-test-command "yourtool --help" - add-to-list "yourtool,https://github.com/AUTHOR/REPO,description" - } - - .. tab:: Download compiled binary - - It's not uncommon to have tools already compiled, sometimes available in the "releases" section of a GitHub repository. - In the following example, the latest .tar.xz release archive is dynamically fecthed from the repo, by grepping the right strings to match the name of the file and extracted. And then a symbolic link is created. - The extact context can differ for each and every tool, but the example function below can serve as codebase. Trying to find similar examples in the code could also help a contributor find similar contexts and how they got implemented. - - .. code-block:: bash - - function install_yourtool() { - colorecho "Installing yourtool" - local URL - URL=$(curl --location --silent "https://api.github.com/repos/AUTHOR/REPO/releases/latest" | grep 'browser_download_url.*somestring.*tar.xz"' | grep -o 'https://[^"]*') - curl --location -o /tmp/tool.tar.xz "$URL" - tar -xf /tmp/yourtool.tar.xz --directory /tmp - rm /tmp/yourtool.tar.xz - mv /tmp/yourtool* /opt/tools/yourtool - ln -s "/opt/tools/yourtool/bin/yourtool" "/opt/tools/bin/yourtool" - add-history yourtool - add-test-command "yourtool --help" - add-to-list "yourtool,https://github.com/AUTHOR/REPO,description" - } - -Other standards ---------------- - -If your tool opens ports, or if there are credentials at play, please take a look at the corresponding documentations - -* :doc:`Credentials ` -* :doc:`Ports & services ` - -Multi-architecture builds -------------------------- - -Know that Exegol images are built by, and for, AMD64 and ARM64 systems. Most systems are AMD64 (x86_64), but some other people use ARM64 (M1/M2 Apple Sillicon chips, 64bits Raspberry-Pies, ...). -Whenever possible, try to make sure your tool install function works for both architectures. -Rest assured, if you don't have both architectures at your disposal it's perfectly fine, we'll take care of this part for you. -If you do, and if your tool installation function includes some commands that differ wether they run on an ARM64 or AMD64 host, you can use the following structure. - -.. code-block:: bash - - if [[ $(uname -m) = 'x86_64' ]] - then - # command for AMD64 - elif [[ $(uname -m) = 'aarch64' ]] - then - # command for ARM64 - else - criticalecho-noexit "This installation function doesn't support architecture $(uname -m)" && return - fi - -Calling the install function ----------------------------- - -Once the install function is over with, it needs to be called in the function that holds the same name as the package. -For instance, if you're adding your tool install function in the ``package_web.sh`` package, you'll need to call that function in the ``package_ad()`` function (usually at the bottom of that file). - -It will look something like this. - -.. code-block:: bash - - function package_web() { - [...] - install_yourtool - [...] - } - -Submitting the pull request ---------------------------- - -.. hint:: - - Once all your changes are over, and before submitting a pull request, it is advised to test your installation process locally. - The Exegol wrapper can be used to build local images. Run ``exegol install --help`` to see some examples. - You can also run the unit tests yourself by creating - - .. code-block:: bash - - # build the local image - exegol install "testimage" "full" --build-log "/tmp/testimage.log" - - # create and start a container for the tests - exegol start "testcontainer" "testimage" - - # run the tests (from the container) - cat /.exegol/build_pipeline_tests/all_commands.txt | grep -vE "^\s*$" | sort -u > /.exegol/build_pipeline_tests/all_commands.sorted.txt - python3 /.exegol/build_pipeline_tests/run_tests.py - cat /.exegol/build_pipeline_tests/failed_commands.log - -.. warning:: - - Your pull request needs to be made against the ``dev`` branch. - -Once you submit your pull request, and once the various changes that may be requested are made, a CI/CD pipeline will run to make sure your code is compliant and that the tool is installed and works as intended. -The pipeline may raise some issues, but if they're not related to your tool (e.g. network issues are common) don't worry about it. If the errors are due to your tool install, then you'll need to make the necessary changes to make your install work. - -Once everything works, the pull request will be merged, the pipeline will run again in order to test, build and publish a new ``nightly`` image. Congrats, you're now an Exegol contributor! - -Temporary fixing a tool (a.k.a. tempfix) -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -Tools sometimes have their own issues along their development. A temporary fix can be added as follows, in order to let builds pass successfully, while the respective tool is not fixed. The fix depends on the way the tool is supposed to be installed. - -.. tabs:: - - .. tab:: Git (checkout) - - Applying the temporary fix for a tool installed through git goes as follows when checking out a previous commit - - #. Find the commit id that made the tool install fail. This can be found in a try & repeat manner by installing the tool in an exegol container, checking out on a commit ID, try installing again, and repeat until it works. - #. Comment out the inital ``git clone`` command. - #. Add the temporary fix (``git clone`` and ``git checkout``) in a if statement that makes sure the fix won't stay there forever. The error message will be raised and noticed in the pipeline. - #. (bonus) create an issue on the repo (if it doesn't exist already) with the appropriate logs to help the tool's maintainers notice the installation error and fix it. - - .. code-block:: bash - - function install_TOOL() { - [...] - # git -C /opt/tools/ clone --depth 1 https://github.com/REPO/TOOL.git - local temp_fix_limit="YYYY-MM-DD" - if [ "$(date +%Y%m%d)" -gt "$(date -d $temp_fix_limit +%Y%m%d)" ]; then - criticalecho "Temp fix expired. Exiting." - else - git -C /opt/tools/ clone https://github.com/REPO/TOOL.git - git -C /opt/tools/TOOL checkout 774f1c33efaaccf633ede6e704800345eb313878 - fi - [...] - } - - .. tab:: Git (merge PRs) - - When merging PRs on the fly, the temp fix goes like this - - #. Find the PRs the need to be merged. **Warning: only PRs from trusted authors must be hot-merged in this manner**. - #. List the PR numbers in the ``PRS`` array - #. Merge. In the example below the ``--strategy-option theirs`` strategy is chosen, but it can be changed if needed. - - .. code-block:: bash - - function install_TOOL() { - [...] - git -C /opt/tools/ clone --depth 1 https://github.com/REPO/TOOL.git - local temp_fix_limit="YYYY-MM-DD" - if [ "$(date +%Y%m%d)" -gt "$(date -d $temp_fix_limit +%Y%m%d)" ]; then - criticalecho "Temp fix expired. Exiting." - else - git config --local user.email "local" - git config --local user.name "local" - local PRS=("111" "222" "333") - for PR in "${PRS[@]}"; do git fetch origin "pull/$PR/head:pull/$PR" && git merge --strategy-option theirs --no-edit "pull/$PR"; done - fi - [...] - } - -Adding to my-resources -~~~~~~~~~~~~~~~~~~~~~~ - -.. hint:: - - This documentation is not written yet... Please contact us if you would like to contribute to this part and don't know how. - -Wrapper -======= - -.. hint:: - - This documentation is not written yet... Please contact us if you would like to contribute to this part and don't know how. - - -Signing commits -=============== - -To make the project as secure as possible, signed commits are now required to contribute to the project. -Using signatures for commits on GitHub serves several important purposes : - -* **Authentication**: it verifies the authenticity of the commit, ensuring that it was indeed made by the person claiming to have made it. -* **Integrity**: it ensures that the commit hasn't been tampered with since it was signed. Any changes to the commit after it has been signed will invalidate the signature. -* **Trust**: this ensures that all contributions come from trusted sources. -* **Visibility**: on GitHub, signed commits are marked with a "verified" label, giving users and collaborators confidence in the commit's origin and integrity. - -GitHub offers `an official documentation `_ on the matter that can be followed to setup and sign commits properly. Exegol's documentation will sum it up briefly and link to it whenever it's needed. - -While **SSH (+ FIDO2)** is preferred since it offers better multi-factor signing capabilities (knowledge + hardware possession factors), people that don't have the required hardware can proceed with GPG or SSH. - -.. tabs:: - - .. tab:: GPG - - Generating a GPG key can be done by following GitHub's official documentation on the matter (`generating a new GPG key `_). - TL;DR, the commands look something like this: - - .. code-block:: bash - - # for the email, indicate your public email (ID+Name@users.noreply.github.com) from https://github.com/settings/emails - gpg --quick-generate-key "YOUR_NAME " ed25519 sign 0 - gpg --list-secret-keys --keyid-format=long - gpg --armor --export $KEYID - - Once the GPG key is generated, it can be added to the contributor's GitHub profile. Again, GitHub's documentation explains how to achieve that (`adding a GPG key to your GitHub account `_). - - Once the GPG key is generated and associated to the GitHub account, it can be used to sign commits. In order to achieve that, the contributor must configure ``git`` properly on his machine (`telling git about your GPG key `_). - - TL;DR: the commands look something like this to set it up for ``git`` CLI: - - .. code-block:: bash - - gpg --list-secret-keys --keyid-format=long - git config --global user.signingkey $KEYID - - # (option 1) configure locally on a specific repo - cd /path/to/repository && git config commit.gpgsign true - - # (option 2) configure for all git operations - git config --global commit.gpgsign true - - To set it up on IDEs, proper official documentations can be followed (e.g. `GitKraken `_, `PyCharm `_). - - .. tab:: SSH - - Generating an SSH key can be done by following GitHub's official documentation on the matter (`generating a new SSH key `_). - TL;DR, the commands look something like this: - - .. code-block:: bash - - # for the email, indicate your public email (ID+Name@users.noreply.github.com) from https://github.com/settings/emails - ssh-keygen -t ed25519 -C "YOUR_NAME " - - Once the SSH key is generated, the public part can be added to the contributor's GitHub profile. Again, GitHub's documentation explains how to achieve that (`adding a new SSH key to your GitHub account `_). - - Once the SSH key is generated and associated to the GitHub account, it can be used to authenticate and sign commits. In order to achieve that, the contributor must configure ``ssh`` and ``git`` properly on his machine (`telling git about your SSH key `_). - - TL;DR: the commands look something like this: - - .. hint:: - - The ``git`` client version must be 2.34 or later. - - .. code-block:: bash - - # if setting up for the first time, configure git - git config --global user.name "YOUR_NAME" - # for the email, indicate your public email (ID+Name@users.noreply.github.com) from https://github.com/settings/emails - git config --global user.email "ID+Name@users.noreply.github.com" - - git config --global gpg.format ssh - # replace the public key path if needed, below is an example - git config --global user.signingkey "$HOME/.ssh/id_ed25519.pub" - - # configure git to sign commits and tags by default - git config --global commit.gpgsign true - git config --global tag.gpgsign true - - # verify commits locally, associate SSH public keys with users - mkdir -p ~/.config/git - echo "$(git config --get user.email) $(cat ~/.ssh/id_ed25519.pub)" | tee ~/.config/git/allowed_signers - git config --global gpg.ssh.allowedSignersFile "$HOME/.config/git/allowed_signers" - - The SSH connection can then be tested as follows (`testing your SSH connection `_). - - .. code-block:: bash - - # load the SSH agent into the current shell - eval "$(ssh-agent -s)" - - # test the SSH authentication to GitHub servers - ssh -T git@github.com - - .. tab:: SSH (+ FIDO2) - - This part of the doc explains how to setup and use FIDO2 security keys, such as YubiKeys, Google's Titan, etc. - - First of all, a new FIDO2 key can be configured as follows to set up a PIN. - - .. code-block:: bash - - # list FIDO2 devices - fido2-token -L - - # set a PIN for the device - fido2-token -S $device - - Then, a `resident key `_ can be created and stored on the YubiKey as follows (see `Yubico's documentation `_). - - .. hint:: - - Some FIDO2 keys (e.g. recent YubiKeys, and probably others) support **resident keys**. A resident key is stored on the hardware key itself and easier to import to a new computer because it can be loaded directly from the security key. - In order to use that feature, the ``-O resident`` option can be added to the ``ssh-keygen`` command chosen below. - - .. code-block:: bash - - # (default) touch only - ssh-keygen -t ed25519-sk - - # PIN + touch - ssh-keygen -t ed25519-sk -O verify-required - - # nothing (could be unsupported by some OpenSSH clients) - ssh-keygen -t ed25519-sk -O no-touch-required - - # PIN (could be unsupported by some OpenSSH clients) - ssh-keygen -t ed25519-sk -O verify-required -O no-touch-required - - Once the SSH key is generated, the public part can be added to the contributor's GitHub profile. GitHub's documentation explains how to achieve that (`adding a new SSH key to your GitHub account `_). - - Once a key is created and added on GitHub, it can be added to the contributor's machine SSH environment as follows. This is as easy as copy-pasting the public and private key parts to ``~/.ssh``. - - .. hint:: - - If you opted for a **resident key** setup, the SSH key can be loaded from the hardware key itself. - - Note that those steps shouldn't be needed when the key has just been created, as the keys should automatically be added to ``~/.ssh``. The commands below are mostly relevant when using **existing** resident keys on **a new system**. - - .. code-block:: bash - - # temporary - # needs to be done again after a reboot - ssh-add -K - - # permanent - # will download the private and public resident security keys in the current directory - # private key is to be moved in ~/.ssh (physical FIDO2 key will always be needed) - ssh-keygen -K - # it's on purpose, the "_rk" part is removed, otherwise it doesn't work. - mv id_ed25519_sk_rk ~/.ssh/id_ed25519_sk - mv id_ed25519_sk_rk.pub ~/.ssh/id_ed25519_sk.pub - - .. warning:: - - While the ``ssh-keygen -K`` command saves names files ``id_ed25519_sk_rk[.pub]``, it's on purpose the ``_rk`` part is then removed on the host. Otherwise, SSH fails at handling the keys. The files must be named ``id_ed25519_sk[.pub]`` on the system. - - Once the SSH environment is ready, ``git`` CLI can be configured to rely on the security key for signing commits and authenticating (`telling git about your SSH key `_). - - .. hint:: - - The ``git`` client version must be 2.34 or later. - - .. code-block:: bash - - # if setting up for the first time, configure git - git config --global user.name "YOUR_NAME" - # for the email, indicate your public email (ID+Name@users.noreply.github.com) from https://github.com/settings/emails - git config --global user.email "ID+Name@users.noreply.github.com" - - git config --global gpg.format ssh - # replace the public key path if needed, below is an example - git config --global user.signingkey "$HOME/.ssh/id_ed25519_sk.pub" - - # configure git to sign commits and tags by default - git config --global commit.gpgsign true - git config --global tag.gpgsign true - - # verify commits locally, associate SSH public keys with users - mkdir -p ~/.config/git - echo "$(git config --get user.email) $(cat ~/.ssh/id_ed25519_sk.pub)" | tee ~/.config/git/allowed_signers - git config --global gpg.ssh.allowedSignersFile "$HOME/.config/git/allowed_signers" - - The SSH connection can then be tested as follows (`testing your SSH connection `_). - - .. code-block:: bash - - # load the SSH agent into the current shell - eval "$(ssh-agent -s)" - - # test the SSH authentication to GitHub servers - ssh -T git@github.com - -.. hint:: - - The contributor's GitHub account can be configured to mark unsigned commits as unverified or partially verified. While it's not mandatory regarding contributions to Exegol since the requirement is managed on Exegol repositories directly, it's a nice thing to do. See GitHub's documentation on `Vigilante mode `_. diff --git a/source/community/maintainers.rst b/source/community/maintainers.rst deleted file mode 100644 index df340cfc..00000000 --- a/source/community/maintainers.rst +++ /dev/null @@ -1,461 +0,0 @@ -=========== -Maintainers -=========== - -This part of the documentation is meant for Exegol maintainers. It adds up to the :doc:`contributors ` documentation. - -.. contents:: - :local: - -Wrapper release -=============== - -.. hint:: - The wrapper documentation must be aligned with the wrapper features. . The docs PR can be merged once the wrapper is released. - -Preparation ------------ - -The first step is to update the project and sub-modules, meaning pointing the exegol-images and exegol-resources sub-modules to the latest master version. -Even if the wrapper is able to auto-update itself, it is always better to keep the base reference at least up to date. - -.. tabs:: - - .. tab:: With git - - * Update current wrapper repo: - - .. code-block:: bash - - git pull - - * Update git submodules and checkout to **main** branch for release: - - .. code-block:: bash - - git -C exegol-docker-build checkout main - git -C exegol-docker-build pull - git -C exegol-resources checkout main - git -C exegol-resources pull - - .. tab:: With Exegol - - Update to the latest version of the **main** branches (checkout if needed, **except for the wrapper** which remains in branch dev) - - .. code-block:: bash - - exegol update -v - -.. important:: - Don't forget to **reload and commit** any **submodule update** at this step ! - - -Local tests & build -~~~~~~~~~~~~~~~~~~~ - -First, test the code with mypy: - -.. code-block:: bash - - mypy exegol.py --ignore-missing-imports --check-untyped-defs - -You can execute this one-liner to check the project and build it. - -.. warning:: - **Require** `build `__ package installed! - -.. hint:: - Exegol can only be published through a **source** build distribution because of the source code files for building local images. - -.. code-block:: bash - - python3 setup.py clean test && \ - (rm -rf Exegol.egg-info && python3 -m build --sdist) || \ - echo "Some tests failed, check your code and requirements before publishing!" - -Config reviews -~~~~~~~~~~~~~~ - -* Review exegol.config.ConstantConfig variables - - * Change version number ! (remove the alpha or beta tag at the end of the version number) -* Review exegol.utils.imgsync.spawn.sh version - - * Must contain a line with the script current version in the following format: ``# Spawn Version:2`` (without alpha or beta letter) -* Review documentation on Exegol-docs/dev-wrapper -* Review README.md - -* Create PR (or put it out of draft mode) - -.. important:: - The Pull-Request must be **already** created and **NOT** be in draft state before pushing the latest stable version. - -* Commit and push stable latest config - -Review and publish ------------------- - -The PR is now ready to be peer-review and then merge on Github. - -Once merged to master, a tag must be deploy to run the release pipeline. The github action pipeline will automatically build and publish: - -Exemple to release version ``4.3.5``: - -.. code-block:: bash - - git checkout master - git pull - git tag -s 4.3.5 -m '4.3.5' - git push --tags - -Check if the release pipeline works as expected: `Release pipeline `_ - -Post deploy ------------ - -* Create new github **release** with **new** version tag - -After releasing a new stable version on the wrapper, we must update the dev version to stay in a beta version - -* Fast-forward dev branch to the latest master commit: - -.. code-block:: bash - - git checkout dev - git merge master --ff-only - git push - -* Change the wrapper version on the dev branch to ``x.y.zb1`` - -* Upgrade tests.test_exegol.py version number to the next version build to avoid future mistake -* Commit updates - -Images release -============== - -.. hint:: - The images documentation must be aligned with the images features. Make sure to add code to the appropriate `Exegol docs `_ branch and have a pull request ready. The docs PR can be merged once the images are released. - -Prepare changes ---------------- - -The first step consists in preparing the ``dev`` branch for merge. - -1. create a pull request ``dev -> main`` named ``Release X.Y.Z`` (``Release X.Y.ZbI`` is also accepted, X, Y, Z and I being numbers. Creating this pull request will trigger the **pre-release** workflows. The PR comment must indicate all major changes. - -2. edit the ``dev`` branch until the pull requests checks (pipeline) all pass, effectively publishing all images to the preproduction Dockerhub registry - -3. once all checks are good, the PR needs to be approved by a maintainer. - -Merge changes -------------- - -Once the PR is approved and ready for merge, it can be merged - -1. merge the PR with **Create a merge commit** - -2. Synchronize the ``dev`` branch with the latest ``main`` update with a **fast-forward merge** - -.. code-block:: bash - - git checkout main - git pull --all - git checkout dev - git pull --all - git merge --ff-only main - git push - -New tag -------- - -The ``X.Y.Z`` (or ``X.Y.ZbI``) tag then needs to be placed on the same commit the ``dev`` and ``main`` branches point to. - -Optionally, the "Annotated Tag Message" can be set to the PR initial comment with the ``--file message.txt`` argument in the ``git tag`` command below. - -.. code-block:: bash - - git tag "X.Y.Z" - git push origin --tags - -Puhing this tag will trigger the **release** workflow. Simply put, the workflow will migrate the images from preprod registry to production registry. - -Maintainers needs to make sure workflow goes as planned and images end up in the prod Dockerhub registry. If the release fails for some reason, the tag can be deleted, changes pushed, and then the tag can be created again to trigger the release again (``git tag -d "X.Y.Z" && git push --delete origin "X.Y.Z"``). - -Publish release ---------------- - -The final step is to create a "release" in github (https://github.com/ThePorgs/Exegol-images/releases/new). - -1. The release must point to the tag created before. - -2. The release must be named ``Exegol images X.Y.Z``. - -3. The release notes can be created with the **Generate releases notes** button. - -4. Set it as **latest release**. - -5. Publish - -CI/CD Pipeline -============== - -The Exegol project relies on a continuous integration and continuous deployment (CI/CD) pipeline for multiple scenarios. At the time of writing, Tue 31 Jan 2023, the pipeline is structured as follows: - -.. tabs:: - - .. tab:: wrapper - - The GitHub Actions platform is used on :doc:`the Exegol module `. Its workflows are used for internal and external pull requests, new releases and testing on every commit. The workflows build, and push Python packages on `the official PyPI registry `_, and run tests to make sure everything works as it should. - - .. tab:: images - - The GitHub Actions platform is used on :doc:`the Exegol-images submodule `. Its workflows run for internal and external pull requests, new commits, new tags, and allow to: - - * build AMD64 and ARM64 images on self-hosted runners - * run tests to make sure the tools are installed properly - * automatically export tools list to the documentation - * push the images on `the official Dockerhub registry `_ - - .. image:: /assets/gh_pipelines.png - :align: center - :alt: Pipelines (GitHub) - - .. tab:: resources - - The GitHub Actions platform is used on :doc:`the Exegol-resources submodule `. Its workflows are used to automatically update the resources (monthly) and automatically export the list of resources to the documentation. - - .. tab:: docs - - The GitHub Actions platform is used for the documentation you're reading. Its workflows are used to build on every commit and pull request to make sure everything works as it should, but also automatically merge changes between the various branches in order to help with development. - - ReadTheDocs then builds the final version on every commit for multiple branches (main, dev, dev-images, dev-wrapper) and hosts it online at https://exegol.readthedocs.io/. - - -GitHub Actions --------------- - -The GitHub Actions pipeline(s) need runners to operate the various jobs configured for each workflow. The Exegol project relies on self-hosted runners instead of the GitHub-hosted runners mainly for costing reasons. - -At the time of writing, Tue 31 Jan 2023, the Exegol-images pipeline(s) require ARM64 and AMD64 runners in order to build, and run corresponding architectured images. - -1. Setting up secrets -~~~~~~~~~~~~~~~~~~~~~ - -There are some operations that the runner will operate that will require authentication, including: -- pushing Python packages on PyPI -- pushing Docker images on Dockerhub - -In order to allow this, GitHub Actions can be set up with secrets that the runner will be able to use later on. This part of the documentation shows what secrets must be set up and how. - -.. tabs:: - - .. tab:: PyPI - - API Tokens can be created in the maintainer account's `PyPI account settings `_, in the **API Tokens** part. The scope must be set to ``Project: Exegol``. The tokens are linked to the personal PyPI account. - - .. tab:: Dockerhub - - Access Tokens can be created in the maintainer account's `Dockerhub security settings `_. Permissions must be set to ``Read, Write, Delete``. The tokens are linked to the personal Dockerhub account. - -Once the token is created, it can be added as follows: - -- For Exegol-images, go to the `Exegol-images repo settings > secrets > actions `_. At the time of writing, 11 Feb. 2023, Dockerhub secrets are named ``DOCKER_USERNAME`` and ``DOCKER_PASSWORD`` in the workflows. - -- For the Python wrapper, go to the `Exegol repo settings > secrets > actions `_. At the time of writing, 11 Feb. 2023, the PyPI token is named ``PYPI_API_TOKEN`` in the workflows. - -2. Deploying a runner -~~~~~~~~~~~~~~~~~~~~~ - -The runner can either run on macOS, Linux, or Windows, as those three operating systems are supporting by the GHA (GitHub Action) platform. x64 and ARM64 are supported for macOS and Windows, and for Linux, ARM is supported as well. - -Below are the hardware requirements for each runner: - -* enough RAM *(to be defined)* -* enough CPU *(to be defined)* -* enough free disk space (at least ~100GB, bare minimum) - -Before deploying a GHA agent on a runner, software requirements must be met: - -- Docker (or Docker Desktop for Windows and macOS) -- jq (lightweight and flexible command-line JSON processor) - -.. tabs:: - - .. tab:: Linux - - For Linux systems, Docker is required in order to have the GitHub Actions agent running. - - .. tip:: - - Docker can be installed quickly and easily with the following command-line: - - .. code-block:: bash - - curl -fsSL "https://get.docker.com/" -o get-docker.sh - sh get-docker.sh - - .. warning:: - - To run exegol from the user environment without ``sudo``, the user must have privileged rights equivalent to root. - To grant yourself these rights, you can use the following command - - .. code-block:: bash - - # add the sudo group to the user - sudo usermod -aG docker $(id -u -n) - - # "reload" the user groups - newgrp - - The ``jq`` utility is also required and can be installed with the following command line: - - .. code-block:: bash - - apt install jq - - Once the requirements are met, the agent can be deployed as follows (with sufficient permissions in the GitHub repository): - - * go to https://github.com/ThePorgs/Exegol-images/settings/actions/runners - * click on "New self-hosted runner" - * select ``Linux`` as operating system, as well as the right architecture and follow the instructions - * when running the ``config.sh`` script, the following settings must be set - - * name of the runner group: Default - * name of the runner: *up to you* - * additional labels: ``builder,tester`` (adapt this if the runner is to be used for only one of those actions). If the runner is an X64/AMD64, the ``AMD64`` tag needs to be set as well. If the runner is ARM64, the right tag will be set automatically. - * name of work folder: *up to you* - - * start the runner with the ``run.sh`` script - * (option) configure the agent as a service if it is to be run unattended/headless with ``sudo ./svc.sh install ``, more info at https://docs.github.com/en/actions/hosting-your-own-runners/configuring-the-self-hosted-runner-application-as-a-service - - - .. note:: - - When configuring the agent as a service, it will be enabled, meaning it will start at boot. The ``systemctl is-enabled`` command should return ``enabled``. - - .. code-block:: bash - - sudo systemctl is-enabled actions.runner.ThePorgs-Exegol-images..service - - In order to start the service, either reboot the runner, or use ``systemctl``. - - .. code-block:: bash - - sudo systemctl start actions.runner.ThePorgs-Exegol-images..service - - .. image:: /assets/maintainers/gha_deployment/step_1.png - :align: center - :alt: Created a new runner - - .. image:: /assets/maintainers/gha_deployment/step_2.png - :align: center - :alt: Configuring the runner (GitHub) - - .. image:: /assets/maintainers/gha_deployment/step_3.png - :align: center - :alt: Configuring the runner (Local) - - - .. note:: - - Screenshots annotated with https://annotely.com/ - .. tab:: macOS - - For macOS, **Docker Desktop** must be installed: https://docs.docker.com/desktop/install/mac-install/. - - * In ``Settings > Resources > Advanced``, the ``virtual disk limit`` must be set to at least 100GB. - * In ``Settings > Resources > Advanced``, allocate enough CPUs, Memory and Swap. - - The **jq** tool can be installed as follows. - - .. code-block:: bash - - # install brew - ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" < /dev/null 2> /dev/null - - # install jq - brew install jq - - **Xcode Command Line Tools** are also required, and they can be installed with the following command line. - - .. code-block:: bash - - xcode-select --install - - Once the requirements are met, the agent can be deployed as follows (with sufficient permissions in the GitHub repository): - - * go to https://github.com/ThePorgs/Exegol-images/settings/actions/runners - * click on "New self-hosted runner" - * select ``macOS`` as operating system, as well as the right architecture and follow the instructions - * when running the ``config.sh`` script, the following settings must be set - - * name of the runner group: Default - * name of the runner: *up to you* - * additional labels: ``builder,tester`` (adapt this if the runner is to be used for only one of those actions). If the runner is an X64/AMD64, the ``AMD64`` tag needs to be set as well. If the runner is ARM64, the right tag will be set automatically. - * name of work folder: *up to you* - - * start the runner with the ``run.sh`` script - * the agent must **not** be configured as a service with ``./svc.sh install``. Some errors have been raised when setting up the pipeline like this. - - .. note:: - - **TODO** : how to make that service run at boot unattended without using svc.sh install? - - - -3. Checking runners status -~~~~~~~~~~~~~~~~~~~~~~~~~~ - -Go to https://github.com/ThePorgs/Exegol-images/settings/actions/runners - -4. Understanding the pipelines -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -**TODO** explain the pipelines, include diagrams. - -4. Common errors -~~~~~~~~~~~~~~~~ - -1. docker login -_______________ - -When configuring a macOS agent as a service with ``./svc.sh install``, the following error was met during workflow run. - -.. code-block:: - - Run docker/login-action@v2 - with: - username: *** - password: *** - ecr: auto - logout: true - Logging into Docker Hub... - Error: Error saving credentials: error storing credentials - err: exit status 1, out: `error storing credentials - err: exit status 1, out: `User interaction is not allowed.`` - -In order to avoid that error, the runner was started interactively with ``./run.sh``. - -2. Disk space -_____________ - -When there's not enough disk space, the following error is usually raised by the pipelines. - -.. code-block:: - - You are running out of disk space. The runner will stop working when the machine runs out of disk space. Free space left: 62 MB - - -Pull Requests -============= - -When handling pull requests, maintainers may need to `synchronize a contributor's fork with latests changes `_. In command-line, this can be achieved as follows. - -.. code-block:: bash - - git clone "git@github.com:USER/FORK" "dest_dir" - cd dest_dir - git remote add upstream "git@github.com:ThePorgs/REPO" - git fetch upstream - git checkout "TARGET_FORK_BRANCH" - git merge --no-edit upstream/"ORIGIN_BRANCH" - # solve conflicts if any - git push \ No newline at end of file diff --git a/source/community/sponsors.rst b/source/community/sponsors.rst deleted file mode 100644 index c90de1dd..00000000 --- a/source/community/sponsors.rst +++ /dev/null @@ -1,12 +0,0 @@ -======== -Sponsors -======== - -.. image:: https://resources.jetbrains.com/storage/products/company/brand/logos/jb_beam.png - :align: center - :width: 200px - :alt: JetBrains logo - -| - -We thank **JetBrains** for supporting this community project through its OpenSource support program. More information at https://jb.gg/OpenSourceSupport ! diff --git a/source/community/users.rst b/source/community/users.rst deleted file mode 100644 index 3eba6dad..00000000 --- a/source/community/users.rst +++ /dev/null @@ -1,43 +0,0 @@ -===== -Users -===== - -This part of the documentation is meant for Exegol users, those who want to understand the project a bit more, open issues, get in touch with the community, etc.. - -.. contents:: - :local: - -Opening issues -============== - -Create an issue in the correct repository: - -* For any problem concerning `Exegol WRAPPER `__ (the exegol command). -* For any problem concerning `Exegol IMAGE `__ (the exegol environment). -* For any problem concerning `Exegol RESOURCE `__ (the exegol offline resources). -* For any problem concerning `Exegol DOCUMENTATION `__ (the exegol documentation). - -Roadmap -======= - -The roadmap is available on GitHub: https://github.com/orgs/ThePorgs/projects/1/views/1 - -.. image:: /assets/gh_roadmap.png - :align: center - :alt: Roadmap (GitHub) - -.. raw:: html - -
- -Discord -======= - -An Exegol discord has been created to facilitate exchanges between the community, open tickets, share ideas, vote on future features to prioritize etc.. - -.. raw:: html - -
- -

-
diff --git a/source/conf.py b/source/conf.py deleted file mode 100644 index a5c53b59..00000000 --- a/source/conf.py +++ /dev/null @@ -1,44 +0,0 @@ -import datetime -# Configuration file for the Sphinx documentation builder. -# -# For the full list of built-in configuration values, see the documentation: -# https://www.sphinx-doc.org/en/master/usage/configuration.html - -# -- Project information ----------------------------------------------------- -# https://www.sphinx-doc.org/en/master/usage/configuration.html#project-information - -project = 'Exegol' -copyright = f'{datetime.datetime.now().year}, Shutdown & Dramelac' -author = 'Shutdown & Dramelac' -# release = '4.1.0' # Disable version for doc - -# -- General configuration --------------------------------------------------- -# https://www.sphinx-doc.org/en/master/usage/configuration.html#general-configuration - -extensions = ['myst_parser', - 'sphinx_tabs.tabs', - 'sphinx_copybutton', - "sphinxcontrib.jquery", - 'sphinxcontrib.googleanalytics'] - -templates_path = ['_templates'] -exclude_patterns = [] - - - -# -- Options for HTML output ------------------------------------------------- -# https://www.sphinx-doc.org/en/master/usage/configuration.html#options-for-html-output - -html_theme = 'sphinx_rtd_theme' -html_static_path = ['_static'] - -html_favicon = '_static/logo_round.ico' - -# Tabs options -sphinx_tabs_disable_tab_closing = True - -googleanalytics_id = "G-5TVGLW8S8T" -googleanalytics_enabled = True - -def setup(app): - app.add_css_file("css/custom.css") diff --git a/source/exegol-image/credentials.rst b/source/exegol-image/credentials.rst deleted file mode 100644 index 40550ed2..00000000 --- a/source/exegol-image/credentials.rst +++ /dev/null @@ -1,14 +0,0 @@ -Credentials -=========== - -Some tools are pre-configured with the following credentials - -==================== ============= =============== - Element User Password -==================== ============= =============== - neo4j database neo4j exegol4thewin - bettercap ui bettercap exegol4thewin - trilium trilium exegol4thewin - empire empireadmin exegol4thewin - wso-webshell (PHP) exegol4thewin -==================== ============= =============== diff --git a/source/exegol-image/my-resources.rst b/source/exegol-image/my-resources.rst deleted file mode 100644 index 968de302..00000000 --- a/source/exegol-image/my-resources.rst +++ /dev/null @@ -1,338 +0,0 @@ -============ -My resources -============ - -"My-resources" brings great features allowing users to make Exegol their own and customize it even further. This feature relies on a simple volume shared between the host and all exegol containers, and an advanced integration in the Exegol images directly. - -.. warning:: - The "my-resources" feature will do what it's told to do. If users choose to use that feature to replace files or configuration, those replacements should take place. So if there are some additions to Exegol you're not getting, it could be because you have a "my-resources" setup that replaces it. - -To learn more about the volume options, details are available :ref:`here `. - -Below are the features offered by "My-resources", allowing users to extend Exegol beyond what is initially included (`tools `_, `resources
`_). - -.. - _TODO: add ref to images tools list - -* :ref:`Custom tools `: users can place their own custom standalone tools, binaries and scripts in the "my-resources" volume. This volume is accessible from all containers at ``/opt/my-resources``. -* :ref:`Supported setups `: users can customize their exegol environments automatically and transparently without having to manually setting things up for each and every new Exegol container they create. In this functionality, a pre-set list of supported custom configuration is set, and will improve with time. It's the easier and most user-friendly approach to customizing a few configurations. -* :ref:`User setup `: In this functionality, a shell script can be populated with every command a user wishes its containers to run at their creation. - -.. contents:: - :local: - -.. _Custom-tools: - -Custom tools ------------- -.. seealso:: - Available from version ``3.0.0`` of any exegol image. - -In the container, the ``/opt/my-resources/bin/`` folder (``~/.exegol/my-resources/bin/`` on the host) is automatically added to the ``PATH`` of the zsh shell. The user can then add tools in that folder in order to use them from the container. - -.. hint:: - - The most simple approach would be to add standalone binaries, but users could also add symbolic links that would point to somewhere else in ``/opt/my-resources/``. - - .. code-block:: bash - - # Example for a standalone binary on your host - cp /path/to/tool ~/.exegol/my-resources/bin/ - # or for a standalone binary on your exegol container - cp /path/to/tool /opt/my-resources/bin/ - - # Example for a symbolic link from your host - git -C ~/.exegol/my-resources/ clone "https://github.com/someauthor/sometool" - ln -s ../sometool/script.py ~/.exegol/my-resources/bin/script.py - # or from your exegol container - git -C /opt/my-resources/ clone "https://github.com/someauthor/sometool" - ln -s /opt/my-resources/sometool/script.py /opt/my-resources/bin/script.py - - -.. _Supported-setups: - -Supported setups ----------------- - -Configuration files stored in the ``/opt/my-resources/setup/`` directory will be deployed on the containers and allow users to customize Exegol even further. -By default, the number of officially supported configuration files is limited, and it depends on the version of the image itself, not the wrapper. - -.. hint:: - In order to see what configuration files are supported in your version, the ``/opt/supported_setups.md`` documentation file can be read from any container. - -This documentation will reference in detail all the supported customizations available over time, and the corresponding minimum image version required for each one. - -If a user wants to deploy tools and configurations that are not supported, or more advanced, they can opt for the :ref:`User setup solution `. - -.. _custom_apt: - -:code:`apt` (packages, sources, keys) -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.. seealso:: - Available from version ``3.0.0`` of any exegol image. - -A system exists to easily install arbitrary APT packages in any new exegol container. - -* Custom APT **repositories** can be added in exegol by filling in the ``/opt/my-resources/setup/apt/sources.list`` file -* Importing custom repositories usually requires importing **GPG keys** as well, which can be done by entering trusted GPG keys download URLs in the ``/opt/my-resources/setup/apt/keys.list`` file -* To install **APT packages** automatically (after updating the repository including the custom ones), just enter a list of package names in the ``/opt/my-resources/setup/apt/packages.list`` file - -:code:`bloodhound` (customqueries, config) -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.. seealso:: - Available from version ``3.1.0`` of the ``ad`` and ``full`` images. - -A system exists to easily add one or **several** bloodhound customqueries files, or change its configuration file in any new exegol container. - -To automatically: - -* overwrite the ``~/.config/bloodhound/config.json`` configuration file, simply create the file ``/opt/my-resources/setup/bloodhound/config.json`` -* replace the default exegol customqueries, place one or several valid customqueries files into the folder ``/opt/my-resources/setup/bloodhound/customqueries_replacement/``. -* merge with the default exegol customqueries by placing one or several valid customqueries files into the folder ``/opt/my-resources/setup/bloodhound/customqueries_merge/`` - -.. tip:: - To be considered for replacing or merging, the customqueries files must be **valid** and bear the ``.json`` extension. The file names do not matter. - The output will be saved into the single file ``~/.config/bloodhound/customqueries.json``. - -:code:`firefox` (policy) -~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.. seealso:: - Available from version ``3.1.6`` of any exegol image. - -A system exists to easily personalise firefox in any new exegol container. - -The file ``/usr/lib/firefox-esr/distribution/policies.json`` can be used as a template in order to create your own Firefox policy. Your policy can then be copied to the location ``/opt/my-resources/setup/firefox/policies.json`` to apply it in the next container deployment (https://support.mozilla.org/en-US/kb/customizing-firefox-using-policiesjson), all available directives can be found here: https://mozilla.github.io/policy-templates/. - -.. hint:: - Your custom policy will overwrite the default policy created by Exegol. - -The default policy applied by Exegol will do the following actions: - -`Add a few bookmarks` - -.. code-block:: json - - { - "policies": { - "ManagedBookmarks": [ - { - "toplevel_name": "Exegol Bookmarks" - }, - { - "url": "https://exegol.readthedocs.io/en/latest/", - "name": "Exegol Doc" - }, - { - "name": "References / Guides", - "children": [ - { - "url": "https://www.thehacker.recipes/", - "name": "THR" - }, - [...] - { - "url": "https://lolol.farm/", - "name": "LOLOL Farm" - } - ] - } - ] - } - -`Install a few extensions` - -.. code-block:: json - - { - "policies": { - "ExtensionSettings": { - "foxyproxy@eric.h.jung": { - "installation_mode": "force_installed", - "install_url": "https://addons.mozilla.org/firefox/downloads/latest/foxyproxy-standard/latest.xpi" - }, - [...] - } - } - -`Disable a few Firefox features such as the telemetry` - -.. code-block:: json - - { - "policies": { - "DisableTelemetry": true, - "DisplayBookmarksToolbar": "always", - "UserMessaging": { - "WhatsNew": false, - "ExtensionRecommendations": false, - "FeatureRecommendations": false, - "UrlbarInterventions": false, - "SkipOnboarding": true, - "MoreFromMozilla": false - } - } - -`Apply the CA of Burpsuite` - -.. code-block:: json - - { - "policies": { - "Certificates": { - "Install": ["/opt/tools/firefox/cacert.der"] - } - } - -In order to install a specific addon in your own policy, you can go to the Firefox addon webpage, and search for the addon GUID in the page HTML source code by searching for the JSON field ``"guid":``, for example for the Dark Reader addon, the GUID is ``addon@darkreader.org``, you can then add the extension in your policy file: - -.. code-block:: json - - "ExtensionSettings": { - "addon@darkreader.org": { - "installation_mode": "force_installed", - "install_url": "https://addons.mozilla.org/firefox/downloads/latest/addon@darkreader.org/latest.xpi" - }, - } - -To add a bookmark you can add a children to an existing folder in the ``ManagedBookmarks`` directive: - -.. code-block:: json - - { - "url": "https://www.thehacker.recipes/", - "name": "THR" - } - -or you can add a new folder: - -.. code-block:: json - - { - "name": "New folder", - "children": [ - { - "url": "https://regex101.com/", - "name": "Regex101" - } - ] - } - -:code:`firefox` (addons, CA) (deprecated) -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.. warning:: - This covers the previous method for personalizing Firefox; the current approach utilizes :ref:`policy <\`firefox\` (policy)>`. - -.. seealso:: - Available from version ``3.0.2`` to ``3.1.5`` of any exegol image. - -A system exists to easily install arbitrary firefox addons in any new exegol container. - -The ``/opt/my-resources/setup/firefox/addons.txt`` file allows the user to list addons to install from online sources. It must be filled with their links in Mozilla's shop (for example https://addons.mozilla.org/fr/firefox/addon/foxyproxy-standard/ ). - -The ``.xpi`` files in ``/opt/my-resources/setup/firefox/addons/`` folder will be installed as well. - -.. seealso:: - Below, available from version ``3.2.0`` of any exegol image. - -The ``.der`` files in ``/opt/my-resources/setup/firefox/CA/`` folder will be trusted . - - -:code:`python3` (pip3) -~~~~~~~~~~~~~~~~~~~~~~ -.. seealso:: - Available from version ``3.0.0`` of any exegol image. - -A system exists to easily install arbitrary PIP3 packages in any new exegol container. - -The ``/opt/my-resources/setup/python3/requirements.txt`` file allows the user to list a set of packages to install with constraints just like a classic **requirements.txt** file. - - -:code:`tmux` (conf) -~~~~~~~~~~~~~~~~~~~ -.. seealso:: - Available from version ``3.0.0`` of any exegol image. - -Exegol supports overloading its **tmux** configuration to allow all users to use their personal configuration. - -* To automatically overwrite the ``~/.tmux.conf`` configuration file, simply create the file ``/opt/my-resources/setup/tmux/tmux.conf`` - -.. tip:: - It is possible to install **plugins** with the APT customization system, details :ref:`here `. - - -:code:`vim` (vimrc, configs) -~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.. seealso:: - Available from version ``3.0.0`` of any exegol image. - -Exegol supports overwriting its **vim** configuration to allow all users to use their personal configuration. - -* To automatically overwrite the ``~/.vimrc`` configuration file, simply create the file ``/opt/my-resources/setup/vim/vimrc`` -* vim configuration folders are also automatically synchronized: - * ``/opt/my-resources/setup/vim/autoload/*`` --> ``~/.vim/autoload/`` - * ``/opt/my-resources/setup/vim/backup/*`` --> ``~/.vim/backup/`` - * ``/opt/my-resources/setup/vim/colors/*`` --> ``~/.vim/colors/`` - * ``/opt/my-resources/setup/vim/plugged/*`` --> ``~/.vim/plugged/`` - * ``/opt/my-resources/setup/vim/bundle/*`` --> ``~/.vim/bundle/`` - -.. tip:: - It is possible to install **plugins** with :ref:`the APT customization system `. - -:code:`neovim` (.config/nvim) -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.. seealso:: - Will be available from version ``3.1.2`` of any exegol image. - -Exegol supports overwriting its **neovim** configuration to allow all users to use their personal configuration. - -* To automatically overwrite the ``~/.config/nvim/`` configuration, copy your config in ``/opt/my-resources/setup/nvim/`` - -.. tip:: - It is possible to install **plugins dependencies** with :ref:`the APT customization system `. - -:code:`zsh` (aliases, zshrc, history) -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.. seealso:: - Available from version ``3.0.0`` of any exegol image. - -To not change the configuration for the proper functioning of exegol but allow the user to add aliases and custom commands to zshrc, -additional configuration files will be automatically loaded by zsh to take into account the customization of the user . - -* **aliases**: any custom alias can be defined in the ``/opt/my-resources/setup/zsh/aliases`` file. This file is automatically loaded by zsh. -* **zshrc**: it is possible to add commands at the end of the zshrc routine in ``/opt/my-resources/setup/zsh/zshrc`` file. -* **history**: it is possible to automatically add history commands at the end of ``~/.zsh_history`` from the file ``/opt/my-resources/setup/zsh/history``. - -.. tip:: - It is possible to install **plugins** with the APT customization system, details :ref:`here `. - -:code:`arsenal` (cheats) -~~~~~~~~~~~~~~~~~~~~~~~~ -.. seealso:: - Available from version ``3.1.5`` of any exegol image. - -Exegol supports adding a custom cheatsheets file (rst or md file) for Arsenal (https://github.com/Orange-Cyberdefense/arsenal) by moving them in the folder ``/opt/my-resources/setup/arsenal-cheats/``. - -.. tip:: - You can create a structure with folders if you want some organization - -.. _User-setup: - -User setup ----------- -.. seealso:: - Available from version ``3.0.0`` of any exegol image. - -The ``/opt/my-resources/setup/load_user_setup.sh`` script is executed on the first startup of each new container that has the "my-resources" feature enabled. Arbitrary code can be added in this file, in order to customize Exegol (dependency installation, configuration file copy, etc). - -.. warning:: - It is strongly advised **not** to overwrite the configuration files provided by exegol (e.g. ``/root/.zshrc``, ``/opt/.exegol_aliases``, ...), official updates will not be applied otherwise. - -Troubleshooting ---------------- - -In case of problem, the customization system logs all actions in the ``/var/log/exegol/load_setups.log`` file. - -If the whole installation went smoothly the log file will be compressed by gunzip and will have the name ``/var/log/exegol/load_setups.log.gz`` - -.. tip:: - Logs in ``.gz`` format can be viewed directly **without unpacking** them with the ``zcat``, ``zgrep``, ``zdiff`` or ``zmore`` command! diff --git a/source/exegol-image/services.rst b/source/exegol-image/services.rst deleted file mode 100644 index 3acd77a6..00000000 --- a/source/exegol-image/services.rst +++ /dev/null @@ -1,45 +0,0 @@ -Services list -============= - -This section lists the services that can be used in Exegol containers and their associated default ports. - -.. note:: - - Note that, as of 25/10/2023, a utility is being developped in order to randomize those ports so that multiple containers being used concurrently don't have their services step on one another if they share a network interface. This utility will be mostly transparent, and will modify the services configuration files dynamically. - -.. table:: - :widths: 15 5 40 50 - :class: tight-table - - +----------------------+--------+------------------------------+-----------------------------------------------------------------------------------------------+ - | Service | Port | Commands | Comments | - +======================+========+==============================+===============================================================================================+ - | neo4j | | ``neo4j start``, | Used by BloodHound, and BloodHound-related projects. | - | | | ``neo4j stop``, | | - | * bolt | 7687 | ``neo4j restart`` | | - | | | | | - | * http | 7474 | | | - | | | | | - | * https | 7373 | | | - +----------------------+--------+------------------------------+-----------------------------------------------------------------------------------------------+ - | BloodHound-CE | 1030 | ``bloodhound-ce`` | BloodHound Community Edition Web Interface | - | | | ``bloodhound-ce-reset`` | | - | | | ``bloodhound-ce-stop`` | | - +----------------------+--------+------------------------------+-----------------------------------------------------------------------------------------------+ - | postgresql | 5432 | ``service postgresql [...]`` | Used by BloodHound CE | - +----------------------+--------+------------------------------+-----------------------------------------------------------------------------------------------+ - | Trilium | 1991 | ``trilium-start``, | Collaborative note taking app. https://github.com/zadam/trilium | - | | | ``trilium-stop`` | | - +----------------------+--------+------------------------------+-----------------------------------------------------------------------------------------------+ - | Burp Suite | 8080 | ``burpsuite`` | HTTP(S) Proxy | - +----------------------+--------+------------------------------+-----------------------------------------------------------------------------------------------+ - | Starkiller (Empire) | TBD | ``ps-empire server`` | GUI for the Empire post-exploit framework (https://github.com/BC-SECURITY/Empire) | - +----------------------+--------+------------------------------+-----------------------------------------------------------------------------------------------+ - | Havoc | 40056 | ``havoc client/server`` | C2 Framework in GO (https://github.com/HavocFramework/Havoc) | - +----------------------+--------+------------------------------+-----------------------------------------------------------------------------------------------+ - | Desktop | | ``desktop-start``, | Remote graphical desktop feature (beta). Used with the ``--desktop`` from up-to-date wrapper. | - | | | ``desktop-stop``, | | - | * vnc | 6336 | ``desktop-restart`` | | - | | | | | - | * websockify | random | | | - +----------------------+--------+------------------------------+-----------------------------------------------------------------------------------------------+ diff --git a/source/exegol-image/tools.rst b/source/exegol-image/tools.rst deleted file mode 100644 index 6feebd0b..00000000 --- a/source/exegol-image/tools.rst +++ /dev/null @@ -1,51 +0,0 @@ -Tools list -=========== - -Click :ref:`here ` to see the lists of tools featured in the latest nightly images. - - -.. error:: - [August 5th, 2023] - The lists descriptions were mostly AI-generated for this first version of the tools list in order to get the list shipped quickly. Many descriptions are wrong and will be fixed very soon. - -Releases --------- - -.. hint:: - The lists featured here are automatically generated. Exegol features CI/CD pipelines that build the images. At build, most tools are tested. If at least one test fails, the image doesn't get published. - -.. csv-table:: - :file: /assets/installed_tools/nightly.csv - :header-rows: 1 - :widths: 7 7 8 28 50 - :class: tight-table - -.. tabs:: - - .. tab:: AMD64 - - .. csv-table:: - :file: /assets/installed_tools/releases_amd64.csv - :header-rows: 1 - :widths: 7 7 28 50 - :class: tight-table - - .. tab:: ARM64 - - .. csv-table:: - :file: /assets/installed_tools/releases_arm64.csv - :header-rows: 1 - :widths: 7 7 28 50 - :class: tight-table - -.. _latest_nightly: - -Latest nightly --------------- - -Below is the list of tools featured in the latest nightly (AMD64) image. - -.. csv-table:: - :file: /assets/installed_tools/lists/latest_nightly_amd64.csv - :header-rows: 1 - :widths: 20 30 50 - :class: tight-table diff --git a/source/exegol-resources/resources.rst b/source/exegol-resources/resources.rst deleted file mode 100644 index ced4261c..00000000 --- a/source/exegol-resources/resources.rst +++ /dev/null @@ -1,21 +0,0 @@ -Resources -========= - -.. _exegol-resources: - -Exegol's "offline resources" are a neat choice of standalone tools and scripts that are often used during penetration tests, -CTFs and red-teams. -While many penetration testers download those resources again every time they need them, Exegol users don't have to. -Everything is managed by the wrapper and they are shared with every container by default (at ``/opt/resources``). - -Resources list --------------- - -.. hint:: - The list featured here is automatically generated. Exegol features CI/CD pipelines that build the images, update the resources, etc. - When a change is made on the Exegol-resources repository, it's reflected here, in the list. - -.. csv-table:: - :file: /assets/exegol_resources/resources_list.csv - :header-rows: 1 - :class: tight-table diff --git a/source/exegol-wrapper/advanced-uses.rst b/source/exegol-wrapper/advanced-uses.rst deleted file mode 100644 index 67152c0b..00000000 --- a/source/exegol-wrapper/advanced-uses.rst +++ /dev/null @@ -1,108 +0,0 @@ -=============== -Advanced uses -=============== - -.. contents:: - :local: - -.. _exegol_configuration: - -Exegol home directory -===================== - -The ``~/.exegol`` folder exists in the user's home folder to centralize :doc:`"exegol resources" `, :doc:`"my-resources" `, volumes and also the configuration file. - -* The **configuration file** (YAML) is located at ``~/.exegol/config.yml`` and is generated by the wrapper during the first execution, with the default configurations. -* By default, every exegol container has a **workspace volume**. If the path of this volume is not specified by the user (:doc:`see start parameters `), a folder with the name of the container will be created in the :ref:`"private workspace" ` folder. By default, this folder is located at ``~/.exegol/workspaces/``. - -Exegol configuration -==================== - -The Exegol wrapper is configured with many default settings. Most of them can be modified with a simple argument. -For productivity purposes, setting a different default behavior once and not have to add the same options everytime is interesting. For this exact purpose, a configuration file exists that allows users to persistently change the behavior and operations to be performed by default. - -The user configuration currently in place can be viewed with the command: ``exegol info -v``. More information on the :doc:`info page `. - -Within the ``~/.exegol/config.yml`` file, several settings can be configured to customize the Exegol experience, all distributed in multiple sections below. - -.. tabs:: - - .. tab:: Volumes - - The volume section allows to change the default path for various volumes. - - .. warning:: - Volume path can be changed at any time but already existing containers will not be affected by the update and will keep the original paths they were created with. - - .. _private_workspace_path: - - * ``my_resources_path``: the "my-resources" volume is a storage space dedicated to the user to customize his environment and tools. This volume is, by default, shared across all exegol containers. See :ref:`details about it `. - * ``exegol_resources_path``: exegol-resources are data and static tools downloaded in addition to docker images. These tools are complementary and are accessible directly from the host. See :doc:`details `. - * ``private_workspace_path``: when containers do not have an explicitly declared workspace at their creation (i.e. with ``--cwd-mount``, or ``--workspace``), a dedicated folder will be created at this location to share the workspace with the host but also to save the data after deleting the container. - - .. tab:: Config - - The config section allows you to modify the default behavior of the Exegol wrapper. - - * ``auto_check_update``: enables automatic check for wrapper update. (Default: ``True``) - * ``auto_remove_image``: automatically remove outdated image when they are no longer used. (Default: ``True``) - * ``auto_update_workspace_fs``: automatically modifies the permissions of folders and sub-folders in your workspace by default to enable file sharing between the container with your host user. (Default: ``False``) - * ``default_start_shell``: default shell command to start. (Default: ``zsh``) - * ``enable_exegol_resources``: Enables or not the exegol resources module by default on any new container. (Default: ``True``) - - .. tabs:: - - .. tab:: Shell logging - - Change the configuration of the shell logging functionality. - - * ``logging_method``: Choice of the method used to record the sessions, ``script`` or ``asciinema``. (Default: ``asciinema``) - * ``enable_log_compression``: Enable automatic compression of log files (with gzip). (Default: ``True``) - - .. tab:: Desktop - - Change the configuration of the virtual Desktop feature. - - * ``enabled_by_default``: Enables or not the desktop mode by default. If this attribute is set to True, then using the CLI ``--desktop`` option will be inverted and will **DISABLE** the feature (Default: ``False``) - * ``default_protocol``: Default desktop protocol,can be ``http``, or ``vnc`` depending on your wrapper / image version. (Default: ``http``) - * ``localhost_by_default``: Desktop service is exposed on localhost by default. If set to true, services will be exposed on ``localhost`` (127.0.0.1) otherwise it will be exposed on ``0.0.0.0``. This setting can be overwritten with :doc:`--desktop-config `. (Default: ``True``) - - - -My-resources -============ - -.. _My-resources-wrapper: - -"My-resources" is a major feature allowing Exegol users to have a volume, shared with all Exegol containers, that can centralize their own resources and configurations. It allows users to enjoy their own tools that are not available in Exegol but also to customize their Exegol setup. More information on the dedicated documentation page :doc:`My-Resources `. - -This volume is accessible from the host at ``~/.exegol/my-resources/`` and from the containers (if the feature was left enabled at the container creation) at ``/opt/my-resources``. - -To facilitate its use, a read/write access system **shared** (between the host user and the container root user) has been implemented. - -.. hint:: - To allow this permissions sharing, the "my-resources" folder (and all subdirectories) must have the Set-GID permission bit set. - This is done automatically by the wrapper if the current user has sufficient rights. - Otherwise, the wrapper will display a sudo command to be executed manually to update the relevant permissions. - -The host path of this volume can be changed from the configuration file ``~/.exegol/config.yml``. - -.. warning:: - * Be careful **not** to use a folder with **existing data**, in which case their permissions will be automatically modified to enable access sharing. - * This change will not be applied to already existing exegol containers. - -.. _local_build: - -Local builds -============ - -When installing Exegol, while downloading the pre-built and compressed Docker images from Dockerhub is advised, users can build their own images locally. The wrapper has a **local build feature** to create and manage local exegol images. - -The ``exegol install`` command can be used for that purpose. The user must specify an image name that does **not** match one of the remote images available from dockerhub. The wrapper will suggest to build a local image with this name. If the user chooses to build an image locally, he will then have to choose a **build profile** among those available. The build profile is merely the dockerfile to follow during the build process. An arbitrary dockerfile can be added in ``/path/to/Exegol/exegol-docker-build/name.dockerfile``. - -.. - _TODO: add ref to image profiles - -.. tip:: - * the ``-v`` parameter can be added to have more details about the build process. - * the detailed logs of the docker build process can also be saved in a file with the ``--build-log`` parameter. diff --git a/source/exegol-wrapper/exec.rst b/source/exegol-wrapper/exec.rst deleted file mode 100644 index 51f32273..00000000 --- a/source/exegol-wrapper/exec.rst +++ /dev/null @@ -1,62 +0,0 @@ -:code:`exec` action -=================== - -This action allows to run a single command in a single container instead of loading a full interactive shell. - -When this action is used it is possible to execute a command either in: - -* a **temporary** container created especially to execute the command, and **automatically deleted** at the end of the execution: the name of an exegol **image** must be provided from which a temporary container will be created -* a standard Exegol container (already existing, or not): the name of an exegol **container** must then be provided. This container will be created in interactive mode if it does not already exist - -The executed command can be executed either: - -* in the **background** mode (i.e. like a daemon): exegol **terminates immediately** after the command is launched and does not wait for its execution to be completed. No process is left hanging (useful when running GUI apps for instance). -* in **standard mode**: exegol will **wait** for the end of the process to stop the container (and delete it if - -.. tip:: - In standard execution mode, it is possible to ask exegol to display the command **output** (stdout/stderr) in the terminal by adding ``-v`` parameter. - -.. _exec_options: - -Options -------- - -Since the exec action can also create containers, it shares the same parameters as the :ref:`start action`. - -There are also additional parameters, unique to the ``exec`` action: - -=========================== ============= - Option Description -=========================== ============= - ``CONTAINER`` or ``IMAGE`` This option indicates the **container** name to use to execute the command. If the ``--tmp`` parameter is used, this name will be used to target an **image**. - ``COMMAND`` Single command to execute in the container. - ``-b``, ``--background`` Executes the command in background as a daemon. - ``--tmp`` Creates a dedicated and temporary container to execute the command. -=========================== ============= - -Command examples ----------------- - -.. code-block:: bash - - # Execute the command bloodhound in the container demo: - exegol exec demo bloodhound - - # Execute the command 'nmap -h' with console output in the container demo: - exegol exec -v demo 'nmap -h' - - # Execute a command in background within the demo container: - exegol exec -b demo bloodhound - - # Execute the command bloodhound in a temporary container based on the full image: - exegol exec --tmp full bloodhound - - # Execute a command in background with a temporary container: - exegol exec -b --tmp full bloodhound - - # Execute Wireshark in background, in a privileged temporary container: - exegol exec --background --tmp --privileged "nightly" "wireshark" - - # Execute the command wireshark with network admin privileged: - exegol exec -b --tmp --cap NET_ADMIN full wireshark - diff --git a/source/exegol-wrapper/info.rst b/source/exegol-wrapper/info.rst deleted file mode 100644 index 5197c561..00000000 --- a/source/exegol-wrapper/info.rst +++ /dev/null @@ -1,130 +0,0 @@ -=================== -:code:`info` action -=================== - -The ``info`` action aims at displaying all the information specific to the Exegol project on the current system. -This action can also be used by targeting a specific container to display its configuration in detail. - -Depending on the verbosity level specified in the command-line, the information displayed will be more or less detailed accordingly. - -.. tabs:: - - .. tab:: Standard (default) - - .. code-block:: bash - - exegol info - - * List of available Exegol Images - - * Name of the image - * Size of each image (disk space if the image is installed, otherwise its compressed size to download for installation) - * Status of each image - - * Not installed (Image available for download from dockerhub) - * Up to date (The latest version of the image is installed and ready to be used) - * Update available (A new version is available for download on dockerhub) - * Outdated (Old version of an image that has been updated since) - * Local image (Locally built image) - * Discontinued (if your image is no longer available on dockerhub) - - * List of Exegol Containers - - * Name of each container - * Container status (Stopped or running) - * Image name (Exegol image used as a base to create the container) - * Configurations (Display of non-default configurations) - - .. tab:: Verbose - - .. code-block:: bash - - exegol info -v - - In the verbose mode, the following additional elements are displayed. Everything from the lower verbosity level is still displayed. - - * Enumerate every user configuration (see details :ref:`here`) - - * In the list of available Exegol Images - - * Image ID - * Build date - * Image architecture (AMD64 / ARM64) - - * In the list of Exegol Containers - - * Container id - * Full configuration - * List of non-technical volumes - * List of Devices - * List of Ports (Applicable if network sharing with host is not enabled) - * List of custom environment variables - - .. tab:: Advanced - - .. code-block:: - - exegol info -vv - - In the advanced mode, the following additional elements are displayed. Everything from the lower verbosity levels is still displayed. - - * Enumerate the settings from the user configuration at ``~/.exegol/config.yml`` (see details :ref:`here`) - - * List the different exegol modules - - * Modules name - * Their update status - * Their git branch (if applicable) - - .. tab:: Debug - - .. code-block:: - - exegol info -vvv - - In the debug mode, everything from the lower verbosity levels is still displayed, as well as logs from internal methods and functions. Those logs can be useful for maintainers and developers in case of bug, or for making sure everything works properly. - - -Options -======= - -The info action does not have many parameters, its use is relatively simple. This action can either be used to gather general information (available images, containers, user configs, etc.), or gather information about a specific container and display its configuration. - -========================= ============= - Option Description -========================= ============= -``CONTAINER`` Optional positional argument to indicate the container tag of which to display the configuration. -========================= ============= - -Global options can still be used, like for any action. - -========================= ============= - Option Description -========================= ============= -``-h``, ``--help`` Show the help message of any action -``-v``, ``--verbose`` Verbosity level (-v for verbose, -vv for advanced, -vvv for debug) -``-q``, ``--quiet`` Show no information at all -``-k``, ``--insecure`` Allow insecure server connections for web requests, e.g. when fetching info from DockerHub (default: Secure) -``--offline`` Run exegol in offline mode, no request will be made on internet (default: Disable) -``--arch {arm64,amd64}`` Overwrite default image architecture (default: host's arch) -========================= ============= - -Command examples -================ - -.. code-block:: bash - - # Print containers and images essentials information: - exegol info - - # Print the detailed configuration of the "demo" container: - exegol info demo - - # Print verbose information: - exegol info -v - - # Print advanced information: - exegol info -vv - - # Print debug information: - exegol info -vvv diff --git a/source/exegol-wrapper/install.rst b/source/exegol-wrapper/install.rst deleted file mode 100644 index 3f6f5bf6..00000000 --- a/source/exegol-wrapper/install.rst +++ /dev/null @@ -1,47 +0,0 @@ -:code:`install` action -====================== - -This action can be used to install an Exegol image. At least one Exegol image is required to create and start a container and enjoy Exegol. - -When this action is used, the image can either be: - -* **downloaded** (i.e. "pulled" in Docker terms) from `the official Dockerhub registry `_. In this case, a compressed and pre-built image is downloaded in the form of layers, and then uncompressed. -* **built** locally by following the instructions of a Dockerfile offered on `the Exegol-images GitHub repo `_. Here again, no need to download the dockerfile manually, all of them are already at ``/path/to/Exegol/exegol-docker-build/``. - -.. hint:: - - The ``install`` action can be used without any particular argument or option. the wrapper will then enter in an interactive TUI (Text-based User Interface) mode where the user will be asked to choose what image to install or build. - - .. code-block:: bash - - exegol install - -Options -------- - -=================== ============= - Option Description -=================== ============= - ``IMAGE`` Optional positional argument to indicate the image to install (if downloading), or the name of the image to build (if building locally). - ``BUILD_PROFILE`` Optional positional argument to indicate the source profile to use if building locally. - ``--build-log`` Write logs to the path specified if building locally. - ``--build-path`` Custom path to the dockerfiles and sources. -=================== ============= - - -Command examples ----------------- - -.. code-block:: bash - - #Install or build interactively an exegol image - exegol install - - #Install or update the full image - exegol install full - - #Build interactively a local image named myimage - exegol install myimage - - #Build the myimage image based on the full profile and log the operation - exegol install myimage full --build-log "/tmp/build.log" \ No newline at end of file diff --git a/source/exegol-wrapper/remove.rst b/source/exegol-wrapper/remove.rst deleted file mode 100644 index 5dcce28b..00000000 --- a/source/exegol-wrapper/remove.rst +++ /dev/null @@ -1,36 +0,0 @@ -===================== -:code:`remove` action -===================== - -The purpose of the ``remove`` action is to remove one or more Exegol container. - -If the deleted container was using an outdated image, the wrapper will (by default) try to delete that outdated image automatically (unless this default behavior is changed in the :ref:`exegol configuration file`, which is not advised since disk space is not limited and Exegol images can take up to 30GB). - -When deleting the container, the wrapper will check if the content of the ``/workspace`` volume is empty. If the workspace is **empty**, exegol will **automatically delete** the folder on the host, otherwise it will **explicitly ask the user** if the workspace content should be **deleted** or not. - -Options -======= - -The options of the ``remove`` action are limited to selecting the container(s) to be removed and forcing the removal without asking the user for interactive confirmation. - -========================= ============= - Option Description -========================= ============= -``CONTAINER`` Tag used to target one or more Exegol containers -``-F``, ``--force`` Remove container without interactive user confirmation (confirmation will still be required for removing non-empty workspaces). -========================= ============= - - -Command examples -================ - -.. code-block:: bash - - # Remove interactively one or more containers: - exegol remove - - # Remove the "demo" container: - exegol remove "demo" - - # Remove the "demo", "test" and "dev" container without asking for user confirmation: - exegol remove -F "demo" "test" "dev" diff --git a/source/exegol-wrapper/restart.rst b/source/exegol-wrapper/restart.rst deleted file mode 100644 index fbc9a4f2..00000000 --- a/source/exegol-wrapper/restart.rst +++ /dev/null @@ -1,34 +0,0 @@ -====================== -:code:`restart` action -====================== - -The purpose of the ``restart`` action is to stop and directly restart an Exegol container. - -If these containers have a ``privileged`` or ``device`` configuration, restarting the container will refresh the available devices inside the container. - -.. warning:: - - Restarting a container will reset the ``hosts``, ``resolv.conf`` files (and probably more). - -Options -======= - -The options of the restart action are limited to selecting the container to be restarted and some starting options that can be also found on the :ref:`start action`. - -========================= ============= - Option Description -========================= ============= -``CONTAINER`` Tag used to target the Exegol containers to restart -========================= ============= - - -Command examples -================ - -.. code-block:: bash - - # Restart interactively one container: - exegol restart - - # Restart the "demo" container: - exegol restart "demo" diff --git a/source/exegol-wrapper/start.rst b/source/exegol-wrapper/start.rst deleted file mode 100644 index 35e77a45..00000000 --- a/source/exegol-wrapper/start.rst +++ /dev/null @@ -1,162 +0,0 @@ -:code:`start` action -==================== - -This action can be used to start a container. At least one Exegol image is required to create and start a container and enjoy Exegol. Installing an image can be done with ``exegol install`` (documentation -:doc:`here `). - -When this action is used, the following process is applied: - -* if no Exegol image is installed, the user is asked to specify which one to install of build, and the process continues -* then, if the container to start doesn't already exist, it is created based on an Exegol image and a few settings to specify, and the process continues -* then, the container is started and a shell is opened - -.. hint:: - - The ``start`` action can be used without any additional argument or option. the wrapper will then enter in an interactive TUI (Text-based User Interface) mode where the user will be asked to choose a few settings. - - .. code-block:: bash - - exegol start - -.. _start_options: - -Options -------- - -A single option exist to target an Exegol container. -If this container exists, it will be started if it is not already the case and a shell will be spawned to offer an interactive console to the user - -========================= =============================== - Option Description -========================= =============================== -``CONTAINER`` Tag used to target an Exegol container -========================= =============================== - -Many options exist to customize the creation of exegol container. - -.. tip:: - The default options of some commands can be changed in the :ref:`exegol configuration file`. - -Global options -~~~~~~~~~~~~~~ - -=========================================================== =============================== - Option Description -=========================================================== =============================== -``IMAGE`` Tag of the exegol image to use to create a new exegol container -``-w WORKSPACE_PATH``, ``--workspace WORKSPACE_PATH`` The specified host folder will be linked to the /workspace folder in the container. -``-cwd``, ``--cwd-mount`` This option is a shortcut to set the /workspace folder to the user's current working directory (pwd). -``-fs``, ``--update-fs`` Modifies the permissions of folders and sub-folders shared in your workspace to access the files created within the container using your host user account. (default: Disabled) -``-V VOLUMES``, ``--volume VOLUMES`` Share a new volume between host and exegol (format: --volume /path/on/host/:/path/in/container/[:ro|rw]). -``-p PORTS``, ``--port PORTS`` Share a network port between host and exegol (format: --port [:][:][:]. This configuration will disable the shared network with the host. -``--hostname HOSTNAME`` Set a custom hostname to the exegol container (default: exegol-) -``--cap CAPABILITIES`` **(dangerous)** Capabilities allow to add specific privileges to the container (e.g. need to mount volumes, perform low-level operations on the network, etc). -``--privileged`` **(dangerous)** give extended privileges at the container creation (e.g. needed to mount things, to use wifi or bluetooth) -``-d DEVICES``, ``--device DEVICES`` Add host device(s) at the container creation (example: -d /dev/ttyACM0 -d /dev/bus/usb/). -``--disable-X11`` Disable X11 sharing to run GUI-based applications. (default: Enabled) -``--disable-my-resources`` Disable the mount of the shared resources (/opt/my-resources) from the host (/home/dramelac/.exegol/my-resources) (default: Enabled) -``--disable-exegol-resources`` Disable the mount of the exegol resources (/opt/resources) from the host (/home/dramelac/Documents/tools/Exegol/exegol-resources) (default: Enabled) -``--disable-shared-network`` Disable the sharing of the host's network interfaces with exegol (default: Enabled) -``--disable-shared-timezones`` Disable the sharing of the host's time and timezone configuration with exegol (default: Enabled) -=========================================================== =============================== - -Virtual desktop -~~~~~~~~~~~~~~~ - -In addition to the X11 sharing functionality, Exegol can generate its own graphical environment and make it available to the user in a variety of ways. -By default, a web interface gives users access to their own containerized graphical desktop. - -========================= =============================== - Option Description -========================= =============================== -``--desktop`` Enable or disable the Exegol desktop feature (default: Disabled) -``--desktop-config`` Configure your exegol desktop (vnc or http) and its exposure (format: proto[:ip[:port]]) (default: http:127.0.0.1:) -========================= =============================== - -.. _vpn: - -VPN -~~~ - -An additional feature of Exegol is the VPN tunnel option (OpenVPN). -Just provide an ovpn configuration to exegol and the container will take care of starting the tunnel at each startup. - -========================= =============================== - Option Description -========================= =============================== -``--vpn VPN`` Setup an OpenVPN connection at the container creation (example: --vpn /home/user/vpn/conf.ovpn) -``--vpn-auth VPN_AUTH`` Enter the credentials with a file (first line: username, second line: password) to establish the VPN connection automatically (example: --vpn-auth /home/user/vpn/auth.txt) -========================= =============================== - -.. warning:: - All the options seen previously are taken into account **only** for the creation of a **new container**. - It is **not possible** to modify the configuration of an existing container. - These options will be **ignored** if a container with the same name already exists. - -Shell logging -~~~~~~~~~~~~~ - -One of the functions of exegol very useful in a professional context is the shell logging. -This feature allows the user to record **everything** that happens in the exegol container (commands typed and responses). - -=============================== =============================== - Option Description -=============================== =============================== -``-l``, ``--log`` Enable shell logging (commands and outputs) on exegol to /workspace/logs/ (default: Disabled) -``--log-method`` Select a shell logging method used to record the session (default: ``asciinema``) -``--log-compress`` Enable or disable the automatic compression of log files at the end of the session (default: Enabled) -=============================== =============================== - -.. tip:: - When the ``-l``/``--log`` option is enabled during the **creation** of a **new** container, all future shells will be **automatically logged** for this container. - -Session specific -~~~~~~~~~~~~~~~~ - -The options specific to the start of the interactive session - -=============================== =============================== - Option Description -=============================== =============================== -``-e ENVS``, ``--env ENVS`` And an environment variable on Exegol (format: --env KEY=value). The variables configured during the creation of the container will be persistent in all shells. If the container already exists, the variable will be present only in the current shell. -``-s SHELL``, ``--shell SHELL`` Select a shell environment to launch at startup (default: zsh) -=============================== =============================== - -.. tip:: - The environment variables configured with ``--env ENVS`` during the **creation** of a **new** container will be available to **all** processes of the container during the **entire life cycle** of the container. - -Command examples ----------------- - -.. code-block:: bash - - # Start interactively a container - exegol start - - # Create a demo container using full image - exegol start demo full - - # Spawn a shell from demo container - exegol start demo - - # Create a container test with a custom shared workspace - exegol start test full -w "./project/pentest/" - - # Create a container test sharing the current working directory - exegol start test full -cwd - - # Create a container htb with a VPN - exegol start htb full --vpn "~/vpn/lab_Dramelac.ovpn" - - # Create a container app with custom volume - exegol start app full -V "/var/app/:/app/" - - # Get a shell based on tmux - exegol start --shell tmux - - # Share a specific hardware device (like Proxmark) - exegol start -d "/dev/ttyACM0" - - # Share every USB device connected to the host - exegol start -d "/dev/bus/usb/" - diff --git a/source/exegol-wrapper/stop.rst b/source/exegol-wrapper/stop.rst deleted file mode 100644 index 7a63fcb4..00000000 --- a/source/exegol-wrapper/stop.rst +++ /dev/null @@ -1,33 +0,0 @@ -=================== -:code:`stop` action -=================== - -The purpose of the ``stop`` action is to stop one or more Exegol containers. - -If these containers have a VPN configuration, shutting down the container will cause the VPN tunnel to be disconnected. - -Options -======= - -The options of the stop action are limited to selecting the container(s) to be stopped. - -========================= ============= - Option Description -========================= ============= -``CONTAINER`` Tag used to target one or more Exegol containers -========================= ============= - - -Command examples -================ - -.. code-block:: bash - - # Stop interactively one or more containers: - exegol stop - - # Stop the "demo" container: - exegol stop "demo" - - # Stop the "demo", "test" and "dev" container: - exegol stop "demo" "test" "dev" diff --git a/source/exegol-wrapper/uninstall.rst b/source/exegol-wrapper/uninstall.rst deleted file mode 100644 index 70225cbc..00000000 --- a/source/exegol-wrapper/uninstall.rst +++ /dev/null @@ -1,35 +0,0 @@ -======================== -:code:`uninstall` action -======================== - -The purpose of the ``uninstall`` action is to remove one or more Exegol images. - -.. warning:: - The wrapper will try to delete the selected exegol images but this can only work if the selected images are **not used by any container** anymore. A container based on an image that doesn't exist anymore cannot run. - -Options -======= - -The options of the ``uninstall`` action are limited to selecting the image(s) to be removed, and forcing the removal without asking the user for interactive confirmation. - -========================= ============= - Option Description -========================= ============= -``IMAGE`` Tag used to target one or more Exegol images -``-F``, ``--force`` Remove image without interactive user confirmation. -========================= ============= - - -Command examples -================ - -.. code-block:: bash - - # Remove interactively one or more containers: - exegol uninstall - - # Remove the "full" container: - exegol uninstall "full" - - # Remove the "full", "ad" and "web" container without asking for user confirmation: - exegol uninstall -F "full" "ad" "web" diff --git a/source/exegol-wrapper/update.rst b/source/exegol-wrapper/update.rst deleted file mode 100644 index 14312835..00000000 --- a/source/exegol-wrapper/update.rst +++ /dev/null @@ -1,64 +0,0 @@ -===================== -:code:`update` action -===================== - -The update process -================== - -The exegol wrapper has an ``update`` action dedicated to updating the different modules (wrapper, resources, etc.) of the project as well as the (docker) Exegol images. - -.. _Modules-updates: - -Modules updates ---------------- - -This action make sure the local copies of the following repositories are up to date: - -* `Exegol `_ (wrapper code). If the wrapper has been installed with Pip, it will not be able to self-update, updating the package through Pip will be required (e.g. ``python3 -m pip install --upgrade exegol``). -* `Exegol-images `_ (docker building files) -* `Exegol-resources `_ (offline resources, :ref:`exegol-resources`). This module is optional, and users can choose to install/update it at any time. - -.. tip:: - When running ``exegol update -v``, the user will be able to choose from what branch them module should be synchronized with, allowing to switch easily between release and dev versions. - -.. _Images-updates: - -Images updates --------------- - -Once the local code base is updated, the wrapper compares the installed Exegol images with those offered on the Dockerhub registry. If no parameters have been provided at command-line, an interactive selection will be possible to choose the images to update (if updates are available). - -.. hint:: - Older versions of images will be automatically deleted if they are no longer used by any container and if a newer version of the same image is installed. - This automatic deletion behavior is a default configuration that can be modified in the :ref:`configuration file` if needed, but it's advised not to change it as disk space is not unlimited and Exegol image can take up to 30GB. - -Options -======= - -The options of the ``update`` action are the following. - -========================= ============= - Option Description -========================= ============= -IMAGE This option specifies what image to update. -``--skip-git`` Skip :ref:`modules updates `. -``--skip-images`` Skip :ref:`images updates `. -========================= ============= - - -Command examples -================ - -.. code-block:: bash - - # Update interactively an exegol image: - exegol update - - # Update the full image: - exegol update full - - # Update the full image without updating exegol modules: - exegol update --skip-git full - - # Update exegol modules and have the option to change branch without updating docker image: - exegol update -v --skip-images diff --git a/source/exegol-wrapper/version.rst b/source/exegol-wrapper/version.rst deleted file mode 100644 index 669ad49a..00000000 --- a/source/exegol-wrapper/version.rst +++ /dev/null @@ -1,36 +0,0 @@ -====================== -:code:`version` action -====================== - -The ``version`` action is mostly used for debugging purposes, it only displays information about the Exegol setup on the system. - -In debug mode (``-vvv``), it also displays information about the system and wrapper installation context. - -.. _general_options: - -Options -======= - -The options available for the version action are the global options that affect the behavior of all exegol actions. - -========================= ============= - Option Description -========================= ============= -``-h``, ``--help`` Show the help message of any action -``-v``, ``--verbose`` Verbosity level (-v for verbose, -vv for advanced, -vvv for debug) -``-q``, ``--quiet`` Show no information at all -``-k``, ``--insecure`` Allow insecure server connections for web requests, e.g. when fetching info from DockerHub (default: Secure) -``--offline`` Run exegol in offline mode, no request will be made on internet (default: Disable) -``--arch {arm64,amd64}`` Overwrite default image architecture (default: host's arch) -========================= ============= - -Command examples -================ - -.. code-block:: bash - - # Show version information - exegol version - - # Show version and system information - exegol version -vvv diff --git a/source/getting-started/faq.rst b/source/getting-started/faq.rst deleted file mode 100644 index 0e6faada..00000000 --- a/source/getting-started/faq.rst +++ /dev/null @@ -1,125 +0,0 @@ -========================== -Frequently asked questions -========================== - -Below are the frequently asked questions regarding either features or the overall project. - -.. contents:: - :local: - -.. - Frequently asked questions should be questions that actually got asked. - Formulate them as a question and an answer. - Consider that the answer is best as a reference to another place in the documentation. (format of this FAQ taken from `RTD's own FAQ `_) - -What tools are installed in Exegol? -=================================== - -The list of tools is dynamically generated for all Exegol images and available :doc:`here `. - -Can I contribute to the project? -================================ - -Yes, please refer to the :doc:`contributors section `. - -Can I run Exegol on a macOS? -============================ - -Yes. And both CPU architectures are supported (Intel X86_64 (AMD64) and Apple Silicon M1/M2 (ARM64). - -.. tip:: - - We strongly advised macOS users to replace Docker Desktop with `OrbStack `_, allowing host network mode to work for instance, this it's not supported by Docker Desktop for Mac. - - -Can I use a VPN with Exegol? -============================ - -Yes. And you have multiple choices. - -* **The "YOLO" choice**: at the container creation (i.e. when "starting" a container for the first time), give all permissions to the container so that you're able to run openvpn in it and start the vpn. The command should look like ``exegol start --privileged``. -* **The better choice**: use the ``--vpn`` option at the container creation: ``exegol start --vpn ``. It's the easiest and more secure choice. See the ``start`` help :doc:`here `). - -.. warning:: - - Creating a **privileged** container (c.f. the "YOLO" choice) exposes you to higher security risks. This should be avoided. - -Can I customize Exegol? -======================= - -Yes, please refer to the :doc:`"my-resources" documentation ` that explains how to automatically setup your changes to your Exegol containers. -Also, see the :doc:`"wrapper's advanced-uses" documentation ` to see how to edit Exegol's conf among other things. -You could also want to :ref:`make your own Exegol image ` - -.. _custom_image: - -Can I make my own Exegol image? -=============================== - -Yes. You will need to create a dockerfile (e.g. ``CUSTOM.dockerfile``) at the root of the exegol-images module next to the other dockerfiles (i.e. ``/path/to/Exegol/exegol-docker-build/``) containing the instructions you want the build process to follow. - -Then, run something like ``exegol install "myimagename" "CUSTOM"`` to build the image locally. See the ``install`` documentation: :doc:`install action `. - -How to install Exegol on an external drive? -=========================================== - -Exegol's wrapper is lightweight, but it's Docker images can take up some space, and users may not have enough room in their internal HDD/SSD, hence the question. This usually comes down to "how can I install Docker on an external drive?", and the answer depends on the host. - -.. tip:: - - Use a fast drive, otherwise Exegol will get real slow. - -For macOS and Windows users, this can be configured in the Docker Desktop dashboard (in ``Settings > Resources > Advanced > Disk image location``). - -.. image:: /assets/faq/docker_desktop_disk_image_location.png - :align: center - :alt: Disk Image Location Setting (Docker Desktop) - -How to add a new tool? -====================== - -"Adding a tool" can mean many things. Depending on that, you'll get a different answer. So let's answer most of them. - -If you want to add a tool: - -* **in the official Exegol images**: refer to the :ref:`contribution guidance `. -* **in your own custom local image**: refer to the :ref:`contribution guidance ` as well, but instead of creating a Pull Request at the end to offer your contribution, just build the image locally with the wrapper and enjoy your custom local image. -* **in a live container**: that's your container, you can do whatever you whish in it ;) -* **automatically in all containers at their creation**: refer to the :doc:`"my-resources" documentation `. - -Can I install docker directly on my WSL2 distro instead of Docker Desktop ? -=========================================================================== - -Yes, it's possible to install docker directly on WSL2 rather than using Docker Desktop, but you'll be restricted to your WSL2 environment and its constraints. - -Although Docker Desktop is incomplete, it does offer a few advantages (exegol can be used from powershell / cmd, windows folder sharing with the exegol workstation, etc). -We therefore recommend **Docker Desktop as the official support** for Exegol. - -We do **not** guarantee wrapper stability with a directly installed WSL docker. - -How to retrieve your desktop login details ? -============================================ - -The container's root password can be obtained with ``exegol info `` (i.e. this is needed when using the :doc:`desktop ` feature) - -WSL 2 consumes massive amounts of RAM, CPU power, and Disk Space. How can I deal with this issue ? -================================================================================================== - -Users might experience excessive memory consumption when using Exegol. This is caused by WSL 2 not freeing up RAM even when processes are finished, causing large amounts of unused memory to remain allocated. This leads to high memory usage on the host system and reduced performance. More information about this issue can be found [at this GitHub issue](https://github.com/microsoft/WSL/issues/4166). A simple workaround is to create a `%UserProfile%\.wslconfig` file in Windows and use it to limit memory assigned to WSL 2 VM. - -``` -[wsl2] -memory=8GB # Limits VM memory in WSL 2 up to 3GB -processors=2 # Makes the WSL 2 VM use two virtual processors -``` - -When using Docker with the WSL2 backend, resource limits are managed by Windows. There might be cases, for example after updating an Exegol image, where Docker might take double the disk space the image needs. To deal with this problem, users should find the `Disk image location` in Docker Desktop (`Settings -> Resources -> Advanced`). It will be in the following format `C:\Users\\AppData\Local\Docker\wsl`. The Virtual Hard Disk can be located in the following path, `C:\Users\\AppData\Local\Docker\wsl\disk`. Users can use the `diskpart` tool to shrink the Virtual Hard Disk using the following instructions based on directions [here](https://stackoverflow.com/questions/70946140/docker-desktop-wsl-ext4-vhdx-too-large). -- Stop Docker Desktop -- Start an administrative CMD or PowerShell session -- Stop WSL2: `wsl --shutdown` -- Start the diskpart tool: `diskpart` -- Select the Virtual Hard Disk: `select vdisk file="C:\Users\\AppData\Local\Docker\wsl\disk\docker_data.vhdx"`. A message `DiskPart successfully selected the virtual disk file.` should appear. -- Shrink the Virtual Hard Disk: `compact vdisk` -- Wait for the proccess to reach 100 completion (might take some time) - -.. TODO: add a note, when the Desktop feature is in prod, that explains the ups and dows of X11 vs. Desktop mode. diff --git a/source/getting-started/install.rst b/source/getting-started/install.rst deleted file mode 100644 index 939f4c72..00000000 --- a/source/getting-started/install.rst +++ /dev/null @@ -1,492 +0,0 @@ -============== -Install Exegol -============== - -Installing Exegol starts with installing the entrypoint to the whole project: the Python wrapper. Once the wrapper is installed, everything else can be managed from it. - -.. hint:: - - It is strongly advised to install Exegol on a Linux host, especially when planning on using Exegol for internal penetration tests. This is because Docker Desktop on Windows and macOS lacks a few features, mainly due to how these operating systems run Docker containers within an internal VM that doesn't share the host's network interfaces and USB accessories. - -Once the wrapper is installed, the second step in setting up Exegol on a device is to install at least one Exegol image, either with ``exegol start`` (documentation -:doc:`here `), or with ``exegol install`` (documentation -:doc:`here `). Both actions will guide the user in installing an image if needed. - -.. contents:: - :local: - -.. _install_requirements: - -Requirements -============ - -The following elements are required before Exegol can be installed, whatever the host's operating system is: - -* git (`Linux `__ | `macOS `__ | `Windows `__) -* python3 (`Linux `__ | `macOS `__ | `Windows `__) -* docker (`Linux `__) or Docker Desktop (`macOS `__ | `Windows `__) -* at least 100GB of free storage recommended (a minimum of 20GB could be enough, but only for the ``light`` image). - -Additional dependencies may be required depending on the host OS. - -.. tabs:: - - .. group-tab:: Linux - - No additional dependencies for Linux environments. - - .. tip:: - - From Linux systems, Docker can be installed quickly and easily with the following command-line: - - .. code-block:: bash - - curl -fsSL "https://get.docker.com/" | sh - - .. warning:: - - By default, ``sudo`` will be required when running docker, hence needed as well for Exegol. For security reasons, it should stay that way, but it's possible to change that. In order to run exegol from the user environment without ``sudo``, the user must have the appropriate rights. You can use the following command to grant them to the current user: - - .. code-block:: bash - - # add the sudo group to the user - sudo usermod -aG docker $(id -u -n) - - # "reload" the user groups with the newly added docker group - newgrp docker - - For more information, official Docker documentation shows `how to manage docker as a non root user `_. - - .. warning:: - - `Docker "Rootless mode" `_ is not supported by Exegol as of yet. Please follow the install procedure mentionned above. - - .. group-tab:: macOS - - To support graphical applications (:ref:`display sharing functionality `, e.g. Bloodhound, Wireshark, Burp, etc.), additional dependencies and configuration are required: - - .. hint:: - - The XQuartz requirement below is now optional if using the (beta) :ref:`Graphical Remote Desktop feature ` instead of X11 sharing (join our Discord to know more about this beta feature). - - * `XQuartz `__ must be installed - * The XQuartz config ``Allow connections from network clients`` must be set to true - * Docker Desktop must be configured with default File Sharing (see screenshot below) - - .. figure:: /assets/install/macOS_xquartz_config.png - :align: center - :alt: macOS XQuartz configuration requirement - - macOS XQuartz configuration requirement - - .. figure:: /assets/install/macOS_resources_req.png - :align: center - :alt: macOS Docker Desktop resources requirement - - macOS Docker Desktop resources requirement - - .. warning:: - - You'll also need to add the exegol source folder (or, more precisely, the folder ``[...]/exegol/utils/imgsync``). - - If you install Exegol from the python pip package, this folder is located where the python packages are installed. - The path to this folder depends on how you installed python. When creating your first container, you may get an error disclosing the exegol installation folder, which will have to be added as an authorized resource. - - By default, you can try to add the path: ``/Library/Frameworks/Python.framework`` to the Docker Desktop File sharing allowlist. - - - .. tip:: - - `OrbStack `__ for **Mac** is supported by Exegol wrapper from ``v4.2.0``. - - Your exegol installation cannot be stored under ``/opt`` directory when using OrbStack (`due to OrbStack limitations `_). - - This support is still in beta, feel free to open issues on `GitHub `__ if you encounter any bugs. - - .. group-tab:: Windows - - To support graphical applications (:ref:`display sharing functionality `, e.g. Bloodhound, Wireshark, Burp, etc.), additional dependencies and configuration are required: - - * Windows **10** (up to date), or Windows **11**, is required - * **Docker Desktop** installed on the Windows host - * Docker Desktop must be configured to run on **WSL2** engine (`how to `_) - * `WSLg `_ must be installed to support graphical application - * at least one WSL distribution must be **installed** as well (e.g. Debian), with **Docker integration** enabled (see screenshot below) - - - .. figure:: /assets/install/windows_dockerdesktop_wsl_config.png - :align: center - :alt: Windows Docker Desktop WSL integration configuration - - Windows Docker Desktop WSL integration configuration - - In a Windows environment, the Exegol wrapper can be installed **either** in a **WSL shell** or directly in your Windows environment with **Powershell**. - - .. warning:: - - Please note that it is **not** advisable to use Exegol from both environments at the same time, as this could lead to conflicts and Exegol does not officially support this configuration. - - .. warning:: - - You may want to disable Windows Defender during the installation, as Exegol will download pre-built remote shells (or temporarily exclude ``C:\Users\\AppData\Local\Temp`` or the source file directory). - - You should also add the folder ``C:\Users\\.exegol\exegol-resources`` to the exclusion list. - - -.. _exegol_install: - -Installation -============ - -The installation of Exegol on Linux, macOS and Windows are very similar. It can either be installed from pip (easiest, most user-friendly, but with a few missing features) or from sources (easy as well, fully featured). - - -1. Installation of exegol -------------------------- - -.. tabs:: - .. group-tab:: Installing with pipx (preferred) - - The pre-compiled Exegol’s wrapper can be installed from the PyPI repository. - While this is the easiest and most user-friendly technique, it is advised to install from sources, as it allows to switch from release to dev branches easily and it supports the auto-update feature. - - Using ``pipx`` allows you to install Exegol in an **isolated** virtual environment **dedicated** to it. - - First, ``pipx`` must be installed on your host system: - - .. code-block:: bash - - # install pipx if not already installed, from system package: - sudo apt update && sudo apt install pipx - # OR from pip - python3 -m pip install pipx - - Exegol's wrapper can be installed with ``pipx`` from **PyPI**: - - .. code-block:: bash - - # You can now install Exegol package from PyPI - pipx install exegol - - .. group-tab:: Installing from sources - - Exegol's wrapper can be installed from sources (with Git). The wrapper then knows how to self-update, and switching from release and development branches is possible and very easy. - - .. code-block:: bash - - git clone "https://github.com/ThePorgs/Exegol" - - .. tip:: - - If you want a **light** clone of Exegol (and **never** use the **dev** branch), you can use the following command: - - .. code-block:: bash - - git clone --shallow-since="2023/05/08" "https://github.com/ThePorgs/Exegol" - - If you have access to docker directly as a user, you can install the requirements only for your current user - otherwise the requirements must be installed as root to run Exegol with sudo. - - .. tabs:: - - .. tab:: With sudo - - .. code-block:: bash - - sudo python3 -m pip install --requirement "Exegol/requirements.txt" - - .. tab:: Directly as user - - .. code-block:: bash - - python3 -m pip install --user --requirement "Exegol/requirements.txt" - - .. group-tab:: Installing with pip - - The pre-compiled Exegol’s wrapper can be installed from the PyPI repository. - While this is the easiest and most user-friendly technique, it is advised to install from sources, as it allows to switch from release to dev branches easily and it supports the auto-update feature. - - .. code-block:: bash - - python3 -m pip install exegol - - .. warning:: - - In some cases, it is no longer possible to add a pip package system-wide (PEP 668). In such cases, it is preferable to use ``pipx``. - - -2. Adding Exegol to the ``PATH`` --------------------------------- - -.. tabs:: - - .. group-tab:: Installing with pipx (preferred) - - In order to use pipx applications, the pipx environment must be set in your PATH: - - .. code-block:: bash - - pipx ensurepath - - Dont forget to open a **new terminal** to reload your PATH before continuing. - - .. group-tab:: Installing from sources - - .. tabs:: - .. tab:: Linux & MacOS - - Once this is taken care of, the exegol wrapper can then be added to the ``PATH`` with a symlink for direct access. This allows to call exegol from wherever, instead of to use the absolute path. Exegol can then be used with ``exegol `` instead of ``python3 /path/to/Exegol/exegol.py ``. - - .. code-block:: bash - - sudo ln -s "$(pwd)/Exegol/exegol.py" "/usr/local/bin/exegol" - - .. group-tab:: Windows - - Once this is taken care of, the exegol wrapper can then can be added as a PowerShell command alias. Exegol can then be used with ``exegol `` instead of ``python3 /path/to/Exegol/exegol.py ``. - - To create the alias file correctly, open a PowerShell and place yourself in the folder where exegol is located (applicable only for `from source` installations) and run the following commands: - - Create `$PROFILE` file if it doesn't exist: - - .. code-block:: powershell - - if (!(Test-Path -Path $PROFILE)) { - New-Item -ItemType File -Path $PROFILE -Force - } - - Create alias for Exegol in `$PROFILE`: - - .. code-block:: powershell - - echo "Set-Alias -Name exegol -Value '$(pwd)\exegol.py'" >> $PROFILE - - .. warning:: - - To automatically load aliases from the ``.ps1`` file, PowerShell's ``Get-ExecutionPolicy`` must be set to ``RemoteSigned``. - - If the configuration is not correct it can be configured as **administrator** with the following command: - - .. code-block:: powershell - - Set-ExecutionPolicy -ExecutionPolicy RemoteSigned - - .. tip:: - If you have installed Python3 manually and Windows opens the **Microsoft store** on the python page as soon as you type ``python3.exe``, try this: - - It is possible to disable this behavior in the Windows settings: ``Apps > Apps & features > App execution aliases`` and disable aliases for ``python.exe`` and ``python3.exe``. - - .. group-tab:: Installing with pip - - If your pip installation is correct and functional, you have nothing more to do and you can already use the command ``exegol``. - - If not, remember that pip installs binaries in a **dedicated** local folder, which then **must** be in the ``PATH`` environment variable. - Try to fix your pip installation: `Linux `__ | `MacOS `__ | `Windows `__ - -.. _install_exegol_privileges: - -3. Run Exegol with appropriate privileges ------------------------------------------ - - -.. tabs:: - - .. group-tab:: Linux - - Exegol does not support rootless docker. To interact with docker, you must either have your user be a member of the docker group to use exegol as a user, or run Exegol with root privileges using sudo. - - .. tabs:: - - .. tab:: Run as root (preferred) - - To run Exegol as root with sudo, you must use a specific sudo command. For a better user experience, we recommend using an alias: - - .. tabs:: - - .. group-tab:: Bash - - .. code-block:: bash - - echo "alias exegol='sudo -E $(which exegol)'" >> ~/.bash_aliases - source ~/.bashrc - - .. group-tab:: Zsh - - .. code-block:: bash - - echo "alias exegol='sudo -E $(which exegol)'" >> ~/.zshrc - source ~/.zshrc - - .. tip::distribution - - Please note that on most Linux distros, .bash_aliases is included in .bashrc. However, this is not the case in some distributions (i.e. Arch Linux). If this is your case, it is recommended to include .bash_aliases in .bashrc by adding these lines in your .bashrc file (for more details, please follow the documentation of your Linux distribution): - - .. code-block:: bash - - if [ -f ~/.bash_aliases ]; then - . ~/.bash_aliases - fi - - .. tab:: Run as user - - .. warning:: - - By giving the user direct access to docker, this allows the user to compromise the host and become **root** on the machine with full access to the file system. - - For more information, official Docker documentation shows `how to manage docker as a non root user `_. - - If you accept this risk because the environment is not critical and you prefer ease of use without the security control provided by sudo, you can apply the following method to use exegol directly as a user: - - .. code-block:: bash - - # add the sudo group to the user - sudo usermod -aG docker $(id -u -n) - - # To apply the new group you must open a new shell - exit - # OR "reload" the user groups with the newly added docker group - newgrp docker - - .. group-tab:: macOS - - Exegol should **NOT** be used as root on macOS. Docker Desktop (or Orbstack) do not require root privileges. - - .. group-tab:: Windows - - Exegol should **NOT** be used as admin on Windows and **NOT** as root in a WSL instance. Docker Desktop doesn't require administrator privileges. - - -4. Installation of the first Exegol image ------------------------------------------ - -Once the exegol wrapper is installed, you can download your first docker image with the following command: - -.. code-block:: bash - - exegol install - - -5. (Optional) Using Exegol auto-completion ------------------------------------------- - -Exegol (wrapper) supports auto-completion in many shell environments but there is a configuration to add (on the host) for this feature to work. - -.. important:: - - The following configurations must be made in your **host** environment. - -.. tip:: - - If the command ``register-python-argcomplete`` is not found on your host, you have to install it: - - .. code-block:: bash - - # Using the system package manager - sudo apt install python3-argcomplete - - # Or using pip (check if pip packages are included in your $PATH) - pip3 install --user argcomplete - - # Or using pipx (check if pipx packages are included in your $PATH) - pipx install argcomplete - -.. tabs:: - .. tabs:: - .. group-tab:: Bash - - You can enable Exegol auto-completion for your **current user** with your ``.bashrc`` or you can enable the auto-completion **system-wide** with ``bash-completion``. - - .. tabs:: - - .. tab:: Via bash-completion - - To setup the auto-completion system-wide you first need to install ``bash-completion`` on your system (if not already installed). - - .. code-block:: bash - - sudo apt update && sudo apt install bash-completion - - At this point you should have a ``/etc/bash_completion.d/`` folder. It's in there that you can add any auto-completion module that you want. - - To generate and install the exegol completion configuration you can execute the following command with ``register-python-argcomplete``: - - .. code-block:: bash - - register-python-argcomplete --no-defaults exegol | sudo tee /etc/bash_completion.d/exegol > /dev/null - - .. tab:: Via .bashrc - - Add the following command in your ``~/.bashrc`` config: - - .. code-block:: bash - - eval "$(register-python-argcomplete --no-defaults exegol)" - - - .. tip:: - If you have multiple tools using ``argcomplete`` you can also use the `global completion `__ method (need bash >= 4.2). - - .. group-tab:: Zsh - - To activate completions for zsh you need to have ``compinit`` enabled in zsh: - - .. code-block:: bash - - autoload -U compinit - compinit - - Afterwards you can enable completion by adding the following command in your ``~/.zshrc`` config: - - .. code-block:: bash - - eval "$(register-python-argcomplete --no-defaults exegol)" - - .. group-tab:: Fish - - To activate completions for fish use: - - .. code-block:: bash - - register-python-argcomplete --no-defaults --shell fish exegol | source - - or create new completion file, e.g: - - .. code-block:: bash - - register-python-argcomplete --no-defaults --shell fish exegol > ~/.config/fish/completions/exegol.fish - - .. group-tab:: Tcsh - - To activate completions for tcsh use: - - .. code-block:: bash - - eval `register-python-argcomplete --no-defaults --shell tcsh exegol` - - .. tab:: PowerShell - - To activate completions for PowerShell, first generate completion file : - - .. code-block:: powershell - - register-python-argcomplete --no-defaults --shell powershell exegol > $HOME\Documents\WindowsPowerShell\exegol_completion.psm1 - - .. warning:: - - If the command ``register-python-argcomplete`` is not found, that means that python pip script are not in your PATH. - You can ty to fix your pip installation: `Linux `__ | `MacOS `__ | `Windows `__ - Or find the direct Python script path, it might be something like: ``$HOME\AppData\Roaming\Python\Python311\Scripts\register-python-argcomplete`` (``Python311`` PATH depends on the version of Python you have installed, it must be updated to match your local setup). - - Then import this completion file in `$PROFILE`: - - .. code-block:: powershell - - echo "Import-Module '$HOME\Documents\WindowsPowerShell\exegol_completion.psm1'" >> $PROFILE - - .. tip:: - - You can have Zsh style completion in PowerShell using this: - - .. code-block:: powershell - - echo "Set-PSReadlineKeyHandler -Key Tab -Function MenuComplete" >> $PROFILE diff --git a/source/getting-started/tips-and-tricks.rst b/source/getting-started/tips-and-tricks.rst deleted file mode 100644 index 17c680b7..00000000 --- a/source/getting-started/tips-and-tricks.rst +++ /dev/null @@ -1,143 +0,0 @@ -============= -Tips & tricks -============= - -Below are some of the tips and tricks that are good to keep in mind when using Exegol. - -.. contents:: - :local: - -Change a container's time -~~~~~~~~~~~~~~~~~~~~~~~~~ - -Changing a container's time with ``date`` requires elevated permissions on the container, and messes up with the host's time. -There is however and alternative, using ``faketime`` (see `faketime ubuntu manpage `_) that allows to change the time of the container easily, without needing particular permissions, without affecting the host. This is especially useful when working with Kerberos targets that are out of sync. - -Faketime manipulates the system time for a given child command. For example with ``zsh``, a new shell is opened with a spoofed time that will only be spoofed for this extact shell session and commands executed in it. - -.. code-block:: bash - - faketime 'YYYY-MM-DD hh:mm:ss' zsh - -The following examples automate the synchronization of a remote domain controller's clock to initiate a corresponding zsh session. - -.. code-block:: bash - - faketime "$(rdate -n $DC_IP -p | awk '{print $2, $3, $4}' | date -f - "+%Y-%m-%d %H:%M:%S")" zsh - -.. code-block:: bash - - faketime "$(date +'%Y-%m-%d') $(net time -S $DC_IP | awk '{print $4}')" - -.. note:: - - Here is an example of how ``faketime`` can be used. - - When doing Active Directory attacks against Kerberos targets, a clock skew error could be raised such as ``KRB_AP_ERR_SKEW``. This means the authenticating machine (operator) and the destination (Key Distribution Center, a.k.a. KDC) are not in sync, clock-wise. - - Running any `Impacket `_ with the ``-debug`` flag will print the server time. The operator can then use ``faketime`` to open a new ``zsh`` shell with the right time and timezone and conduct the scenario as previously intended. - - The following command can be used to print the time in UTC format and compare it with the server time: ``date --utc``. - - *Note: careful with the timezones. If they differ between the operator and the KDC, the delta needs to be taken into account* - -Share files or notes with targets and collaborators -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -The following tools or commands can be used to pop a temporary file or http server: ``updog``, ``goshs``, ``http-server``, ``http-put-server``, ``ftp-server``, ``smbserver.py``. - -In order to **shares notes** during an engagement, ``trilium`` (https://github.com/zadam/trilium) can be used. - -Dynamic history commands -~~~~~~~~~~~~~~~~~~~~~~~~ - -Many commands in the pre-filled history rely on environment variables such as ``$DOMAIN``, ``$USER``, ``$PASSWORD``, etc. -Those variables can be set manually or by using the ``profile.sh`` file in ``/opt/tools/Exegol-history/``. -The proper lines can be filled and uncommented, and then the shell can be reloaded with ``exec zsh`` in order to apply the changes. -This allows users to easily look for, and use, commands in the history, without changing the values every time. - -The best reverse shells -~~~~~~~~~~~~~~~~~~~~~~~ - -* ``shellerator`` can be used to generate a reverse shell command dynamically -* on the attacker's side, a reverse shell obtained through a ``netcat`` tunnel can be improved (see `ropnop.com `_ or `0xffsec.com `_) -* simple alternative way to have an upgrade netcat reverse shell: use ``rlwrap `` -* instead of using ``netcat`` and "upgrade" the shell manually, ``pwncat-cs`` (`calebstewart/pwncat `_) can be used to obtain an even better reverse shell experience (especially with UNIX-like targets). - -Keyboard shortcuts -~~~~~~~~~~~~~~~~~~ - -* ``ctrl+q``: when writing a command, let's say a user misses an information (e.g. IP address). The shortcut can be used to save the half-typed command, look for the value, and then finish the command. The user doesn't have to cancel the command, look for the info, and write the command all over again. This is known as the ``push-line`` feature (see `sgeb.io `_). -* ``ctrl + r``: look for something in the history -* ``ctrl + t``: look for a file or directory with a fuzzy finder -* ``ctrl + a``: move to the beginning of the line -* ``ctrl + e``: move to the end of the line -* ``ctrl + ←``: move one word backward -* ``ctrl + →``: move one word forward -* ``ctrl + l``: clear the screen - - -Useful aliases -~~~~~~~~~~~~~~ - - -.. tip:: - - To see every alias in your exegol image, run the command: - - .. code-block:: - - alias - -.. tip:: - - You can see the complete command configured for an alias with the command: - - .. code-block:: - - alias - -.. warning:: - - Some aliases are not available before image ``3.1.5``. - -Here's a list of useful aliases designed to save you time: - -Network related ---------------- - -* ``ipa``: List network interfaces in short and colorful way -* ``ipr``: List network routes in short and colorful way -* ``pc``: Shortcut to ``proxychains`` -* ``ncvz``: Shortcut to test an open TCP port - -Shell ------ - -* ``ws``: Shortcut to ``cd /workspace`` -* ``_``: Shortcut to ``sudo`` -* ``xcopy``: Copy a file to clipboard -* ``xpaste``: Create a file from clipboard -* ``xshow``: Print clipboard -* ``sed-empty-line``: Removes empty lines -* ``sed-comment-line``: Removes commented lines -* ``history-dump``: Export full history of commands with **date and time** of execution - - -Quick service -------------- - -* ``http-put-server``: Python web server ``put`` capable -* ``http-server``: Shortcut to classic Python web server -* ``php-server``: Server a PHP webserver on current directory using port 8080 - - -Tools optimization ------------------- - -* ``hcat``: Automatic hashcat format solver with fuzzy finder wordlist -* ``hjohn``: Automatic john the ripper format solver with fuzzy finder wordlist -* ``scan-range``: Nmap shortcut to find host in a specified network range -* ``nse``: Find nmap NSE script -* ``urlencode``: Encodes arguments in URL format -* ``urldecode``: Decodes arguments from URL format diff --git a/source/getting-started/troubleshooting.rst b/source/getting-started/troubleshooting.rst deleted file mode 100644 index debc633b..00000000 --- a/source/getting-started/troubleshooting.rst +++ /dev/null @@ -1,208 +0,0 @@ -=============== -Troubleshooting -=============== - -Here are the most common problems encountered when installing and using Exegol. - -.. contents:: - :local: - -Unable to connect to Docker -=========================== - -There are multiple checks to do to make sure Docker works properly. - -.. tabs:: - - .. tab:: Docker service - - The Docker service must installed up and running. - - - For Windows users: Docker Desktop for Windows must be up and running. - - For macOS users: Docker Desktop for Mac (or `OrbStack `_) must be up and running. - - .. tab:: Docker permissions - - Make sure the Docker permissions are consistent with the Exegol permissions. - For instance, if you need ``sudo`` rights to use Docker, you'll most likely need ``sudo`` to run Exegol smoothly. - - See :ref:`the Exegol install guidance` to use exegol correctly with sudo. - - .. tab:: Docker socket - - The following command can be used to see the docker socket that is used by default: ``docker context ls``. - - * For `OrbStack `_ users (on macOS), the "orb socket" must be used. - * For Docker Desktop users (macOS/Windows), the "Docker desktop socket" must be used. - * For Linux users, the default socket should work. - - Switching context can be done with ``docker context use ``. - For instance, switching from a Docker Desktop to OrbStack could be done with ``docker context use orbstack``. - - .. tab:: Symbolic link - - The following symbolic link must exist ``/var/run/docker.sock`` and point to the correct socket. Below is an example of what it should look like. - - .. code-block:: - - (Host) ~ $ ls -la /var/run/docker.sock - lrwxr-xr-x 1 root daemon 38 Jul 28 09:02 /var/run/docker.sock -> /Users/someuser/.orbstack/run/docker.sock - - If the link does not exist, it could be created with the following command ``ln -sf /Users/someuser/.orbstack/run/docker.sock /var/run/docker.sock``. This is an example for `OrbStack `_. The command must be adapted to the user's context. - -How do I get X11 to work on a non-Linux host? -============================================= - -X11, or X Window System, is a graphical windowing system that provides a framework for creating and managing graphical user interfaces (GUIs) in Unix-like operating systems. - -X11 sharing between an Exegol container and a host allows a graphical application running within the container to display its GUI on the host's X11 server. This means you can run graphical applications in Exegol containers and have them appear as if they were running directly on the host machine. It enables the execution of GUI-based applications in isolated containers while interacting with them through the host's graphical interface. - -For macOS users, XQuartz is needed. It's listed in the :ref:`install requirements `. - -.. note:: - - Exegol's wrapper automatically starts XQuartz on macOS hosts when needed. But if for some reason it gets manually closed by the users while a container is running, X11 sharing will not work. Restarting the container with ``exegol restart `` will restart XQuartz automatically if needed. - -How to fix ``Docker download error: unauthorized: authentication required`` -=========================================================================== - -Docker image downloads may be time-sensitive. In the case of dual-boot systems, it is common to experience time lags of a few hours. - -To correct the problem, check that your computer's date and time are correct. - -How to fix ``Docker download error: no space left on device`` -============================================================= - -``Docker Desktop`` is a tool used for running Docker containers on ``Windows`` and ``macOS``. However, it uses a ``virtual disk`` to store Docker images, containers, and volumes. The virtual disk used by Docker Desktop is not dynamic; it has a fixed size, which by default is set to ``64GB``. - -.. image:: /assets/troubleshooting/dd_default_disk_size.png - :align: center - :alt: Docker Desktop default disk size - -.. raw:: html - -
- -Exegol images can be quite large, with some reaching over ``50GB``. This can quickly exceed the available virtual disk space, even if your physical disk still has free space. To resolve this issue, you need to allocate more space to the Docker Desktop virtual disk. - -To increase the ``virtual disk size``, open Docker Desktop and go to ``Settings -> Resources -> Advanced``. Locate the ``Virtual disk limit`` option and increase the allocated size. Make sure to choose a value that provides enough space for your images and containers, such as ``128GB`` or more depending on your needs. - -Apply the changes and then ``restart`` Docker Desktop to ensure the new configuration takes effect. - -.. warning:: - - If you decide to ``reduce the size of the virtual disk``, be aware that Docker Desktop will completely ``delete the virtual disk image``. This action will remove all Docker images, containers, and volumes stored on the disk. Therefore, before reducing the disk size, make sure to back up any important data or export your Docker images to avoid data loss. - - .. image:: /assets/troubleshooting/dd_shrink.png - :align: center - :alt: Docker Desktop shrink disk image - - -How to fix CRLF errors on Windows -================================= - -If you have cloned the Exegol repository on Windows, you may encounter errors when launching your container, for example: - -.. code-block:: - - /.exegol/entrypoint.sh: line 3: trap: SIGTERM - : invalid signal specification - /.exegol/entrypoint.sh: line 4: $'\r': command not found - /.exegol/entrypoint.sh: line 5: syntax error near unexpected token $'{\r'' - /.exegol/entrypoint.sh: line 5: function exegol_init() { - -This is caused by the automatic addition of CRLF linefeed by Windows to ensure compatibility. -To correct this problem, simply disable this feature on the Exegol repository and reload the file of the repository: - -.. code-block:: bash - - cd ./Exegol - git config core.autocrlf false - git rm -rf --cached . - git reset --hard HEAD - -How to fix the error ``This environment is externally managed`` -=============================================================== -When installing exegol with ``python3 -m pip install exegol`` on modern operating systems (Ubuntu 23.04 and higher, Debian 12 and higher, macOS 14+), you may encounter the following error: - -.. code-block:: - - This environment is externally managed - To install Python packages system-wide, try apt install - python3-xyz, where xyz is the package you are trying to - install. - - If you wish to install a non-Debian-packaged Python package, - create a virtual environment using python3 -m venv path/to/venv. - Then use path/to/venv/bin/python and path/to/venv/bin/pip. Make - sure you have python3-full installed. - - If you wish to install a non-Debian packaged Python application, - it may be easiest to use pipx install xyz, which will manage a - virtual environment for you. Make sure you have pipx installed. - - See /usr/share/doc/python3.11/README.venv for more information. - - hint: See PEP 668 for the detailed specification. - -As the error message suggests, this error occurs when you try to install Python packages system-wide. -To resolve this issue, you have two options : - -.. tabs:: - - .. tab:: Recommended Methods - - **Using pipx (Preferred)** - - The recommended way to install Exegol is using ``pipx``, which automatically handles virtual environment creation: - - .. code-block:: bash - - pipx install exegol - - **Manual Virtual Environment** - - Alternatively, you can create and manage a virtual environment manually: - - .. code-block:: bash - - python3 -m venv path/to/venv - source path/to/venv/bin/activate - python3 -m pip install exegol - - .. tab:: Other Methods - - .. warning:: - - The following methods are not recommended as they can lead to conflicts with system packages. - - **User Site Installation** - - Install in the user site directory: - - .. code-block:: bash - - python3 -m pip install --user exegol - - **System-wide Installation** - - Override system restrictions (not recommended): - - .. code-block:: bash - - python3 -m pip install exegol --break-system-site-packages - -Arsenal needs TIOCSTI enable for running -======================================== - -The arsenal tool needs the ``TIOCSTI`` functionality enabled. A GitHub issue exists to request an evolution: https://github.com/Orange-Cyberdefense/arsenal/issues/77. - -This feature cannot be enabled only in exegol containers (docker limitation), it must be configured in the host with the following command: - -.. code-block:: - - # For the current session - sudo sysctl -w dev.tty.legacy_tiocsti=1 - - # Persistent configuration (as root) - echo "dev.tty.legacy_tiocsti=1" >> /etc/sysctl.conf diff --git a/source/getting-started/updates.rst b/source/getting-started/updates.rst deleted file mode 100644 index d1d461b0..00000000 --- a/source/getting-started/updates.rst +++ /dev/null @@ -1,13 +0,0 @@ -Updates -======= - -The whole Exegol can be updated through its own wrapper with ``exegol update`` (documentation -:doc:`here `). - -.. hint:: - - Wrappers installed with pip don't support auto-update. The wrapper itself can then can be updated as follows. - - .. code-block:: bash - - python3 -m pip install --upgrade exegol diff --git a/source/index.rst b/source/index.rst deleted file mode 100644 index a75bd77d..00000000 --- a/source/index.rst +++ /dev/null @@ -1,152 +0,0 @@ -.. Exegol documentation master index file - -Exegol: professional hacking setup -================================== - -.. raw:: html - -
- exegol logo -

- pip package version - Python3.7 - latest commit on master -

- latest commit on master - latest commit on dev -

- current version - current version - current version -
- amd64 - arm64 -

- Twitter Shutdown - Twitter Dramelac -
- - Black Hat Europe 2022 - - - Black Hat Asia 2023 - - - Black Hat USA 2023 - -

- Join us on Discord -

-
- -Exegol is a community-driven hacking environment, powerful and yet simple enough to be used by anyone in day to day engagements. Exegol is the best solution to deploy powerful hacking environments securely, easily, professionally. No more unstable, not-so-security-focused systems lacking major offensive tools. Kali Linux (and similar alternatives) are great toolboxes for learners, students and junior pentesters. But professionals have different needs, and their context require a whole new design. - -.. image:: /assets/flawed_designs.png - :align: center - :alt: No more kali, parrot, blackarch - -Exegol fits pentesters, CTF players, bug bounty hunters, researchers, beginners and advanced users, defenders, from stylish macOS users and corporate Windows pros to UNIX-like power users. - -.. warning:: - - This documentation is a work in progress. We are actively writing it, but if there are things you'd like to be documented in priority, feel free to request in on the `GitHub Repo `_ or in the `Discord server `_. - -The Exegol project ------------------- - -.. image:: /assets/overviews_techs.png - :align: center - :alt: Structure overview - - -Exegol is many things in one. Try it, and you'll stop using your old, unstable and risky environment, no more monolithic system that gets messier, buggier and more at risk with time. - -* :doc:`Python wrapper `: makes everyone's life easier. This entrypoint to the whole Exegol project handles all docker and git operations so you don't have to. **Now's the time to have a clean environment** with one Docker container per engagement without the effort. Exegol handles multiple images and multiple containers. GUI apps, Wi-Fi, USB accessories, volume mounting and many more features are supported and easier to use than ever. -* :doc:`Docker images `: a set of pre-built docker images and dockerfiles that include a neat choice of tools, zsh plugins for power users, pre-filled history ready to use with environment variables, awesome resources, custom configs and many more. Images can either be built locally or pulled from the official Dockerhub registry. -* :doc:`Offline resources `: Tired of always having to search github for your favorite privesc enumeration script? Exegol includes a set of resources, shared with all exegol containers and your host, including LinPEAS, WinPEAS, LinEnum, PrivescCheck, SysinternalsSuite, mimikatz, Rubeus, PowerSploit and many more. - - -.. image:: /assets/overviews_structure.png - :align: center - :alt: Structure overview - - - -Getting started ---------------- - -Wanna try Exegol and join our great community? You need to :ref:`install requirements ` first, then proceed to the OS-specific instructions: :ref:`Linux` | :ref:`macOS` | :ref:`Windows` - -Community ---------- - -Have a bug report or feature request? Either open an issue on the `Exegol repo`_ or open a ticket on the `Exegol discord`_ (preferred, easier, more flexible). - -Wanna chat? Need help? Join us on the `Exegol discord`_! - -.. _Exegol repo: https://github.com/ThePorgs/Exegol -.. _Exegol discord: https://discord.gg/cXThyp7D6P - -.. toctree:: - :maxdepth: 2 - :hidden: - :caption: Getting started - - getting-started/install.rst - getting-started/troubleshooting.rst - getting-started/updates.rst - getting-started/faq.rst - getting-started/tips-and-tricks.rst - -.. toctree:: - :maxdepth: 2 - :hidden: - :caption: The Exegol Project - - the-exegol-project/python-wrapper.rst - the-exegol-project/docker-images.rst - the-exegol-project/offline-resources.rst - -.. toctree:: - :maxdepth: 2 - :hidden: - :caption: Exegol wrapper - - exegol-wrapper/install.rst - exegol-wrapper/start.rst - exegol-wrapper/info.rst - exegol-wrapper/exec.rst - exegol-wrapper/update.rst - exegol-wrapper/stop.rst - exegol-wrapper/restart.rst - exegol-wrapper/remove.rst - exegol-wrapper/uninstall.rst - exegol-wrapper/version.rst - exegol-wrapper/advanced-uses.rst - -.. toctree:: - :maxdepth: 2 - :hidden: - :caption: Exegol image - - exegol-image/tools.rst - exegol-image/my-resources.rst - exegol-image/credentials.rst - exegol-image/services.rst - -.. toctree:: - :maxdepth: 2 - :hidden: - :caption: Exegol resources - - exegol-resources/resources.rst - -.. toctree:: - :maxdepth: 2 - :hidden: - :caption: Community - - community/users.rst - community/contributors.rst - community/maintainers.rst - community/sponsors.rst diff --git a/source/the-exegol-project/docker-images.rst b/source/the-exegol-project/docker-images.rst deleted file mode 100644 index 9624a905..00000000 --- a/source/the-exegol-project/docker-images.rst +++ /dev/null @@ -1,25 +0,0 @@ -Docker images -============= - -The Docker images are the heart of the Exegol project. A neat choice of tools, configurations, aliases, history commands, and various customizations are prepared in multiple images adapted for multiple uses: web hacking, Active Directory, OSINT (Open Source INTelligence), etc. - -All images are available on `the official Dockerhub registry `_. This allows to offer pre-built, compressed images, so that users don't have to build their own image, but users that choose to do so can. Pulling pre-built images, or building one, can be done with ``exegol install`` (documentation -:doc:`here `). - -============= ===================================================================================================== - Image name Description -============= ===================================================================================================== - full Includes all the tools supported by Exegol (warning: this is the heaviest image) - ad Includes tools for Active Directory / internal pentesting only. - web Includes tools for Web pentesting only. - light Includes the lightest and most used tools for various purposes. - osint Includes tools for OSINT. - nightly **(for developers and advanced users)** contains the latest updates. This image can be **unstable**! -============= ===================================================================================================== - -.. note:: - - Exegol uses Docker images and containers. Understanding the difference is essential to understand Exegol. - - * **image**: think of it as an immutable template. They cannot be executed as-is and serve as input for containers. It's not possible to open a shell in an image. - * **container**: a container rests upon an image. A container is created for a certain image at a certain time. It's possible to open a shell in a container. Careful though, once a container is created, updating the image it was created upon won't have any impact on the container. In order to enjoy the new things, a new container must be created upon that updated image. diff --git a/source/the-exegol-project/offline-resources.rst b/source/the-exegol-project/offline-resources.rst deleted file mode 100644 index 718c4e66..00000000 --- a/source/the-exegol-project/offline-resources.rst +++ /dev/null @@ -1,7 +0,0 @@ -Offline resources -================= - -Exegol's "offline resources" are a neat choice of standalone tools and scripts that are often used during penetration tests, -CTFs and red-teams, like LinPEAS, WinPEAS, LinEnum, PrivescCheck, SysinternalsSuite, mimikatz, Rubeus, PowerSploit and many more. -Exegol users don't have to download those resources again every time they're needed anymore. -Everything is managed by the wrapper and they are shared with every container (at ``/opt/resources``). diff --git a/source/the-exegol-project/python-wrapper.rst b/source/the-exegol-project/python-wrapper.rst deleted file mode 100644 index f3f3d4f9..00000000 --- a/source/the-exegol-project/python-wrapper.rst +++ /dev/null @@ -1,526 +0,0 @@ -============== -Python Wrapper -============== - -The Exegol project regroups many things (docker images, offline resources, custom configurations, aliases, history commands, multi-architecture support and many others). In order to make all the tech involved easy to use, and provide some unique entrypoint to the whole setup, a Python wrapper was created. - -The Python wrapper handles all Docker and Git operations, can manage multiple images and containers at once and give the user the best experience possible, suited for beginners as well as advanced people. - -The wrapper knows multiple actions. - -* Install an image : ``exegol install`` -* Create/start/enter a container : ``exegol start`` -* Show info on containers and images : ``exegol info`` -* Stop a container : ``exegol stop`` -* Remove a container : ``exegol remove`` -* Uninstall an image : ``exegol uninstall`` -* Get help and advanced usage : ``exegol --help`` -* Help and examples can be obtained for each action directly from the wrapper with the following command: ``exegol -h`` (action: ``install``/``start``/``stop``/etc.). - -All actions are documented in the **exegol-wrapper** part of this doc (e.g. :doc:`info `, :doc:`start `, :doc:`version `, ...) - -Below is a, non-exhaustive, list of what the wrapper supports: - -=================================================== ============= - Feature Description -=================================================== ============= -:ref:`Display sharing` Sharing of the graphic environment between the container and the host -:ref:`Desktop` Hosts a complete graphics environment available via a web page or VNC -:ref:`Workspace` Persistent and shared workspace with the host -:ref:`Update-fs` Permission sharing between the container and the host -:ref:`OpenVPN connection` Opening an isolated VPN tunnel dedicated to the exegol container -:ref:`Shell logging` Recording of sessions (input and output) in log files with date and time -:ref:`Shared network` Sharing the host's network interfaces -:ref:`Shared timezones` Sharing the host's timezone configuration -:ref:`Exegol-resources` Easy access to a collection of resources and tools -:ref:`My-resources` User space dedicated to customization -:ref:`Volume sharing` Support for specific volume addition -:ref:`Port sharing` Support for port publishing -:ref:`Env. variables` Support for environment variable configuration -:ref:`Device sharing` Support for hardware sharing -:ref:`Custom hostname` Support for customizing a specific container hostname -:ref:`Comments` User can add any text comments to the container -:ref:`Capabilities` Support for adding specific capabilities -:ref:`Privileged` Support of the privileged mode -:ref:`Multi-architecture` Support for AMD64 and ARM64 architectures -:ref:`Local image` Customized local image building -:ref:`Remote image` Pre-built image available for download -:ref:`Command execution` Execution of specific command -:ref:`Daemon execution` Support of the command execution in the background -:ref:`Temporary containers` Support for command execution in a dedicated and temporary environment -=================================================== ============= - -.. note:: - - Exegol uses Docker images and containers. Understanding the difference is essential to understand Exegol. - - * **image**: think of it as an immutable template. They cannot be executed as-is and serve as input for containers. It's not possible to open a shell in an image. - * **container**: a container rests upon an image. A container is created for a certain image at a certain time. It's possible to open a shell in a container. Careful though, once a container is created, updating the image it was created upon won't have any impact on the container. In order to enjoy the new things, a new container must be created upon that updated image. - -Features -======== - -The Exegol wrapper has many features to automatically and transparently manage different configurations to facilitate the use and creation of docker containers. - -.. _feature_x11_sharing: - -X11 sharing (GUI) ------------------ - -By default exegol configures the new container and host to allow the execution to the display of graphical window launched from an exegol container. This is achieved through X11 sharing. - -For example, if bloodhound is launched in an exegol container, the graphical window (GUI) will be displayed in the user's graphic environment. - -This feature can be disabled manually with the option ``--disable-X11`` of the :ref:`start action `. - -.. _feature_desktop: - -Desktop -------- - -.. image:: /assets/desktop.png - :align: center - :alt: Exegol Desktop Overview - -On some systems, it may be difficult to have or share an X11 environment. Some users prefer to have a full graphical desktop environment rather than just graphical applications. - -To meet this need, Exegol is able to host a complete graphical environment within its container since version ``4.3.0`` of the wrapper and ``3.1.2`` of the images. - -This environment can then be made available to others in a variety of ways. The default protocol is currently **HTTP**, but the user can change the configuration to use the **VNC** alternative. - -This feature can be enabled manually with the option ``--desktop`` of the :ref:`start action `. - -.. tip:: - - The default behavior and configuration of the desktop mode can be changed in the :ref:`configuration of Exegol`. - -Desktop access is protected by **PAM authentication**. To log in, it is essential to retrieve the login credentials and the **URL** where the desktop is accessible. -These details can be obtained from the container's information, either at the time of container launch or by using the following command : - -.. code-block:: bash - - exegol info CONTAINER_NAME - -.. code-block:: bash - - ⭐ Container summary - ┌──────────────────┬───────────────────────────────────────┐ - │ Name │ gui │ - │ Image │ nightly - v.9060fa56 (Up to date) │ - ├──────────────────┼───────────────────────────────────────┤ - │ Credentials │ root : iozLHIjJFxoOLTTaNymO50uKT2RlvI │ - │ Remote Desktop │ http://localhost:58089 │ - │ Console GUI │ On ✔ (X11) │ - │ Network │ host │ - │ Timezone │ Off 🪓 │ - │ Exegol resources │ On ✔ (/opt/resources) │ - │ My resources │ On ✔ (/opt/my-resources) │ - │ Shell logging │ Off 🪓 │ - │ Privileged │ Off ✔ │ - │ Workspace │ Dedicated (/workspace) │ - └──────────────────┴───────────────────────────────────────┘ - -.. _feature_workspace: - -Workspace ---------- - -Exegol always creates within a container a **persistent** workspace (even after deleting the container) and **shared** with the host. - -By default a folder will be created on the host and shared with the container. This folder will be created in ``~/.exegol/workspaces/`` with the name of the exegol container. - -.. tip:: - The default location of workspace volumes can be changed in the :ref:`configuration of Exegol`. - -The user can also create an Exegol container with an **existing custom workspace folder** (with already existing data) regardless of its location in the file system. - -See the options ``-w WORKSPACE_PATH`` and ``-cwd`` of the :ref:`start action ` for more details. - -.. _feature_update_fs: - -Update-fs -~~~~~~~~~ - -The root user is used by default in Exegol containers which poses problems of permissions when accessing the project documents from the host. -To remedy this without compromising, a **shared permission system** exists allowing the host user to have read and write access to files created from the container. - -This system is **automatically activated** when a **new** default workspace is created. - - -.. warning:: - When the user uses an existing custom folder as workspace, this system is **disabled** by default! This feature can be **enabled by default** by changing the :ref:`configuration of Exegol`. - - Its activation is possible manually (see the option ``--update-fs`` of the :ref:`start action `) but it will lead to the **modification** of the folder and its sub-folders **permissions** (as ``g+rws``). - - If the user does not have the rights to perform such an operation, a **sudo command** will be proposed to the user that he will have to **execute manually** to apply the necessary permissions for the proper functioning of the functionality (as ``chgrp`` + ``g+rws``). - -.. tip:: - When the default configuration of this feature is changed and the update will be **enabled by default**, the option ``--update-fs`` can still be used to manually **disable** the feature in specific cases. - -.. _feature_ovpn: - -OpenVPN connection ------------------- - -Exegol supports OpenVPN tunnel configuration to **automatically** establish a VPN tunnel at container **startup**. - -Exegol supports **certificate authentication** but also **user/password authentication** through an authentication file (to allow non-interactive and transparent authentication) with an additinal parameter. - -When preparing your VPN configuration file: - -- All files (CA, user cert, user Key, etc) should preferably be included in a single ``.ovpn`` file, otherwise a dedicated folder must be prepared (cf. next tip) - -.. tip:: - - A folder can also be used in the case of a **multi-file configuration** (with **relative** paths!) and the configuration file must have the ``.ovpn`` extension (Only **one** .ovpn file will be loaded by exegol). - For example, the directory structure: - - .. code-block:: - - . my_vpn/ - |- configuration.ovpn => This file contains the OpenVPN configuration with relative path to the various external files - |- root_ca.pem => Certificat Authority file referenced as `./root_ca.pem` in configuration.ovpn - |- my_user.crt => User's personal certificate file referenced as `./my_user.crt` in configuration.ovpn - |- my_user.key => User's personal key file referenced as `./my_user.key` in configuration.ovpn (password protected file are not supported for non-interactive logon) - - And the exegol wrapper command: - .. code-block:: - - exegol start --vpn ./my_vpn - -- If you're using a login / password authentication, prepare an **auth file** to enable passive authentification with Exegol (See the option ``--vpn-auth VPN_AUTH``) -- Password protected certificate keys are **not supported** for passive authentification -- Once the container is created, you **cannot move or rename** your VPN configuration file -- If you want to **update your VPN configuration**, you can update the same ``.ovpn`` file on your host and restart the container with ``exegol restart`` -- If you want your Exegol container to automatically update its **DNS** configuration according to the **VPN server** settings, add this configuration to your ``.ovpn`` file: - -.. code-block:: - - script-security 2 - up /etc/openvpn/update-resolv-conf - down /etc/openvpn/update-resolv-conf" - - -See the options ``--vpn VPN`` and ``--vpn-auth VPN_AUTH`` of the :ref:`start action ` for more details. - -.. tip:: - In the case of a problem, to troubleshoot a VPN connection, OpenVPN logs can be retrieved within the container in the file ``/var/log/exegol/vpn.log``. - -.. tip:: - If you want to create a container that is able to start **VPN manually**, you can create your container with the following parameters: - - ``exegol start -d /dev/net/tun --cap NET_ADMIN`` - -.. _feature_shell_logging: - -Shell logging -------------- - -Within the framework of a mission, it is necessary to **log all actions** performed during a pentest, red team etc. -To meet this need, Exegol has a feature to **automatically record everything** that is displayed (stdout / stderr) but also all entries (stdin). - -See the option ``--log`` of the :ref:`start action ` to enable the feature. - -.. hint:: - When the option is enabled upon **creation** of a new container, all shells created for this container **will be automatically logged**. - - If the container was created **without** this option, the shells can still be logged **individually** by adding the option in the **start** command of **each** shell. - -The date and time of each command is displayed thanks to the PS1 of ``zsh``. - -The logs are automatically saved in the ``/workspace/logs`` folder. Each log file is **automatically compressed** with ``gzip`` at the end of the session to optimize disk space. -The automatic compression of log files can be **disabled** manually with the :ref:`start action ` ``--log-compress`` parameter or change the default behavior in the :ref:`Exegol configuration file `. - -.. hint:: - When the default configuration of the log compression is changed from the config file and the feature will be **disabled by default**, the option ``--log-compress`` can still be used to manually **enable** the feature in specific cases. - -.. warning:: - The logs should **NOT** be consulted from the exegol container but **from the host** to avoid loops and duplication of data in the logs. - -There are (since exegol images version ``3.0.0``) different methods of shell logging. -The shell logging method can be selected manually with the :ref:`start action ` ``--log-method`` parameter or by default in the :ref:`configuration file of Exegol `. - -.. tabs:: - - .. tab:: asciinema (default) - - The shell logging method **asciinema** is available from exegol images version ``3.0.0``. - This new mode allows to consult sessions in **video** format taking into account the interactive environment. - It is also possible to **manually upload** and **share** recordings, useful for **demonstrations** for example - - Here is a quick demonstration: - - .. raw:: html - -
- -
- - .. tip:: - Logs in ``.gz`` format can be replay directly **without unpacking** them with the command: ``gunzip -c | asciinema play -`` - - .. hint:: - To display the whole session **without** the "video" mode, it is possible to use the command: ``asciinema cat `` - - .. warning:: - Major disadvantage of this method, to view the logs from your host, you must **install** ``asciinema`` on your **host** machine to replay or share your records. - - .. tip:: - When you share or play an ``asciinema`` video, you can **copy** and **paste** any command/text it contains. - - .. tab:: script - **script** is the "classic" method of session logging, it was also the only option available before version ``3.0.0`` of exegol images. - This method simply records **all** incoming (stdin) and outgoing (stdout/stderr) shell actions in a file. - - .. tip:: - Logs in ``.gz`` format can be viewed directly **without unpacking** them with the ``zcat``, ``zgrep``, ``zdiff`` or ``zmore`` command! - - .. warning:: - Shell logging saves **EVERYTHING** including keyboard shortcuts, display refreshes, etc. - - Complex graphical environments (such as tmux) can make it difficult to read the logs. - - -.. _feature_shared_network: - -Shared network --------------- - -By default, containers created by Exegol are in ``host`` mode which means that the **network interfaces** of the host are **shared** with the container. - -This configuration is useful to: - -* dynamically open ports and services -* have a low level access on a physical network (some operation might need privileged mode) -* share a unique ip address on the target network -* share a MAC address on the target network (to be considered as a single physical machine) - -This mode can be disabled with the option ``--disable-shared-network`` of the :ref:`start action ` to create a dedicated and isolated network instead. - -.. tip:: - When host network sharing is disabled, ports can be to expose services on the host machine's networks. - -.. warning:: - This mode is only available on **Linux** installations! - Windows and MacOS installations are subject to the constraints and limitations of `Docker Desktop `__ . - - You can still use the port :ref:`publishing feature ` instead. - -.. _feature_shared_tz: - -Shared timezones ----------------- - -For convenience and precision in the date and time of the logs of each command, exegol allows to share the timezone of the host in the container. - -This feature is active by default and can be disabled with the option ``--disable-shared-timezones`` of the :ref:`start action `. - -.. _feature_exegol_resources: - -Exegol-resources ----------------- - -To save time and have at hand many tools, scripts and other resources, exegol maintains a repository :ref:`exegol-resources ` contains many updated tools that are available to the host and exegol containers. - -This module is not mandatory and can be downloaded later. - -.. hint:: - If an antivirus is present on your host, be careful to exclude the destination folder of the ``exegol-resources`` module before downloading it. - -This feature is active and shared by default and can be disabled with the option ``--disable-exegol-resources`` of the :ref:`start action `. - -.. _feature_my_resources: - -My-resources ------------- - -The my-resources feature is a space dedicated to the user and shared with all the containers. This space allows to store configurations and to install personal tools. - -More details on the functionality of the wrapper :ref:`here ` and how to take advantage of the customization system :doc:`here `. - -.. _feature_volume_sharing: - -Volume sharing --------------- - -For specific needs, the exegol wrapper allows to add additional custom volumes (type bind mounts) when creating an exegol container. - -See the option ``--volume VOLUMES`` of the :ref:`action start ` for more details. - -.. _feature_port_sharing: - -Port sharing ------------- - -When the host network is not shared, it is still possible to **publish** specific ports to expose **services** or **port** ranges. - -.. hint:: - This configuration is **compatible** even with installations based on Docker Desktop. - -This feature allows the user to select: - -* a specific network interface (for example 127.0.0.1) or by default all interfaces (0.0.0.0). -* the port to open on the host interface. -* the destination port to be linked in the container. -* the protocol to use, docker supports ``TCP``, ``UDP`` and ``SCTP`` protocols (default is TCP). - -See the option ``--port PORTS`` of the :ref:`start action ` for more details. - -.. _feature_env: - -Env. variables --------------- - -Exegol can configure custom environment variables defined by the user. - -When the environment variables are defined at the first time of the container creation, these variables will be: - -* accessible in the container by all processes -* present during the whole lifetime of the container - -The environment variables can be defined when opening a shell in an **existing** container and will be available **only** in the user's shell until it is closed. - -See the option ``--env ENVS`` of the :ref:`start action ` for more details. - -.. _feature_device_sharing: - -Device sharing --------------- - -For the needs of some applications running on physical hardware (such as proxmark3), exegol can supply the container with one or more physical devices. - -See the option ``--device DEVICES`` of the :ref:`start action ` for more details. - -.. warning:: - This feature is only available on **Linux** installations! - - Windows and MacOS installations are subject to the constraints and limitations of `Docker Desktop `__. - -.. warning:: - Docker only load shared device at container **startup**. If you have to unplug / plug again your device it might **no longer works** until you **restart** the container with ``exegol restart ``. - - This bug occurs even if the ``/dev/ttyACM0`` device is still present in your container. - -.. _feature_hostname: - -Custom hostname ---------------- - -In some environments with OPSEC requirements, it may be necessary to change the hostname of your exegol container. - -See the option ``--hostname HOSTNAME`` of the :ref:`start action ` for more details. - -.. _feature_comment: - -Comments --------- - -To add more context information about an exegol container, it is possible to add **comments** to each Exegol container. -The comment of an exegol container can be displayed with the command ``exegol info `` - -See the option ``--comment COMMENT`` of the :ref:`start action ` for more details. - -.. _feature_capabilities: - -Capabilities ------------- - -Exegol supports adding **Linux capabilities** to the Exegol **container** to perform tasks that require **administrative** rights **without** allowing everything. - -This feature gives control to the user to configure his container but giving administrator rights remains a dangerous practice and should be used by experienced users only. - -For more details on the capabilities supported by docker `check here `_. - -.. warning:: - Not all Linux capabilities are allowed by the Exegol wrapper, here is the list of available capabilities: - - NET_ADMIN, NET_BROADCAST, SYS_MODULE, SYS_PTRACE, SYS_RAWIO, SYS_ADMIN, LINUX_IMMUTABLE, MAC_ADMIN, SYSLOG - - For all other needs, consider the :ref:`privileged ` mode. - -.. _feature_privileged: - -Privileged ----------- - -For particular needs, it is sometimes necessary to have **privileged rights** to perform certain actions. -If Exegol does **not** allow you to have specifically the rights necessary, you can configure your container in privileged mode to get **full administrator rights**. - -.. warning:: - This configuration is particularly **dangerous** because it gives the container **full admin control** over the **kernel** of the **host** machine. - - Use this option **only** if you know **exactly** what you are doing!! - - If the need is specifically identified, consider adding :ref:`capabilities ` instead! - -See the option ``--privileged`` of the :ref:`start action ` for more details. - -.. _feature_multi_arch: - -Multi-architecture ------------------- - -Exegol supports ``ARM64`` architecture (in addition to the classic ``AMD64``) since version ``4.1.0`` of the wrapper and ``3.0.0`` of the images. - -This support allows you to fully use exegol on hardware equipped with an **ARM** processor (such as Mac M1 / M2 but also some Raspberry Pi). - -.. warning:: - Exegol only supports **64-bit ARM** architecture! If your ARM processor supports 64-bit, make sure your **OS** is also installed in **64-bit version** to use exegol! - -.. tip:: - For experienced users or developers, it is possible to explicitly modify the architecture used by the Exegol wrapper with the :ref:`general option ` ``--arch ARCH``. - - But be **careful**, the modification of this parameter can lead to **malfunctions**! - -.. _feature_image_building: - -Local image building --------------------- - -The wrapper allows users to locally build their images from the ``exegol-images`` sources. - -More information in the :ref:`advanced uses ` section. - -.. _feature_image_pulling: - -Remote image pulling --------------------- - -To save time, pre-built images are available for download from DockerHub. -These images can be downloaded and installed / updated from the exegol wrapper with the :doc:`install ` and :doc:`update ` actions. - -.. _feature_exec: - -Command execution ------------------- - -The Exegol wrapper does not only allow the opening of interactive shells, it is also possible to execute **single commands** in several ways. - -.. tip:: - To see the execution logs of the command, the user must add the parameter ``-v``. - -The details of this functionality are detailed in the :doc:`exec ` action. - -.. _feature_exec_daemon: - -Daemon execution -~~~~~~~~~~~~~~~~ - -One of the execution modes can be in the **background** like a daemon service. -In this way the wrapper executes the **user's command**, for example an application such as bloodhound. -The wrapper **launches** the task in an exegol container and **finishes immediately** without occupying the user's terminal, leaving the application **open**. - -See the option ``--background`` of the :ref:`exec action ` for more details. - -.. _feature_exec_tmp: - -Temporary containers -~~~~~~~~~~~~~~~~~~~~ - -Another feature of the :doc:`exec ` action is the execution in a **temporary** container. - -In this mode, a **temporary** container will be created and **dedicated** to the execution of the command specified by the user. - -This mode can be useful to run a given command with the most **up-to-date** image already installed on the host, for any **test** or for special **privacy** needs. - -See the option ``--tmp`` of the :ref:`exec action ` for more details.