Sly, your lazy-but-smart script, automatically collects red-teaming and OSCP tools, saving you the tedious chore of hunting down each script every single time. Tailored for red-teaming activities and OSCP preparation.
Use these tools strictly for research and ethical learning.
# Clone the Sly repository
git clone https://github.com/dekadentno/sly.git
# Run the Sly script
cd sly
python3 sly.py
# or, if the script needs executable permission
chmod +x sly.py
./sly.py
# With default settings, sly will put everything into the current working directory
python3 sly.py
# To specify a different destination directory
python3 sly.py -d /path/to/destination
# To specify a subdirectory within the current working directory
python3 sly.py -f subdirectory_name
# Combining both destination and subdirectory arguments (Note: subdirectory argument will be ignored in this case)
python3 sly.py -d /path/to/destination -f subdirectory_name
# Or just run it with this neat one-liner
curl -sSL https://raw.githubusercontent.com/dekadentno/sly/main/sly.py | python3 -This script was designed and tested for Kali Linux and may not work on other systems because it uses paths specific to Kali.
mlay in ~/projects/sly on main β β Ξ» cat /etc/os-release
PRETTY_NAME="Kali GNU/Linux Rolling"
NAME="Kali GNU/Linux"
VERSION_ID="2023.3"
VERSION="2023.3"
VERSION_CODENAME=kali-rolling
ID=kali
ID_LIKE=debian
HOME_URL="https://www.kali.org/"
SUPPORT_URL="https://forums.kali.org/"
BUG_REPORT_URL="https://bugs.kali.org/"
ANSI_COLOR="1;31"
mlay in ~/projects/sly on main β β Ξ» uname -a
Linux kali 6.3.0-kali1-arm64 #1 SMP Debian 6.3.7-1kali1 (2023-06-29) aarch64 GNU/Linux| Tool Name | Platform | Purpose |
|---|---|---|
| Mimikatz | πͺ | Credential dumping and manipulation |
| Unix-privesc-check | π§ | Checks for privilege escalation vectors |
| Seatbelt | πͺ | Security checks and system enumeration |
| Ncat | πͺ π§ | Enhanced version of Netcat |
| LinPEAS | π§ | Privilege escalation checks |
| WinPEAS | πͺ | Windows privilege escalation checks |
| ADpeas | πͺ | Active Directory enumeration |
| PrintSpoofer64 | πͺ | Abusing print spooler services |
| GodPotato | πͺ | Exploiting windows BITS service |
| BloodHound | πͺ | AD Trust analysis |
| PowerSploit | πͺ | PowerShell-based exploitation |
| WPScan | πͺ π§ | WordPress vulnerability scanner |
| linpeas | πͺ π§ | Privilege escalation tools |
| winpeas | πͺ π§ | Privilege escalation tools |
| Rubeus | πͺ | Kerberos attack framework |
| PsTools | πͺ | Suite of command-line windows utilities |
| Kerbrute | πͺ π§ | Brute-forcing Kerberos pre-auth |
| nc64.exe | πͺ | 64-bit Netcat for windows |
| PowerView | πͺ | AD enumeration |
| SharpHound | πͺ | Collecting AD data |
| Spray-Passwords.ps1 | πͺ | Password spraying script |
| Sysinternals Suite | πͺ | Volume Shadow Copy management |
| powercat.ps1 | πͺ | PowerShell-based Netcat alternative |
| powerup.ps1 | πͺ | PowerShell script for privilege escalation |
| spray-passwords.ps1 | πͺ | Password spraying tool |
| DomainPasswordSpray.ps1 | πͺ | Domain-wide password spraying tool |
| Ligolo-ng agent | πͺ | Establish tunnels from a reverse TCP/TLS connection (agent) |
| Ligolo-ng proxy | π§ | Establish tunnels from a reverse TCP/TLS connection (proxy) |
| webshell.pHp | Simple PHP webshell | |
| KeePass | πͺ | Portable version of a popular password manager |
| pspy32 | π§ | Unprivileged Linux process snooping (32 bit) |
| pspy64 | π§ | Unprivileged Linux process snooping (64 bit) |
| suid3num.py | π§ | SUID bins enumeration, separate default bins from custom bins, cross-match those with bins in GTFO Bin's |
| OpenSSHesame.ps1 | πͺ | Creates an SSH key pair and set up SSH access on Windows |
| ssh_backdoor.sh | π§ | Creates an SSH key pair and set up SSH access on Linux |
| automap.sh | π§ | Automate some Nmap scans. |
| SharpUp.exe | πͺ | Part of GhostPack suite, C# port of PowerUp. |
| colorful_server.py | π§πͺ | Simple python server that handles GET and POST; displays data with colored output. |
See Disclaimer.