├── logo.png ├── image-20240701203637270.png ├── image-20240701203710142.png ├── image-20240701203922578.png ├── image-20240701204031463.png ├── image-20240701204153909.png ├── image-20240701204251185.png ├── image-20240701220611993.png ├── image-20240701220726971.png ├── image-20240701221016833.png ├── image-20240701221102460.png ├── image-20240701221353945.png ├── image-20240701221514766.png ├── image-20240701221636819.png └── README.md /logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/logo.png -------------------------------------------------------------------------------- /image-20240701203637270.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701203637270.png -------------------------------------------------------------------------------- /image-20240701203710142.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701203710142.png -------------------------------------------------------------------------------- /image-20240701203922578.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701203922578.png -------------------------------------------------------------------------------- /image-20240701204031463.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701204031463.png -------------------------------------------------------------------------------- /image-20240701204153909.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701204153909.png -------------------------------------------------------------------------------- /image-20240701204251185.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701204251185.png -------------------------------------------------------------------------------- /image-20240701220611993.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701220611993.png -------------------------------------------------------------------------------- /image-20240701220726971.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701220726971.png -------------------------------------------------------------------------------- /image-20240701221016833.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701221016833.png -------------------------------------------------------------------------------- /image-20240701221102460.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701221102460.png -------------------------------------------------------------------------------- /image-20240701221353945.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701221353945.png -------------------------------------------------------------------------------- /image-20240701221514766.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701221514766.png -------------------------------------------------------------------------------- /image-20240701221636819.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/huntingsec/asdtools/HEAD/image-20240701221636819.png -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # ASD工具箱(ASD圆你一个黑客梦) 2 | 3 | > [!IMPORTANT] 4 | > 5 | > ``` 6 | > https://github.com/huntingsec/asdtools 7 | > ``` 8 | 9 | > [!TIP] 10 | > 11 | > 天下武功,无坚不破,唯快不破 12 | 13 | ![logo](https://raw.githubusercontent.com/huntingsec/asdtools/main/logo.png) 14 | 15 | #### 工具介绍 16 | 17 | > [!TIP] 18 | > 19 | > 为了快速上手,快速打点而生(由此得名:键盘输入asd是最快的[肌肉记忆了]) 20 | > 21 | > 本项目,目前只集成了快速打点的GUI工具和一小部分命令行工具(为了不和GUI进行混淆,后面会将所有蓝队应急的命令,攻防的命令以及APT手法等单独集成到工具箱中的一个模块)。 22 | > 23 | > 收集于各位大佬们的精选工具,也是日常必备,使用率最高的几个工具。 24 | 25 | #### 工具安装 26 | 27 | ![image-20240701203637270](https://github.com/huntingsec/asdtools/blob/main/image-20240701203637270.png?raw=true) 28 | 29 | > [!TIP] 30 | > 31 | > 解压 32 | > 33 | > ``` 34 | > tar xvf asdtools.tar.xz 35 | > ``` 36 | 37 | ![image-20240701203710142](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701203710142.png) 38 | 39 | > [!TIP] 40 | > 41 | > 进入目录,添加安装脚本执行权限 42 | > 43 | > ``` 44 | > cd asdtools 45 | > chmod +x install.sh 46 | > ``` 47 | 48 | ![image-20240701203922578](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701203922578.png) 49 | 50 | > [!TIP] 51 | > 52 | > 以root权限安装 53 | > 54 | > ``` 55 | > sudo ./install.sh 56 | > ``` 57 | 58 | ![image-20240701204031463](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701204031463.png) 59 | 60 | > [!TIP] 61 | > 62 | > 这是为了修改用户的执行权限 63 | 64 | ![image-20240701204153909](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701204153909.png) 65 | 66 | > [!TIP] 67 | > 68 | > 等待安装完成,输入asd进入菜单 69 | 70 | ![image-20240701204251185](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701204251185.png) 71 | 72 | ![image-20240701220611993](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701220611993.png) 73 | 74 | > [!TIP] 75 | > 76 | > 可以用关键字进行选择,也可以鼠标滚轮,还可以双坤 77 | 78 | ![image-20240701220726971](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701220726971.png) 79 | 80 | > [!TIP] 81 | > 82 | > 绝大部分是可以直接执行的,仅有一部分是需要交互的 83 | > 84 | > 比如设置代理需要先切换到root模式 85 | 86 | ![image-20240701221016833](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701221016833.png) 87 | 88 | > [!TIP] 89 | > 90 | > 这里可以选择代理的协议,键入IP和端口 91 | > 92 | > (PS:这里采用删掉最后一行然后再追加一行的方式配置代理,方便快捷,嘎嘎好用,在也不用vi /etc/proxychinas4.conf了) 93 | 94 | ![image-20240701221102460](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701221102460.png) 95 | 96 | > [!TIP] 97 | > 98 | > 例子2: 99 | > 100 | > log4j的工具使用 101 | 102 | ![image-20240701221353945](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701221353945.png) 103 | 104 | > [!TIP] 105 | > 106 | > 可以输入要执行的命令,譬如ping dnslog.cn 107 | 108 | ![image-20240701221514766](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701221514766.png) 109 | 110 | > [!TIP] 111 | > 112 | > 然后输入IP,这样能极大程度减少我们的操作量 113 | 114 | ![image-20240701221636819](https://raw.githubusercontent.com/huntingsec/asdtools/main/image-20240701221636819.png) 115 | 116 | > [!TIP] 117 | > 118 | > 另外,在linux上执行二进制的pppscan或者tscanplus的时候会报错找不到libwebkit2gtk-4.0.so.37 119 | > 120 | > 这个解决方案我已经在脚本中进行修复了 121 | > 122 | > 不过大家也可以自行去解决,命令如下 123 | 124 | > [!WARNING] 125 | > 126 | > ``` 127 | > sudo ln -sf /usr/lib/x86_64-linux-gnu/libwebkit2gtk-4.1.so.0 /usr/lib/x86_64-linux-gnu/libwebkit2gtk-4.0.so.37 128 | > sudo ln -sf /usr/lib/x86_64-linux-gnu/libjavascriptcoregtk-4.1.so.0 /usr/lib/x86_64-linux-gnu/libjavascriptcoregtk-4.0.so.18 129 | > ``` 130 | 131 | > [!TIP] 132 | > 133 | > 其次为了方便系统和cms的定位,实现准确的打点,后面的版本会增加更详细的匹配规则以及bypass的命令,感谢大家的支持。 134 | 135 | #### 项目清单 136 | 137 | | 名称 | NAME | GITHUB | 138 | | ------------------------ | ----------------------- | ------------------------------------------------------------ | 139 | | 冰蝎 | Behinder | https://github.com/rebeyond/Behinder | 140 | | 蚁剑 | AntSword | https://github.com/AntSwordProject/antSword
https://github.com/AntSwordProject/AntSword-Loader | 141 | | 哥斯拉 | Z-Godzilla_ekp | https://github.com/kong030813/Z-Godzilla_ekp | 142 | | 哥斯拉suo5插件 | Godzilla-Suo5MemShell | https://github.com/X1r0z/Godzilla-Suo5MemShell | 143 | | 天蝎 | skyscorpion | https://github.com/shack2/skyscorpion | 144 | | Webshell免杀生成器 | Webshell_Generate | https://github.com/cseroad/Webshell_Generate | 145 | | 综合OA漏洞利用工具 | Exp-Tools | https://github.com/cseroad/Exp-Tools | 146 | | OA漏洞利用工具 | I-Wanna-Get-All | https://github.com/R4gd0ll/I-Wanna-Get-All | 147 | | 指纹管理扫描工具 | pppscan | https://github.com/zhensuibianwan/pppscan | 148 | | 无影综合扫描工具 | TscanPlus | https://github.com/TideSec/TscanPlus | 149 | | DecryptTools综合解密工具 | DecryptTools | https://github.com/wafinfo/DecryptTools | 150 | | 大华定向利用工具 | dahuaExploitGUI | https://github.com/MInggongK/dahuaExploitGUI | 151 | | Nacos定向利用工具 | NacosExploitGUI | https://github.com/charonlight/NacosExploitGUI | 152 | | Thinkphp定向利用工具 | ThinkphpGUI | https://github.com/nex121/ThinkphpGUI | 153 | | 若依定向利用工具 | ruoyiVuln | https://mp.weixin.qq.com/s/HU1OqZ7YFGjfc4HE3M8tPA | 154 | | Shiro定向利用工具 | ShiroAttack2 | https://github.com/SummerSec/ShiroAttack2 | 155 | | Strusts2定向利用工具 | Struts2VulsScanTools | https://github.com/abc123info/Struts2VulsScanTools | 156 | | Weblogic定向利用工具 | WeblogicTool | https://github.com/KimJun1010/WeblogicTool | 157 | | SmartBI定向利用工具 | SmartBIAttackTool | https://github.com/yggo/SmartBIAttackTool | 158 | | Spring定向利用工具 | SpringExploitGUI | https://github.com/charonlight/SpringExploitGUI | 159 | | 帆软定向利用工具 | FrchannelPlus | https://github.com/BambiZombie/FrchannelPlus | 160 | | 用友NC定向利用工具 | NCTOOls | https://github.com/wafinfo/NCTOOls | 161 | | Dockerapi未授权利用工具 | DockerApi-Rce | https://mp.weixin.qq.com/s/gjD7SVFqjkusmLjhxJ_tDQ | 162 | | Jenkins定向利用工具 | JenkinsExploit-GUI | https://github.com/TheBeastofwar/JenkinsExploit-GUI | 163 | | 蓝队分析工具箱 | BlueTeamTools | https://github.com/abc123info/BlueTeamTools | 164 | | Java 内存马生成工具 | java-memshell-generator | https://github.com/pen4uin/java-memshell-generator | 165 | | HeapDump敏感信息提取工具 | JDumpSpider | https://github.com/whwlsfb/JDumpSpider | 166 | | JNDI注入漏洞利用工具 | JNDI-Injection-Exploit | https://github.com/welk1n/JNDI-Injection-Exploit | 167 | | JNDI注入漏洞利用工具2 | JNDIExploit-1 | https://github.com/Jeromeyoung/JNDIExploit-1 | 168 | | Suo5-GUI正向代理工具 | suo5 | https://github.com/zema1/suo5 | 169 | 170 | ### 功能模块列表 171 | 172 | > [!NOTE] 173 | > 174 | > GUI工具(侧重常用GUI图形化)✔️ 175 | > 176 | > 攻防模式(侧重常用攻防命令集)❌ 177 | > 178 | > 内网模式(侧重内网横向及bypass)❌ 179 | > 180 | > APT模式(侧重痕迹隐藏及后门)❌ 181 | 182 | > [!CAUTION] 183 | > 184 | > 大家有什么意见或者建议可以添加好友进群反馈(PS:如果有大佬想深入交流或者合作,可以进群添加群主私聊) 185 | > 186 | > ![team](https://raw.githubusercontent.com/huntingsec/ARL-Limited-Edition/main/link.jpg) 187 | 188 | 189 | 190 | ## Star History 191 | 192 | [![Star History Chart](https://api.star-history.com/svg?repos=huntingsec/asdtools&type=Date)](https://star-history.com/#huntingsec/asdtools&Date) 193 | 194 | 195 | 196 | 197 | 198 | --------------------------------------------------------------------------------