├── recon.png ├── commander.png ├── recon-output.png ├── 1731871754775.jpg ├── README.md ├── kalibrate.html ├── kerbrute.html ├── airmon.html ├── stegotool.html ├── gr-gsm.html ├── Responder.html ├── aircrack.html ├── recon.html ├── Hashcat.html ├── john.html ├── ssh-socat.html ├── Nikto.html ├── sqlmap.html ├── nmap_gen.html ├── dirb.html ├── linux.html ├── dalfox.html ├── windows10.html ├── proxychains.html └── msfvenom.html /recon.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scs-labrat/commander/HEAD/recon.png -------------------------------------------------------------------------------- /commander.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scs-labrat/commander/HEAD/commander.png -------------------------------------------------------------------------------- /recon-output.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scs-labrat/commander/HEAD/recon-output.png -------------------------------------------------------------------------------- /1731871754775.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scs-labrat/commander/HEAD/1731871754775.jpg -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | 2 | # Commander: Advanced Security Command Generator 3 | 4 | ![Commander Banner](commander.png) 5 | 6 | Commander is an all-in-one security tool designed to simplify and automate the generation of commands for specialised penetration testing tools. It features an intuitive interface with built-in scripts and presets to help security professionals focus on the mission. 7 | 8 | ## ✨ Features 9 | 10 | - **Network Analysis Tools** 11 | - Generate advanced `nmap` commands for detailed scanning. 12 | - Configure and launch `Responder` for LLMNR/NBT-NS/mDNS poisoning. 13 | - **Web Application Security** 14 | - Automate SQL injection testing with `SQLMap`. 15 | - Scan web servers for vulnerabilities using `Nikto`. 16 | - Detect XSS with `Dalfox`. 17 | - **Password Cracking** 18 | - Generate configurations for `John The Ripper` and `Hashcat`. 19 | - **Wireless Tools** 20 | - Launch `Aircrack-ng` and configure wireless attack workflows. 21 | - Perform GSM analysis using `GR-GSM` and `Kalibrate`. 22 | - **System Reconnaissance** 23 | - Automate enumeration for Linux and Windows systems. 24 | - Generate scripts for `SSH`, `Socat`, and `Kerbrute`. 25 | 26 | ## 🎯 Why Use Commander? 27 | 28 | - Save hours of manual configuration. 29 | - Intuitive UI for both beginners and experts. 30 | - Comprehensive library of tested tools. 31 | - Customisable commands and outputs. 32 | 33 | ## 📦 Installation 34 | 35 | 1. Clone the repository: 36 | ```bash 37 | git clone https://github.com/scs-labrat/commander.git 38 | cd commander 39 | ``` 40 | 41 | 2. Open the `index.html` file in your browser: 42 | ```bash 43 | open index.html 44 | ``` 45 | 46 | 3. Start generating commands! 47 | 48 | ## 🖼️ Screenshots 49 | 50 | ![Tool Example 1](recon.png) 51 | ![Tool Example 2](recon-output.png) 52 | 53 | ## 🧰 Tools Supported 54 | 55 | | Network Analysis `nmap`, `Responder` | 56 | | Web Application `SQLMap`, `Nikto`, `Dalfox` | 57 | | Password Cracking `John The Ripper`, `Hashcat` | 58 | | Wireless Tools `Aircrack-ng`, `GR-GSM`, `kalibrate` | 59 | | System Reconnaissance `Kerbrute`, `assetfinder`, `waybackurls`, `subfinder` | 60 | 61 | ## 🚀 Usage 62 | 63 | 1. Select the desired tool from the grid. 64 | 2. Customise the command parameters. 65 | 3. Click "Generate Command." 66 | 4. copy the command for execution. 67 | 68 | 69 | ## 📄 License 70 | 71 | Commander is licensed under the [MIT License](LICENSE). 72 | 73 | 74 | ## 🌟 Acknowledgements 75 | 76 | - ASCII art by [Your Name](https://github.com/scs-labrat). 77 | - Inspired by the open-source community and security innovators. 78 | 79 | --- 80 | 81 | ### 🚨 Disclaimer 82 | 83 | Commander is intended for ethical and authorised use only. Misuse of this tool is strictly prohibited. 84 | 85 | --- 86 | 87 | 💻 **Built with passion by [d8rh8r](https://github.com/scs-labrat).** 88 | -------------------------------------------------------------------------------- /kalibrate.html: -------------------------------------------------------------------------------- 1 | 149 |
150 |

Kalibrate Command Generator

151 | 152 |
153 |
154 |

Kalibrate Configuration

155 |
GSM Base Station Scanner and Frequency Error Detection Tool
156 |
157 | 158 |
159 | 160 |
161 |

Basic Settings

162 |
163 |
GSM Band Scan
164 |
Frequency Calibration
165 |
166 | 167 | 175 |
176 | 177 | 178 |
179 |

Device Options

180 | 181 | 182 | 183 | 184 | 185 | 186 |
187 | 188 | 189 |
190 |

Advanced Options

191 |
192 |
Debug Mode
193 |
Verbose Output
194 |
195 |
196 | 197 | 198 |
199 |
200 | 201 | 202 |
203 | $ 204 | 205 |
206 |
207 | 208 | 271 | -------------------------------------------------------------------------------- /kerbrute.html: -------------------------------------------------------------------------------- 1 | 123 |
124 |

Kerbrute Command Generator

125 | 126 |
127 |
128 |

Kerbrute Options

129 |
130 | 131 |
132 |
133 |

Domain Settings

134 |
135 | 136 | 137 |
138 |
139 | 140 |
141 |

Authentication

142 |
143 |
Safe Mode (Less Noisy)
144 |
Verbose Output
145 |
146 | 147 |
148 | 149 |
150 |

Attack Mode

151 |
152 |
User Enumeration
153 |
Password Spray
154 |
Username/Password Bruteforce
155 |
Username as Password
156 |
157 |
158 | 159 |
160 |

Wordlist Options

161 | 162 | 163 |
164 | 165 |
166 |

Output Options

167 |
168 |
Save Output to File
169 |
170 | 171 |
172 | 173 | 174 |
175 |
176 | 177 |
178 | $ 179 | 180 |
181 |
182 | 183 | 265 | -------------------------------------------------------------------------------- /airmon.html: -------------------------------------------------------------------------------- 1 | 149 |
150 |

Airmon-ng Command Generator

151 | 152 |
153 |
154 |

Airmon-ng Configuration

155 |
Wireless Interface Management Tool
156 |
157 | 158 |
159 | 160 |
161 |

Interface Selection

162 | 163 | 164 |
165 | 166 | 167 |
168 |

Operation Mode

169 |
170 |
Start monitor mode
171 |
Stop monitor mode
172 |
Check running processes
173 |
174 |
175 | 176 | 177 |
178 |

Channel Configuration

179 | 180 | 181 |
182 |
2.4 GHz band
183 |
5 GHz band
184 |
185 |
186 | 187 | 188 |
189 |

Additional Options

190 |
191 |
Kill interfering processes
192 |
List wireless interfaces
193 |
Debug mode
194 |
Verbose output
195 |
196 |
197 | 198 | 199 |
200 |
201 | 202 | 203 |
204 | $ 205 | 206 |
207 |
208 | 209 | 276 | -------------------------------------------------------------------------------- /stegotool.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Steganography Tool 6 | 108 | 109 | 110 |
111 |

🔐 Steganography Tool

112 | 113 |
114 |
115 | 116 | 117 |
118 | 119 |
120 |

Hide Message in Image

121 | 122 | 123 | 124 | 125 | 126 | 127 |
128 | 129 |
130 |

Extract Hidden Message

131 | 132 | 133 |
134 |
135 |
136 |
137 | 138 | 269 | -------------------------------------------------------------------------------- /gr-gsm.html: -------------------------------------------------------------------------------- 1 | 149 |
150 |

GR-GSM Command Generator

151 | 152 |
153 |
154 |

GR-GSM Configuration

155 |
GSM Signal Analysis and Capture Tool
156 |
157 | 158 |
159 | 160 |
161 |

Basic Settings

162 | 163 | 164 | 165 | 166 |
167 |
Live Monitor
168 |
Decode Capture
169 |
170 |
171 | 172 | 173 |
174 |

Capture Options

175 | 176 | 177 | 178 | 179 |
180 |
Channelize
181 |
Save to cfile
182 |
183 |
184 | 185 | 186 |
187 |

Advanced Options

188 |
189 |
A5/1 Simulation
190 |
Print Bursts
191 |
Verbose Output
192 |
Debug Mode
193 |
194 |
195 | 196 | 197 |
198 |

Device Settings

199 |
200 |
RTL-SDR Device
201 |
HackRF Device
202 |
USRP Device
203 |
204 |
205 | 206 | 207 |
208 |
209 | 210 | 211 |
212 | $ 213 | 214 |
215 |
216 | 217 | 272 | -------------------------------------------------------------------------------- /Responder.html: -------------------------------------------------------------------------------- 1 | 150 |
151 |

Responder Command Generator

152 | 153 |
154 |
155 |

Responder Configuration

156 |
LLMNR/NBT-NS/mDNS Poisoner and NTLMv1/2 Relay
157 |
158 | 159 |
160 | 161 |
162 |

Network Interface

163 | 164 | 165 |
166 | 167 | 168 |
169 |

Basic Options

170 |
171 |
Analyze Mode (-A)
172 |
Enable WPAD Rogue Proxy
173 |
Debug Mode
174 |
Force WPAD Authentication
175 |
176 |
177 | 178 | 179 |
180 |

Protocol Settings

181 |
182 |
Disable HTTP Server
183 |
Disable SMB Server
184 |
Disable SQL Server
185 |
Disable Kerberos Server
186 |
Disable POP3 Server
187 |
Disable SMTP Server
188 |
Disable IMAP Server
189 |
Disable DNS Server
190 |
191 |
192 | 193 | 194 |
195 |

Advanced Options

196 |
197 |
Force LM Downgrade
198 |
Verbose
199 |
OS Fingerprinting
200 |
WPAD Rogue Proxy Server
201 |
Force WREDIR Authentication
202 |
Force BASIC Authentication
203 |
204 |
205 | 206 | 207 |
208 |

Output Options

209 |
210 |
Enable Logging
211 |
HTML Logging
212 |
Session Logging
213 |
214 |
215 | 216 | 217 |
218 |
219 | 220 | 221 |
222 | $ 223 | 224 |
225 |
226 | 227 | 277 | -------------------------------------------------------------------------------- /aircrack.html: -------------------------------------------------------------------------------- 1 | 149 |
150 |

Aircrack-ng Command Generator

151 | 152 |
153 |
154 |

Aircrack-ng Configuration

155 |
WiFi Security Assessment Suite
156 |
157 | 158 |
159 | 160 |
161 |

Input Files

162 | 163 | 164 |
165 |
Multiple capture files
166 |
167 |
168 | 169 | 170 |
171 |

Attack Configuration

172 | 173 | 174 | 175 | 176 |
177 |
WEP attack
178 |
WPA/WPA2 attack
179 |
WPA3 attack
180 |
181 |
182 | 183 | 184 |
185 |

Dictionary Configuration

186 | 187 | 188 |
189 |
CPU only mode
190 |
Use GPU acceleration
191 |
192 |
193 | 194 | 195 |
196 |

Performance Settings

197 |
198 |
Multi-threading
199 |
KoreK optimization
200 |
PTW debug
201 |
202 |
203 | 204 | 205 |
206 |

Advanced Options

207 |
208 |
IVs only
209 |
Debug mode
210 |
Quiet mode
211 |
No progress
212 |
213 |
214 | 215 | 216 |
217 |

Output Options

218 |
219 |
Show ASCII keys
220 |
Write key to file
221 |
Write session log
222 |
223 |
224 | 225 | 226 |
227 |
228 | 229 | 230 |
231 | $ 232 | 233 |
234 |
235 | 236 | 298 | -------------------------------------------------------------------------------- /recon.html: -------------------------------------------------------------------------------- 1 | 141 |
142 |

Recon Script Generator

143 | 144 |
145 |
146 |

Recon Configuration

147 |
Generate a comprehensive reconnaissance script using multiple tools
148 |
149 | 150 |
151 |
152 |

Target Settings

153 | 154 | 155 | 156 | 157 |
158 | 159 |
160 |

Tool Selection

161 |
162 |
Assetfinder
163 |
Subfinder
164 |
Waybackurls
165 |
HTTProbe
166 |
Take Screenshots
167 |
Port Scanning
168 |
169 |
170 | 171 |
172 |

Additional Options

173 |
174 |
Resolve Domains
175 |
Sort & Unique Results
176 |
Backup Results
177 |
178 |
179 | 180 | 181 |
182 |
183 | 184 |
185 | $ 186 | 187 |
188 |
189 | 190 | 308 | -------------------------------------------------------------------------------- /Hashcat.html: -------------------------------------------------------------------------------- 1 | 150 |
151 |

Hashcat Command Generator

152 | 153 |
154 |
155 |

Hashcat Configuration

156 |
Advanced Password Recovery Tool
157 |
158 | 159 |
160 | 161 |
162 |

Input Files

163 | 164 | 165 | 166 | 167 |
168 | 169 | 170 |
171 |

Attack Mode

172 | 179 |
180 | 181 | 182 |
183 |

Hash Type

184 | 194 |
195 | 196 | 197 |
198 |

Optimization

199 |
200 |
Force execution
201 |
Use all OpenCL devices
202 |
Optimized kernel
203 |
High workload profile
204 |
205 |
206 | 207 | 208 |
209 |

Rules and Masks

210 |
211 |
Apply best64 rules
212 |
Apply toggles rules
213 |
Enable increment mode
214 |
Min length 8
215 |
216 |
217 | 218 | 219 |
220 |

Output Options

221 |
222 |
Show cracked hashes
223 |
Disable potfile
224 |
Output to file
225 |
Enable status-screen
226 |
227 |
228 | 229 | 230 |
231 |
232 | 233 | 234 |
235 | $ 236 | 237 |
238 |
239 | 240 | 291 | -------------------------------------------------------------------------------- /john.html: -------------------------------------------------------------------------------- 1 | 149 |
150 |

John the Ripper Command Generator

151 | 152 |
153 |
154 |

John Configuration

155 |
Advanced Password Cracker
156 |
157 | 158 |
159 | 160 |
161 |

Input

162 | 163 | 164 |
165 |
175 |
176 |
177 | 178 | 179 |
180 |

Wordlist Configuration

181 | 182 | 183 |
184 |
Use rules
185 |
Incremental mode
186 |
External mode
187 |
Loopback mode
188 |
189 |
190 | 191 | 192 |
193 |

Performance

194 |
195 |
Use 4 processes
196 |
Use OpenCL
197 |
Single crack mode
198 |
Markov mode
199 |
200 |
201 | 202 | 203 |
204 |

Session Management

205 |
206 |
Save session
207 |
Restore session
208 |
Show status
209 |
210 |
211 | 212 | 213 |
214 |

Output Options

215 |
216 |
Custom pot file
217 |
Show cracked passwords
218 |
Enable logging
219 |
220 |
221 | 222 | 223 |
224 |

Advanced Options

225 |
226 |
Use mask attack
227 |
UTF-8 encoding
228 |
Custom config
229 |
230 |
231 | 232 | 233 |
234 |
235 | 236 | 237 |
238 | $ 239 | 240 |
241 |
242 | 243 | 301 | -------------------------------------------------------------------------------- /ssh-socat.html: -------------------------------------------------------------------------------- 1 | 123 |
124 |

SSH & Socat Connection Generator

125 | 126 |
127 |
128 |

SSH & Socat Tunneling Commands

129 |
130 | 131 |
132 |
133 |

SSH Basic Connection

134 |
135 | 136 | 137 | 138 |
139 |
140 | 141 |
142 |

File Transfer Options

143 |
144 |
SCP Transfer
145 |
SFTP Commands
146 |
Rsync Sync
147 |
148 | 149 | 150 |
151 | 152 |
153 |

Port Forwarding

154 |
155 |
Local Port Forward
156 |
Remote Port Forward
157 |
Dynamic SOCKS Proxy
158 |
159 | 160 | 161 | 162 |
163 | 164 |
165 |

Socat Relay Options

166 |
167 |
Basic Relay
168 |
Encrypted Relay
169 |
SOCKS Proxy
170 |
171 | 172 | 173 |
174 | 175 | 176 |
177 |
178 | 179 |
180 | $ 181 | 182 |
183 |
184 | 185 | 281 | -------------------------------------------------------------------------------- /Nikto.html: -------------------------------------------------------------------------------- 1 | 149 |
150 |

Nikto Command Generator

151 | 152 |
153 |
154 |

Nikto Configuration

155 |
Web Server Scanner for Vulnerabilities and Misconfigurations
156 |
157 | 158 |
159 | 160 |
161 |

Target Settings

162 | 163 | 164 | 165 | 166 |
167 |
Force SSL
168 |
Disable SSL
169 |
170 |
171 | 172 | 173 |
174 |

Scan Options

175 |
176 |
Check Database
177 |
Follow Redirects
178 |
No Redirects
179 |
No Keep-Alive
180 |
Non-Interactive Mode
181 |
Show Cookies
182 |
183 |
184 | 185 | 186 |
187 |

Authentication

188 | 189 | 190 | 191 | 192 |
193 |
Basic Auth
194 |
195 |
196 | 197 | 198 |
199 |

Output Options

200 | 201 | 208 | 209 | 210 |
211 |
Verbose Output
212 |
Debug Mode
213 |
214 |
215 | 216 | 217 |
218 |

Tuning Options

219 |
220 |
Enable Evasion
221 |
Mutate Scan
222 |
Set Timeout (30s)
223 |
224 |
225 | 226 | 227 |
228 |
229 | 230 | 231 |
232 | $ 233 | 234 |
235 |
236 | 237 | 310 | -------------------------------------------------------------------------------- /sqlmap.html: -------------------------------------------------------------------------------- 1 | 149 |
150 |

SQLMap Command Generator

151 | 152 |
153 |
154 |

SQLMap Configuration

155 |
Automatic SQL Injection Detection and Exploitation Tool
156 |
157 | 158 |
159 | 160 |
161 |

Target

162 | 163 | 164 |
165 |
Automatically test forms
166 |
Crawl website (depth 3)
167 |
Random User-Agent
168 |
169 |
170 | 171 | 172 |
173 |

Request Method

174 | 179 |
180 |
Include POST data
181 |
Include cookies
182 |
Custom headers
183 |
184 |
185 | 186 | 187 |
188 |

Detection

189 | 194 | 199 |
200 | 201 | 202 |
203 |

Injection Techniques

204 |
205 |
Boolean-based blind
206 |
Error-based
207 |
Union query-based
208 |
Stacked queries
209 |
Time-based blind
210 |
211 |
212 | 213 | 214 |
215 |

Database Options

216 |
217 |
Enumerate databases
218 |
Enumerate tables
219 |
Enumerate columns
220 |
Dump database data
221 |
Dump all databases
222 |
223 |
224 | 225 | 226 |
227 |

Advanced Options

228 |
229 |
Never ask for user input
230 |
Use 10 threads
231 |
Use tamper scripts
232 |
Use Tor network
233 |
234 |
235 | 236 | 237 |
238 |
239 | 240 | 241 |
242 | $ 243 | 244 |
245 |
246 | 247 | 314 | -------------------------------------------------------------------------------- /nmap_gen.html: -------------------------------------------------------------------------------- 1 | 140 |
141 |

Advanced Nmap Command Generator

142 | 143 |
144 |
145 |

Nmap Configuration

146 |
Advanced Network Mapper and Security Scanner
147 |
148 | 149 |
150 | 151 |
152 |

Basic Scan Options

153 | 154 | 155 | 156 | 157 | 169 |
170 | 171 | 172 |
173 |

Port Specification

174 |
175 |
176 | 177 | 178 |
179 |
180 |
All Ports (-p-)
181 |
Top 1000 Ports
182 |
Consecutive Port Scan
183 |
184 |
185 |
186 | 187 | 188 |
189 |

Timing and Performance

190 | 191 | 199 | 200 |
201 |
Min Rate 1000
202 |
Max Retries 2
203 |
Host Timeout 30m
204 |
205 |
206 | 207 | 208 |
209 |

Detection Options

210 |
211 |
OS Detection (-O)
212 |
Version Detection (-sV)
213 |
Version Intensity 5
214 |
Aggressive Scan (-A)
215 |
216 |
217 | 218 | 219 |
220 |

NSE Script Options

221 |
222 |
Vulnerability Scripts
223 |
Default Scripts
224 |
Authentication Scripts
225 |
Brute Force Scripts
226 |
Discovery Scripts
227 |
Safe Scripts
228 |
229 |
230 | 231 | 232 |
233 |

Output Options

234 |
235 |
Verbose (-v)
236 |
Show Reason
237 |
XML Output
238 |
All Formats
239 |
240 |
241 | 242 | 243 |
244 |
245 | 246 | 247 |
248 | $ 249 | 250 |
251 |
252 | 253 | 311 | -------------------------------------------------------------------------------- /dirb.html: -------------------------------------------------------------------------------- 1 | 149 | 150 | 151 | 152 |
153 |

DIRB Command Generator

154 | 155 |
156 |

Basic Configuration

157 | 158 | 159 | 160 |
161 |
162 | 163 | 164 |
165 |
166 | 167 | 168 |
169 |
170 | 171 | 172 |
173 |
174 | 175 | 176 |
177 |
178 | 179 |

Advanced Options

180 |
181 |
182 | 183 | 184 |
185 |
186 | 187 | 188 |
189 |
190 | 191 | 192 |
193 |
194 | 195 | 196 |
197 |
198 | 199 | 203 | 204 | 207 | 208 | 211 | 212 | 215 | 216 |
217 | dirb http://example.com /usr/share/wordlists/dirb/common.txt 218 | 219 |
220 |
221 | 222 | ← Back to Tools Hub 223 |
224 | 225 | 355 | -------------------------------------------------------------------------------- /linux.html: -------------------------------------------------------------------------------- 1 | 171 |
172 |

Linux System Enumeration & Privilege Escalation

173 | 174 |
175 |
176 |

Linux Commands Generator

177 |
Collection of powerful Bash commands for Linux system enumeration and privilege escalation
178 |
179 | 180 |
181 |
182 |

System Information

183 |
184 |
Basic System Info
185 |
Kernel Information
186 |
Installed Packages
187 |
Running Processes
188 |
Network Configuration
189 |
Cron Jobs
190 |
191 |
192 | 193 |
194 |

User & Permission Analysis

195 |
196 |
Current User Context
197 |
Sudo Rights
198 |
SUID Binaries
199 |
Linux Capabilities
200 |
Logged In Users
201 |
202 |
203 | 204 |
205 |

Service & Process Analysis

206 |
207 |
Service Status
208 |
Listening Ports
209 |
Root Services
210 |
Process Paths
211 |
212 |
213 | 214 |
215 |

File System Analysis

216 |
217 |
World-Writable Directories
218 |
Sensitive Files
219 |
Shell History Files
220 |
SSH Files/Config
221 |
222 |
223 | 224 | 225 |
226 |
227 | 228 |
229 | PS> 230 | 231 |
232 |
233 | 234 | 363 | -------------------------------------------------------------------------------- /dalfox.html: -------------------------------------------------------------------------------- 1 | 153 |
154 |

Advanced Dalfox XSS Scanner Configuration

155 | 156 |
157 |
158 |

Dalfox Settings

159 |
Configure detailed Dalfox XSS scanning parameters and options
160 |
161 | 162 |
163 |
164 |

Target Settings

165 | 166 | 167 | 168 | 169 | 170 | 171 |
172 | 173 |
174 |

Basic Scan Options

175 |
176 |
177 | Use Blind XSS 178 |
179 | 180 |
181 |
182 |
Parameter Mining
183 |
Deep Scan
184 |
Skip BAV
185 |
Follow Redirects
186 |
Use Multicast Mode
187 |
188 |
189 | 190 |
191 |

Advanced Scan Settings

192 |
193 |
194 | Custom Timeout 195 |
196 | 197 |
198 |
199 |
200 | Request Delay 201 |
202 | 203 |
204 |
205 |
206 | Custom Headers 207 |
208 | 209 |
210 |
211 |
212 | Custom Payloads 213 |
214 | 215 |
216 |
217 |
218 |
219 | 220 |
221 |

Output Options

222 |
223 |
No Color Output
224 |
Silence Mode
225 |
JSON Output
226 |
Only POC
227 |
Debug Mode
228 |
229 |
230 | 231 | 232 |
233 |
234 | 235 |
236 | $ 237 | 238 |
239 |
240 | 241 | 349 | -------------------------------------------------------------------------------- /windows10.html: -------------------------------------------------------------------------------- 1 | 171 |
172 |

Windows 10 PowerShell Enumeration & Privilege Escalation

173 | 174 |
175 |
176 |

PowerShell Commands Generator

177 |
Collection of powerful PowerShell commands for system enumeration and privilege escalation
178 |
179 | 180 |
181 |
182 |

System Information

183 |
184 |
Basic System Info
185 |
Installed Software
186 |
Running Processes
187 |
Network Configuration
188 |
Scheduled Tasks
189 |
190 |
191 | 192 |
193 |

User & Permission Analysis

194 |
195 |
Current User Privileges
196 |
User Groups
197 |
Administrator Accounts
198 |
Logon Sessions
199 |
Token Privileges
200 |
201 |
202 | 203 |
204 |

Service & Driver Enumeration

205 |
206 |
Running Services
207 |
Service Permissions
208 |
Loaded Drivers
209 |
Startup Applications
210 |
211 |
212 | 213 |
214 |

File System Analysis

215 |
216 |
Writable Directories
217 |
Unquoted Service Paths
218 |
PowerShell History
219 |
Sensitive Files
220 |
221 |
222 | 223 | 224 |
225 |
226 | 227 |
228 | PS> 229 | 230 |
231 |
232 | 233 | 350 | -------------------------------------------------------------------------------- /proxychains.html: -------------------------------------------------------------------------------- 1 | 205 |
206 |

Proxychains Configuration Generator

207 | 208 |
209 |
210 |

General Settings

211 |
212 | 213 |
214 |
215 |
216 |

Chain Type

217 | 223 |
224 | 225 |
226 |

DNS Settings

227 |
228 |
229 | 230 | 231 |
232 |
233 | 234 | 235 |
236 |
237 | 238 |
239 |
240 | 241 |
242 |
243 |

Timeouts & Retries

244 | 245 | 246 | 247 |
248 | 249 |
250 |

Advanced Options

251 |
252 |
253 | 254 | 255 |
256 |
257 | 258 | 259 |
260 |
261 | 262 |
263 |
264 |
265 |
266 | 267 |
268 |
269 |

Proxy Chain Configuration

270 |
271 | 272 |
273 |
274 |

Add New Proxy

275 |
276 | 281 | 282 | 283 | 284 | 285 | 286 |
287 |
288 | 289 |
290 |

Proxy Chain

291 |
292 |
293 | 294 | 295 |
296 |
297 | 298 |
299 |
300 | 301 | 430 | -------------------------------------------------------------------------------- /msfvenom.html: -------------------------------------------------------------------------------- 1 | 165 |
166 |

MSFvenom Payload Generator

167 | 168 |
169 |
170 |

Payload Configuration

171 |
172 | 173 |
174 |
175 |
176 |

Platform & Architecture

177 | 186 | 187 | 194 |
195 | 196 |
197 |

Payload Type

198 | 207 |
208 |
209 | 210 |
211 |
212 |

Connection Settings

213 | 214 | 215 | 216 |
217 | 218 |
219 |

Output Configuration

220 | 233 | 234 |
235 |
236 | 237 |
238 |
239 |

Encoding Options

240 |
241 |
242 | 243 | 244 |
245 |
246 | 253 | 254 |
255 | 256 |
257 |

Advanced Options

258 |
259 |
260 | 261 | 262 |
263 |
264 | 265 | 266 |
267 |
268 | 269 | 270 |
271 |
272 | 273 | 274 |
275 |
276 | 277 | 278 |
279 |
280 | 281 |
282 | $ 283 | 284 |
285 |
286 | 287 | 405 | --------------------------------------------------------------------------------