CodeFactor





Sifter

s1l3nt78
The Dead Bunny Collective
Because enumeration is key


# Release

   @Codename: Gemin1
   @Version : 10


[Gemin1's] latest release's zip package can be downloaded from here
[Gemin1s] latest .deb package is also available for download from here
Older Releases can be found here

# Additions:

- DeadTrap - Mobile Number OSINT.
- HFish - A most effective HoneyPot System.
- EventCleaner - EventLog Cleaner for Windows, with some other useful functionality.
- SubDover - MultiThreaded Subdomain Takeover Vulnerability Scanner.
- Katana-DS (Dork Scanner) - Google Hacking/Dorking with Tor support.
- Threat Dragon - Threat Modelling framework.

- Cross-Site Scripting & SQLinjection
- WhiteWidow - Threat Modelling framework.

# Overview

Sifter is a osint, recon & vulnerability scanner. It combines a plethara
of tools within different module sets in order to quickly perform recon tasks,
check network firewalling, enumerate remote and local hosts, and scan for the 'blue'
vulnerabilities within microsft and if unpatched, exploit them. It uses tools like
blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM.
Gathered info is saved to the results folder, these output files can be easily parsed over to TigerShark
in order to be utilised within your campaign. Or compiled for a final report to wrap up a penetration test.

Setup Video
Demo Video - Its long, but you can skip through to get the general idea.
Most modules are explained along with demos of a lot of the tools

# Tested OS

Working on: - Kali
     - Parrot
     - Ubuntu
     - Linux (any distro)
     - Windows (Linux Subsystem with Docker and VcXsrc - for xterm use - install correctly)
Works on windows with linux-subsystem but please ensure docker is properly installed and configured,
following the instructions from docker website
Untested on mac, though theoretically the same should apply to mac as windows - regarding docker install & tools

# NOTE!!

If a scan does not work correctly at first, remove web-protocol from target.
eg. target.com - instead of http://target.com

# Installation:

      * This will download and install all required tools
      *
      $ git clone https://github.com/s1l3nt78/sifter.git
      $ cd sifter
      $ chmod +x install.sh
      $ ./install.sh
      *
      * For oneliner install, copy and paste the following code into a terminal
      *
      $ git clone https://github.com/s1l3nt78/sifter.git && cd sifter && bash install.sh


Menu:



Modules

- DDoS
  -- Dark-Star
  -- Impulse
  -- UFONet
- NekoBot
- xShock
- VulnX

+ FuzzyDander - Equation Group, Courtesy of the Shadow Brokers
(Obtained through issue request.)
  - FuzzBunch
  - Danderspritz

+ NevrrMore - Private Exploitation framework I've been developing that will
  not be released opensource. Due to certain 0days and other exploits/tools
  it would cause too much unintentional/illintentioned damage.

+ TigerShark
+ Thoron
+ Metasploit

- This was added in order to have a fun way to pass time
 during the more time intensive modules.
 Such as nMap Full Port scan or a RapidScan run.




Sifter Help Menu





# Other Projects

All information on projects in development can be found here.
For any requests or ideas on current projects please submit an issue request to the corresponding tool.
For ideas or collaboration requests on future projects., contact details can be found on the page.

GitHub Pages can be found here.
- MkCheck = MikroTik Router Exploitation Tool
- TigerShark = Multi-Tooled Phishing Framework



#############      VGhlIERlYWQgQnVubnkgQ2x1Yg==      #############

=======