Skip to content

Packages and Installs

Linux Packages

Package install snippet Note
bleachbit sudo apt install bleachbit -y
cifs-utils sudo apt install cifs-utils
Docker sudo apt install docker.io
exiftool sudo apt install exiftool
filezilla sudo apt install filezilla filezilla-common -y
gimp sudo apt install gimp -y
gobuster sudo apt install gobuster -y
golang sudo apt install golang
ipython3 sudo apt install ipython3
jq sudo apt install jq -y
libreoffice sudo apt install libreoffice -y
lolcat sudo apt install lolcat add /usr/games to path
ltrace sudo apt install ltrace
lynx sudo apt install lynx
mcrypt sudo apt install mcrypt -y
ncftp sudo apt install ncftp
node sudo apt install npm
pandoc sudo apt install pandoc
pip3 sudo apt install python3-pip
plank sudo apt install plank
putty sudo apt install putty-tools -y
rlwrap sudo apt install rlwrap
seclists sudo apt install seclists
steghide sudo apt install steghide -y
strace sudo apt install strace
tree sudo apt install tree
venv sudo apt install python3-venv
jd-gui
javac sudo apt install default-jdk
amqp sudo apt install amqp-tools

additional notes:

plank setup to autostart

[kali-linux-customization](https://www.offensive-security.com/kali-linux/kali-linux-customization/)
# Add plank to autostart list
"Session and Startup" > add plank to "autostart" list

# disable dock shadows
Window Manager Tweaks → Compositor → disable Show shadows under dock windows
sudo apt-get clean && apt-get update && apt-get upgrade -y && apt-get dist-upgrade -y

# Install guest additions
# sudo apt-get install -y virtualbox-guest-x11
# reboot


# buffer overflow stuff
sudo apt-get install ropper
gem install one_gadget

# ARM executable
# apt-get install qemu

# apt install tor
# service tor start # Check additional steps involving "tor bundle"
# apt install keepass2 -y
# apt install jd-gui #jar decompiler
# apt install rpcbind -y # for 'rpcinfo'
# apt install nfs-common -y # for 'showmount'
# apt install mono-mcs    # used to compile c# programs
# apt install mingw-w64   # this is to compile windows headers (c/c++)
# apt install gcc-multilib
# apt install redis
# apt-get install thunderbird

# pdf utilities (read from command line; etc.)
# https://www.howtogeek.com/228531/how-to-convert-a-pdf-file-to-editable-text-using-the-command-line-in-linux/
# apt-get install poppler-utils

# apt-get install pdfcrack
# apt-get install bruteforce-salted-openssl

# apt-get install preload # Preload application (pre-loads binaries and dependancies of most commonly used applications)

# wine is used to run windows exe's
# dpkg --add-architecture i386 && apt-get update && apt-get install wine32

# Download OpenVAS
# additional info @ https://www.kali.org/penetration-testing/openvas-vulnerability-scanning/
# apt-get install openvas -y
# openvas-setup

# apt-get install nbtscan-unixwiz

# Linux Priv Checker (open link in browser for download)
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&uact=8&ved=0ahUKEwinnazY2OLWAhXF7iYKHaBDBZcQFgg9MAQ&url=https%3A%2F%2Fwww.securitysift.com%2Fdownload%2Flinuxprivchecker.py&usg=AOvVaw1aPu93f3PMi0zK8sc0o2ZV

firefox add-on: https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/

go (golang)

go get github.com/ffuf/ffuf

export PATH=/home/glasgow/go/bin:$PATH

Github

repo name git clone description
SecLists git clone https://github.com/danielmiessler/SecLists.git Word lists for security assessments
# SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
git clone https://github.com/danielmiessler/SecLists.git /usr/share/wordlists/SecLists
cd /usr/share && ln -s wordlists/SecLists/ seclists  # creates symbolic link (for Reconnoitre)
### alternatively, just run apt -y install seclists


# Reconnoitre (nmap and sparta alternative)
sudo git clone https://github.com/codingo/Reconnoitre.git ~/opt/Reconnoitre

git clone git@github.com:codingo/VHostScan.git ~/opt/VHostScan
# sed 's/$/.\%s/g' /usr/share/seclists/Discovery/DNS/fierce-hostlist.txt #> ~/opt/virtual-host-discovery/SecLists_fierce-hostlist.txt

# Python PTY backdoors - full PTY or nothing!
git clone https://github.com/infodox/python-pty-shells.git ~/opt/python-pty-shells

git clone https://github.com/trustedsec/unicorn.git ~/opt/unicorn

# Exploit Suggesters and enumeration
git clone https://github.com/sleventyeleven/linuxprivchecker.git ~/opt/Enumeration/Linux/linuxprivchecker
git clone https://github.com/mzet-/linux-exploit-suggester.git ~/opt/Enumeration/Linux/linux-exploit-suggester
git clone https://github.com/NullArray/MIDA-Multitool.git ~/opt/Enumeration/MIDA-Multitool
git clone https://github.com/NullArray/RootHelper.git ~/opt/Enumeration/RootHelper
git clone https://github.com/diego-treitos/linux-smart-enumeration.git ~/opt/Enumeration/Linux/linux-smart-enumeration
git clone https://github.com/carlospolop/linPE.git ~/opt/Enumeration/Linux/linPE
git clone https://github.com/InteliSecureLabs/Linux_Exploit_Suggester.git ~/opt/Enumeration/Linux/Linux_Exploit_Suggester

# Windows privesc
git clone https://github.com/pentestmonkey/windows-privesc-check.git ~/opt/Enumeration/Windows/windows-privesc-check

# PowerShell
git clone https://github.com/samratashok/nishang.git ~/opt/nishang
git clone https://github.com/Mr-Un1k0d3r/ThunderShell.git ~/opt/ThunderShell
git clone https://github.com/Mr-Un1k0d3r/PowerLessShell.git ~/opt/PowerLessShell

# NEET - Network Enumeration and Exploitation Tool
git clone https://github.com/JonnyHightower/neet.git ~/opt/neet

git clone https://github.com/alias1/sparty.git ~/opt/sparty

# PowerSploit - A PowerShell Post-Exploitation Framework (some directory lists under PowerSploit/Recon/Dictionaries/)
git clone https://github.com/PowerShellMafia/PowerSploit.git ~/opt/PowerSploit

# phpbash
git clone https://github.com/Arrexel/phpbash.git ~/opt/phpbash

# RsaCTFTool (to crack weak public rsa key)
git clone https://github.com/Ganapati/RsaCtfTool.git ~/opt/RsaCtfTool
sudo apt-get install libgmp3-dev libmpc-dev -y
sudo pip3 install -r ~/opt/RsaCtfTool/requirements.txt
python3 RsaCtfTool.py

# libnum (needed for RsaCTFTool)
git clone https://github.com/hellman/libnum.git
python setup.py install

# ImageTragick - https://github.com/jpeanut/ImageTragick-CVE-2016-3714-RShell.git

# peda
git clone https://github.com/longld/peda.git ~/peda
echo "source ~/peda/peda.py" >> ~/.gdbinit
echo "DONE! debug your program with gdb and enjoy"

# NfSpy - an ID-spoofing NFS client
git clone https://github.com/bonsaiviking/NfSpy ~/opt/NfSpy

# Empire is a post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent.
git clone https://github.com/EmpireProject/Empire ~/opt/Empire
bash ~/opt/Empire/setup/install.sh

# PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
git clone https://github.com/NetSPI/PowerUpSQL ~/opt/PowerUpSQL

# socat-shell
git clone https://github.com/cornerpirate/socat-shell.git

# dirsearch - dirsearch is a simple command line tool designed to brute force directories and files in websites.
git clone https://github.com/maurosoria/dirsearch.git ~/opt/dirsearch

# firepwd.py, an open source tool to decrypt Mozilla protected passwords
git clone https://github.com/lclevy/firepwd.git ~/opt/firepwd

# Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox/Thunderbird/Seabird) profiles
git clone https://github.com/unode/firefox_decrypt.git ~/opt/firefox_decrypt

# responder
# git clone https://github.com/SpiderLabs/Responder
apt install responder

# pwnedOrNot (checks for emails in data breaches)
git clone https://github.com/thewhiteh4t/pwnedOrNot.git

# mimikatz
git clone https://github.com/gentilkiwi/mimikatz.git ~/opt/mimikatz

# virtual-host-discovery
git clone https://github.com/jobertabma/virtual-host-discovery.git ~/opt/virtual-host-discovery
sed "s/\$/\.\%s/g" /usr/share/wordlists/SecLists/Discovery/DNS/fierce-hostlist.txt > ~/opt/virtual-host-discovery/wordlist_2.txt

# hash_extender
git clone https://github.com/iagox86/hash_extender.git ~/opt/hash_extender

# eviler-winrm
git clone https://github.com/swarley/eviler-winrm ~/opt/eviler-winrm
cd eviler-winrm && bundle config set path 'vendor/bundle' && bundle install

Python Packages

Package Install snippet Note
yq pip3 install yq
awscli pip3 install awscli
jupyter python3 -m pip install jupyter https://jupyter.org/install
jupyterlab pip3 install jupyterlab https://jupyter.org/install

pip installs:

apt-get update
apt-get install python3 python3-pip python3-dev git libssl-dev libffi-dev build-essential
python3 -m pip install --upgrade pip
python3 -m pip install --upgrade pwntools

pip install pyftpdlib

#pip3 install stego-lsb # https://github.com/ragibson/Steganography#WavSteg
#pip3 install stegcracker # https://github.com/Paradoxis/StegCracker

pip install termcolor

# oletools
### https://github.com/decalage2/oletools
# pip install -U oletools

# truffleHog - Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets accidentally committed.
### https://github.com/dxa4481/truffleHog
# pip3 install truffleHog

pip install pymysql # from craft HTB machine

pip3 install web3

Ruby Gems:

gem install mdless # markdown viewer in terminal
pspy - unprivileged linux process snooping

https://github.com/DominicBreuker/pspy

psby.exe

runas.exe streams.exe

https://github.com/gentilkiwi/mimikatz/releases https://github.com/gentilkiwi/mimikatz/releases/download/2.2.0-20190512/mimikatz_trunk.zip

https://packetstormsecurity.com/files/31140/nc.exe.html (also at /usr/share/windows-binaries/nc.exe)