{"id":14235863,"url":"https://github.com/NullArray/MIDA-Multitool","last_synced_at":"2025-08-11T00:33:03.066Z","repository":{"id":140847990,"uuid":"80670173","full_name":"NullArray/MIDA-Multitool","owner":"NullArray","description":"Bash script purposed for system enumeration, vulnerability identification and privilege escalation.","archived":false,"fork":false,"pushed_at":"2019-08-23T13:12:41.000Z","size":40,"stargazers_count":162,"open_issues_count":4,"forks_count":78,"subscribers_count":15,"default_branch":"master","last_synced_at":"2024-12-10T01:32:57.245Z","etag":null,"topics":["bash","bash-script","enumeration","exploit","exploitation","pentest","pentesting","privilege-escalation","root","shell","shell-script","vulnerability-identification"],"latest_commit_sha":null,"homepage":null,"language":"Shell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/NullArray.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2017-02-01T22:17:52.000Z","updated_at":"2024-10-19T06:00:13.000Z","dependencies_parsed_at":null,"dependency_job_id":"7ba773b6-bdf6-4a2e-b33e-53ed0f07f85c","html_url":"https://github.com/NullArray/MIDA-Multitool","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NullArray%2FMIDA-Multitool","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NullArray%2FMIDA-Multitool/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NullArray%2FMIDA-Multitool/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NullArray%2FMIDA-Multitool/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/NullArray","download_url":"https://codeload.github.com/NullArray/MIDA-Multitool/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":229478742,"owners_count":18079376,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bash","bash-script","enumeration","exploit","exploitation","pentest","pentesting","privilege-escalation","root","shell","shell-script","vulnerability-identification"],"created_at":"2024-08-20T21:02:25.939Z","updated_at":"2024-12-13T01:30:49.581Z","avatar_url":"https://github.com/NullArray.png","language":"Shell","readme":"# MIDA - Multitool\nBash script purposed for system enumeration, vulnerability identification and privilege escalation.\n\nMIDA Multitool draws functionality from several of my previous scripts namely [SysEnum](https://github.com/NullArray/SysEnum) and [RootHelper](https://github.com/NullArray/RootHelper) and is in some regards RootHelpers successor, or sister script at the very least. \n\nBesides functionality from these two previous scripts it incorporates some of it's own and as such aims to be a comprehensive assistant for operations and utilities related to system enumeration, vulnerability identification,\nexploitation and privilege escalation. \n\n\n## Usage\n\nAfter a system has been succesfully compromised MIDA should be downloaded to the host in question either with `git` or `wget`, after it has been unpacked/cloned the shellscript needs to be made executable with `chmod +x mida.sh`\n\nUpon doing so it can be run on the target host. The options available to the user are below.\n\nThe 'Usage' option prints this informational message. The option 'System Enumeration' attempts to retrieve system information such as OS and kernel details, network status, processes, system logs and more. 'Common Utilities' checks for the existence of\nuseful utilities such as telnet, netcat, tcpdump etc. 'External Utilities' opens a menu which lets you download external utilities that may prove to be helpful with further enumeration, vulnerability identification and privilege escalation.\n\nFinally the option 'Cleartext Credentials' searches for text and web application files that contain certain keywords in order to find potential cleartext passwords. \n\n### Scripts available for download with MIDA\n\n[LinEnum](https://github.com/rebootuser/LinEnum) by [RebootUser](https://github.com/rebootuser)\n\n[Firmwalker](https://github.com/craigz28/firmwalker) by [Craigz28](https://github.com/craigz28)\n\n[BashArk](https://github.com/TheSecondSun/Bashark) by [TheSecondSun](https://github.com/TheSecondSun)\n\n[LUNAR](https://github.com/lateralblast/lunar) by [Lateralblast](https://github.com/lateralblast)\n\n[Linux Priv Checker](http://www.securitysift.com/download/linuxprivchecker.py) by [SecuritySift](http://www.securitysift.com)\n\n[Linux Exploit Suggester](https://github.com/jondonas/linux-exploit-suggester-2) by [Jondonas](https://github.com/jondonas)\n\n[Unix Priv-Esc Check](https://github.com/pentestmonkey/unix-privesc-check) by [Pentestmonkey](https://github.com/pentestmonkey)\n\n","funding_links":[],"categories":["Shell"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FNullArray%2FMIDA-Multitool","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FNullArray%2FMIDA-Multitool","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FNullArray%2FMIDA-Multitool/lists"}