{"id":14638057,"url":"https://github.com/TheBeastofwar/linuxhacker","last_synced_at":"2025-09-07T06:32:03.517Z","repository":{"id":206808715,"uuid":"717662280","full_name":"TheBeastofwar/linuxhacker","owner":"TheBeastofwar","description":"一款linux 内网渗透辅助工具","archived":false,"fork":false,"pushed_at":"2024-01-31T12:29:05.000Z","size":39,"stargazers_count":67,"open_issues_count":0,"forks_count":10,"subscribers_count":3,"default_branch":"master","last_synced_at":"2024-09-11T03:44:24.122Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Perl","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/TheBeastofwar.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2023-11-12T06:42:22.000Z","updated_at":"2024-09-05T09:25:00.000Z","dependencies_parsed_at":"2023-11-12T14:31:35.330Z","dependency_job_id":"7305af4c-9c71-475a-811e-943e5adb5c69","html_url":"https://github.com/TheBeastofwar/linuxhacker","commit_stats":null,"previous_names":["thebeastofwar/linuxhacker"],"tags_count":2,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/TheBeastofwar%2Flinuxhacker","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/TheBeastofwar%2Flinuxhacker/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/TheBeastofwar%2Flinuxhacker/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/TheBeastofwar%2Flinuxhacker/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/TheBeastofwar","download_url":"https://codeload.github.com/TheBeastofwar/linuxhacker/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":232183049,"owners_count":18484725,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-09-10T02:01:40.994Z","updated_at":"2025-01-02T10:31:26.289Z","avatar_url":"https://github.com/TheBeastofwar.png","language":"Perl","readme":"# linuxhacker\n## 使用方法\n```\n  _ _                  _                _             \n | (_)_ __  _   ___  _| |__   __ _  ___| | _____ _ __ \n | | | '_ \\| | | \\ \\/ / '_ \\ / _` |/ __| |/ / _ \\ '__|\n | | | | | | |_| |\u003e  \u003c| | | | (_| | (__|   \u003c  __/ |   \n |_|_|_| |_|\\__,_/_/\\_\\_| |_|\\__,_|\\___|_|\\_\\___|_|\n    \t\t\t\tversion: 1.1.0\n\nUsage: linuxhacker -p [plugin] -c [choice] -q [other]\nOptions:\n-p\tchoose the plugin\n-c\tchoose the choice for the corresponding plugin\n-q\tother parameter\n```\n插件:\n- env_check/1  选项: docker(检查是否处于docker环境),vm(检查是否处于虚拟机中)\n- privilege_check/2 选项: suid,sudo,cap,kernel\n- maintance/3 选项: ssh_soft_link/ssh1,ssh_public_key/ssh2,ssh_key_logger/ssh3,ssh_stealth_login/ssh4,cron,file\n- ssh_soft_link/ssh1 ssh软链接权限维持\n- ssh_public_key/ssh2 ssh写公钥权限维持\n- ssh_key_logger/ssh3 ssh key logger可以记录下别人ssh登录的密码\n- ssh_stealth_login/ssh4 ssh隐身登录,w,last等命令查找不到\n- cron 计划任务提权\n- file 更改文件的atime,mtiem,实现webshell和一些恶意代码的权限维持\n![7AOX{AWGI{Z`}%99`KQ8J76](https://github.com/TheBeastofwar/linuxhacker/assets/117450378/da5e7746-a74b-4f97-9a93-c40159d67536)\n![XF8~C6G2(KEBC8(`~K)E7MG](https://github.com/TheBeastofwar/linuxhacker/assets/117450378/7e2f3549-90d3-410e-a4c6-d8e3a74d5c68)\n![U~NJTH%OHJ5K IXLHKK9G6](https://github.com/TheBeastofwar/linuxhacker/assets/117450378/a43b5abe-5016-4b70-87fc-3f8358875fa9)\n## 详细使用方法\n- linuxhacker -p 1 -c docker\n- linuxhacker -p 1 -c vm\n- linuxhacker -p 2 -c suid -q /usr/sbin (如果没有-q,则默认/usr/bin)\n- linuxhacker -p 2 -c sudo\n- linuxhacker -p 2 -c cap -q /usr/sbin (如果没有-q,则默认/usr/bin)\n- linuxhacker -p 3 -c ssh1 -q \"user port\"(输入ssh软链接的user和port,用空格相隔)\n- linuxhacker -p 3 -c ssh2 -q \"publickey\"(输入ssh写公钥的公钥)\n- linuxhacker -p 3 -c ssh3 (ssh key logger)\n- linuxhacker -p 3 -c ssh4 (ssh  隐身登录)\n- linuxhacker -p 3 -c file -q \"/var/www/html/index.php /var/www/html/shell.php\"(将/var/www/html/shell.php的atime和ctime改为和/var/www/html/index.php一样)\n- linuxhacker -p 3 -c cron -q \"/etc/crontab#*  *  *  *  * root /root/test.sh\"(用#间隔)\n- linuxhacker -p 3 -c command -q \"/usr/bin/whoami#/tmp#whoami ; /home/hacker.sh\"(用#间隔)\n## 免责声明\n本工具仅面向**合法授权**的企业安全建设行为，如您需要测试本工具的可用性，请自行搭建靶机环境。\n在使用本工具进行检测时，您应确保该行为符合当地的法律法规，并且已经取得了足够的授权。**请勿对非授权目标进行扫描。**\n如您在使用本工具的过程中存在任何非法行为，您需自行承担相应后果，我们将不承担任何法律及连带责任。\n在安装并使用本工具前，请您**务必审慎阅读、充分理解各条款内容**，限制、免责条款或者其他涉及您重大权益的条款可能会以加粗、加下划线等形式提示您重点注意。\n除非您已充分阅读、完全理解并接受本协议所有条款，否则，请您不要安装并使用本工具。您的使用行为或者您以其他任何明示或者默示方式表示接受本协议的，即视为您已阅读并同意本协议的约束。\n## 开发日志\n### 2023 11.12 v1.0.0\n- 可探测当前linux系统所处环境(是否是docker,vm等)\n- 可探测当前linux系统的各种提权方法(suid,sudo等)\n- 自带一些权限维持的模块\n- 遗留问题:1.需要将perl写的内核漏洞探测工具用go重构 2.suid,sudo,capilities的if语句有中屎山代码的感觉 3.需要更改让部分模块的输入从fmt.Scanln改为直接Options传参,这样在使用webshell管理工具的时候能方便些\n\n### 2023 11.18 v1.1.0\n- 将交互型输入改为在命令行用-q参数输入\n","funding_links":[],"categories":["Perl"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FTheBeastofwar%2Flinuxhacker","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FTheBeastofwar%2Flinuxhacker","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FTheBeastofwar%2Flinuxhacker/lists"}