Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/NullArray/MIDA-Multitool
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
https://github.com/NullArray/MIDA-Multitool
bash bash-script enumeration exploit exploitation pentest pentesting privilege-escalation root shell shell-script vulnerability-identification
Last synced: 3 months ago
JSON representation
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
- Host: GitHub
- URL: https://github.com/NullArray/MIDA-Multitool
- Owner: NullArray
- License: gpl-3.0
- Created: 2017-02-01T22:17:52.000Z (almost 8 years ago)
- Default Branch: master
- Last Pushed: 2019-08-23T13:12:41.000Z (about 5 years ago)
- Last Synced: 2024-05-15T13:41:47.294Z (6 months ago)
- Topics: bash, bash-script, enumeration, exploit, exploitation, pentest, pentesting, privilege-escalation, root, shell, shell-script, vulnerability-identification
- Language: Shell
- Size: 39.1 KB
- Stars: 160
- Watchers: 15
- Forks: 78
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# MIDA - Multitool
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.MIDA Multitool draws functionality from several of my previous scripts namely [SysEnum](https://github.com/NullArray/SysEnum) and [RootHelper](https://github.com/NullArray/RootHelper) and is in some regards RootHelpers successor, or sister script at the very least.
Besides functionality from these two previous scripts it incorporates some of it's own and as such aims to be a comprehensive assistant for operations and utilities related to system enumeration, vulnerability identification,
exploitation and privilege escalation.## Usage
After a system has been succesfully compromised MIDA should be downloaded to the host in question either with `git` or `wget`, after it has been unpacked/cloned the shellscript needs to be made executable with `chmod +x mida.sh`
Upon doing so it can be run on the target host. The options available to the user are below.
The 'Usage' option prints this informational message. The option 'System Enumeration' attempts to retrieve system information such as OS and kernel details, network status, processes, system logs and more. 'Common Utilities' checks for the existence of
useful utilities such as telnet, netcat, tcpdump etc. 'External Utilities' opens a menu which lets you download external utilities that may prove to be helpful with further enumeration, vulnerability identification and privilege escalation.Finally the option 'Cleartext Credentials' searches for text and web application files that contain certain keywords in order to find potential cleartext passwords.
### Scripts available for download with MIDA
[LinEnum](https://github.com/rebootuser/LinEnum) by [RebootUser](https://github.com/rebootuser)
[Firmwalker](https://github.com/craigz28/firmwalker) by [Craigz28](https://github.com/craigz28)
[BashArk](https://github.com/TheSecondSun/Bashark) by [TheSecondSun](https://github.com/TheSecondSun)
[LUNAR](https://github.com/lateralblast/lunar) by [Lateralblast](https://github.com/lateralblast)
[Linux Priv Checker](http://www.securitysift.com/download/linuxprivchecker.py) by [SecuritySift](http://www.securitysift.com)
[Linux Exploit Suggester](https://github.com/jondonas/linux-exploit-suggester-2) by [Jondonas](https://github.com/jondonas)
[Unix Priv-Esc Check](https://github.com/pentestmonkey/unix-privesc-check) by [Pentestmonkey](https://github.com/pentestmonkey)