Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nhas/egressinator
Find what egress ports are allowed
https://github.com/nhas/egressinator
egress-filtering exfil exfiltration golang pentesting redteam
Last synced: 3 days ago
JSON representation
Find what egress ports are allowed
- Host: GitHub
- URL: https://github.com/nhas/egressinator
- Owner: NHAS
- Created: 2022-06-29T08:58:35.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2022-11-29T05:14:57.000Z (about 2 years ago)
- Last Synced: 2024-06-20T22:34:26.117Z (7 months ago)
- Topics: egress-filtering, exfil, exfiltration, golang, pentesting, redteam
- Language: Go
- Homepage:
- Size: 15.6 KB
- Stars: 13
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# egressinator
Trying to get out of a network? But have no idea what ports are allowed?
This might help.Egressinator was heavily inspired by https://github.com/trustedsec/egressbuster, but is now written in golang, as the other project has fallen into disrepair.
The server and client come as one package deal.A note, the server will not work on windows as it relies on iptables to redirect traffic.
# TLDR
```
git clone https://github.com/NHAS/egressinator.git
cd egressbuster
go build
```# Help
```
Egressinator
Determine unrestricted ports that can egress the network
Usage of client:
-address string
Address of egressbuster server
-range string
Range of TCP ports to check, e.g 1-1024 (default "1-1024")
-threads int
Number of threads (default 500)
-timeout int
Time before a connection is seen as invalid (in seconds) (default 3)
-verbose
Display more output
Usage of server:
-interface string
interface for server listener
-port int
The port the egress detector server will listen on (default 4344)
-src string
Source address for server to listen for client requests
```