I maintain a modified version of Kali I use as the basis for my testing which includes a variety of extra tools, preference, references, etc. If you want a copy yourself, you can find one here:
https://drive.google.com/drive/folders/1id6hRacVUtcQRtq8zjSkxtTSE3AvxTk3?usp=sharing
Each version is named for a different character played by Henry Winkler, for the record.
Changelog:
###################################
#
# Hermit’s Haxorin’ VM
#
# Version: 3.0 (codename: Chuck Lumley)
# Updated: 2018-07-21
#
#########################################
# Changelog
#########################################
#
#
# 3.0: Chuck Lumley
# ——————————
# > Full dist-upgrade for all Kali tools
# > Added rot-all.sh to /pentest/helpers and alias (rot-all)
# > Added ascii-to-bin.sh to /pentest/helpers and sourced from .bashrc (provides binary/ASCII conversion via terminal)
# > Added general-assist.sh to /pentest/helpers and sourced from .bashrc (provides general helper functions)
# > Added ll alias to ‘ls -la’
# > Added vprep.sh and vread.sh to /pentest/helpers (Vectivus handlers) and aliases (vprep/vread)
# > Added make-image-viewer.sh to /pentest/helpers and alias (mkimgview)
# > Added wgm.sh to /pentest/helpers and alias (wgm)
# > Updated VMWare proprietary tools
# > Added grokevt (Windows event log search and analysis)
# > Switched default Firefox search engine to Duck Duck Go
# > Cleaned up Firefox links, added links to StackAttack, Vectivus, and Cryptolingus
# > Added redsnarf (Windows credential capture, written in Python)
# > Added Linux Exploit Suggester to /pentest/helpers
# > Added strace (system call tracing)
#
# 2.0: Benedict Slade
# ——————————
# > Fixed GPG key issue on Kali
# > Full dist-upgrade for all Kali tools
# > Added /pentest/screenshots directory
# > Created new default terminal profile (Hermit Default) to remove transparency
# > Added multiple SANS cheat sheets and quick references to References/SANS
# > Added PentestMonkey’s Unix Privilege Escalation check script to /pentest/helpers and alias (unixpe)
# > Added gnome-screenshot and placed in favorites bar
# > Added httpscreenshot to /pentest/helpers and alias (httpscreenshot)
# > Added jxplorer (LDAP browser) to /pentest/helpers
# > Added basic buffer overflow fuzzer (bbof) to /pentest/helpers and alias (bbof)
# > Added Steganography Toolkit (Docker-based steg tools) with /root/stegdata as
# the /data directory and alias (run-stego-toolkit)
#
#########################################
# 1.0: The Fonz (Initial Relase)
# ——————————
# > Added VMWare tools
# > Added crackmapexec
# > Added backup-engagement.sh to /pentest/helpers
# > Added setup-engagement.sh to /pentest/helpers
# > Added takenote.sh to /pentest/helpers
# > Added find-nmap-targets.sh to /pentest/helpers
# > Added runptcommand.sh to /pentest/helpers
# > Added standard VMWare share mount alias (cdshared)
# > Added standard log alias (cdptlogs)
# > Added aliases for helpers (runptc, nms, tn, begin-engagement, backup-engagement)
# > Added cron job to automatically backup keepnote records
# > Added OWASP cheat sheets to /root/References (Attack Surface, REST, WebApp, XML, XSS)
# > Reconfigured task bar settings and display
# > Disabled grouped window ALT+TAB behavior
# > Added CGI-BIN exploit reference to /root/References
# > Added auto_xor_decryptor to /pentest/helpers and alias (autoxor)
# > Added webpwn3r to /pentest/helpers and alias (webpwn3r)
# > Added passivedns to /pentest/helpers, not configured
# > Added Stegsolve to /pentest/helpers and alias (stegsolve)
# > Added ParanoiDF to /pentest/helpers and alias (paranoidf)
# > Added pdfTools to /pentest/helpers
# > Added hashdeep to /pentest/helpers, not configured
# > Added MainEnglishDictionary from Probable-Wordlists to /usr/share/wordlists
# > Pre-exploded /usr/share/wordlists/rockyou.txt
# > Added my standard RFI PHP webshell generator to /usr/share/webshells/php
# > Added OpenSSL common commands to /root/References
# > Added HTML and XHTML Escape Code Reference to /root/References
# > Added LFI via PHP Bypass reference to /root/References
# > Added link to Firefox for CVE POCs
# > Configured msfdb to start at boot, initiated/built database
# > Configured msfconsole to use msfdb
# > Added password cracking format search cheat sheet to /root/References
# > Built install_history in /root/References in case all of this has to be done again
# > Added PTES references to /root/References/PTES
# > Added Penetration Testing Tools Cheat Sheet to /root/References
# > Added LFI Cheat Sheet to /root/References
Like this:
Like Loading...
Related