[Full-disclosure] Hackersh 0.1 Release Announcement

2013-04-03 Thread Itzik Kotler
Hi All,

I am pleased to announce the first version of Hackersh (
http://www.hackersh.org).

Hackersh ("Hacker Shell") is a free and open source shell (command
interpreter) written in Python with built-in security commands, and
out-of-the-box wrappers for various security tools, using Pythonect as its
scripting engine. Pythonect is a new, experimental, general-purpose
high-level dataflow programming language based on Python. It aims to
combine the intuitive feel of shell scripting (and all of its perks like
implicit parallelism) with the flexibility and agility of Python.

The combination of the two makes:

"http://localhost"; -> url -> nmap -> w3af -> print

An actual workflow that takes 'http://localhost', parses it as a URL, scans
it for open ports (via Nmap), and for each HTTP service - launches a
separate web vulnerabilities scan (via W3af).

Curious about the output? Here's a screenshot:
http://hackersh.org/hackersh000dev0_1.png

Hackersh is not limited to penetration testing and can be applied to other
security domains including but not limited to: malware analysis,
vulnerability development and intelligence gathering (OSINT).

You can read more about Hackerh and its features at:
http://blog.ikotler.org/2013/04/hackersh-01-release-announcement.html

If you have any questions, do not hesitate to contact me

Regards,
Itzik Kotler | http://www.ikotler.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Fuzzing Like A Boss with Pythonect

2012-09-17 Thread Itzik Kotler
Hi All,

I wanted to share with you a post I wrote about how to fuzz with Pythonect:

http://blog.ikotler.org/2012/09/fuzzing-like-boss-with-pythonect.html

Pythonect is a new, experimental, general-purpose dataflow programming
language based on Python.

It aims to combine the intuitive feel of shell scripting (and all of its
perks like implicit parallelism) with the flexibility and agility of Python.

Crazy? Most definitely. And yet, strangely enough, it works!


In this post I describe how to use Pythonect and all of its perks to fuzz
file formats, network protocols, and command line arguments.

Additionally I provide some simple examples: command-line arguments fuzzer,
FTP MKD fuzzer, and two generic file fuzzers.

I'd appreciate any feedback you can give me on the content. Also, feel free
to share with people who might be interested in the topic.

Regards,
Itzik Kotler | http://www.ikotler.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/