Skip to content

Latest commit

 

History

History
55 lines (35 loc) · 1.02 KB

File metadata and controls

55 lines (35 loc) · 1.02 KB
description
GitHub Armory

⚔ Tools & Exploits

Tools

RustScan

Repo:

{% embed url="https://github.com/RustScan/RustScan" %} GitHub Repo {% endembed %}

Run as Docker (Recommended):

docker run -it --rm --name rustscan rustscan/rustscan:1.10.0 <rustscan arguments here> <ip address to scan>

Establish an Alias:

alias rustscan='sudo docker run -it --rm --name rustscan rustscan/rustscan:1.10.0'

Make alias persistent:

funcsave rustscan

#funcsave: wrote /home/user/.config/fish/functions/rustscan.fish

We can now run as:

rustscan 192.168.1.0/24 -t 500 -b 1500 -- -A

Due to the sheer versatility of RustScan, use the following guide:

{% embed url="https://github.com/RustScan/RustScan/wiki/Things-you-may-want-to-do-with-RustScan-but-don't-understand-how" %} GitHub Repo {% endembed %}

Exploits

Potatoes

SweetPotato -- The privilege escalation exploit to rule them all

{% embed url="https://github.com/CCob/SweetPotato" %}