Open Collective
Open Collective
Loading
Sifter (Pearl: Version 9)
Published on August 5, 2020 by s1l3nt78


  


s1l3nt78

The Dead Bunny Club

Because enumeration is key



Release

Codename: Pearl
Version : 9.2


Additions

  • Potatoes 'n PEAS - Used for Privilege elevation in a low level session on a target machine
  • Potatoes
  • BadPotato
  • SweetPotato
  • PEAS
  • winPEAS
  • Thoron - Thoron Framework is a Linux post-exploitation framework
  • ODIN - Key feature is the data management and reporting.
  • '--> Database can be converted into an HTML report or a Neo4j graph database for visualizing the data.
  • SubFinder - Sub-Directory enumeration tool
  • reNgine - Automated reconnaissance framework for gathering information web applications.
  • Pulsar - Automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters.
  • Airgeddon - WiFi Security ToolKit
  • Anonsurf - Added to Anonymise your system while running recon or OSINT tasks


Removed

  • Omega's repo has been removed, thereefore unavailable for new clones. If you already had omega installed, you will still be able to use this module though.


Overview

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM.

Gathered info is saved to the results folder, these output files can be easily parsed over to TigerShark in order to be utilised within your campaign. Or compiled for a final report to wrap up a penetration test.


Setup Video

Demo Video - Its long, but you can skip through to get the general idea.

Most modules are explained along with demos of a lot of the tools


Releases


The latest release [Pearl] can be downloaded here

Older Releases can be found here



Tested OS

Working on: - Kali
- Parrot
- Ubuntu
- Linux (any distro)

Works on windows with linux-subsystem but please ensure docker is properly installed and configured,

following the instructions from docker website

nMap doesn't work on windows, due to port issues

but Zenmap (nMap GUI) can be used instead. A few other issues may arise too.

Untested on mac, though theoretically the same should apply to mac as windows - regarding docker install & tools


NOTE!!

If a scan does not work correctly at first, remove web-protocol from target.

eg. target.com - instead of http://target.com


Installation

* This will download and install all required tools

git clone https://github.com/s1l3nt78/sifter.git
cd sifter
chmod +x install.sh
./install.sh

* For oneliner install, copy and paste the following code into a terminal

git clone https://github.com/s1l3nt78/sifter.git && cd sifter && bash install.sh



Menu


Modules:

#Enterprise Information Gatherers

#Targeted Information Gatherers

#Domain Recon Gathering

#MicroSoft Exploitation

#Website Exploiters

#Exploit Searching

#Post-Exploitation

#Exploitation Frameworks

  • FuzzyDander - Equation Group, Courtesy of the Shadow Brokers
  • (Obtained through issue request.)
  • - FuzzBunch
  • - Danderspritz
  • NevrrMore - Private Exploitation framework I've been developing that will
  • not be released opensource. Due to certain 0days and other exploits/tools
  • it would cause too much unintentional/illintentioned damage.
  • Thoron
  • Metasploit

#Phishing

#BruteForcing

#Password Tools

#Network Scanners

#HoneyPot Detection Systems

#Vulnerability Scanners

#Router Tools

#WebApplication Scanners

#Website Scanners & Enumerators

#Web Mini-Games

  • This was added in order to have a fun way to pass time
  • during the more time intensive modules.
  • Such as nMap Full Port scan or a RapidScan run.


Sifter Help Menu

$ sifter runs the programs bringing up the menu in a cli environment

$ sifter -c will check the exsiting hosts in the hostlist

$ sifter -a '<target-ip>' must be added with '' and then automattically appends the hostname/IP to host file

$ sifter -e Opens the Exploitation Module

$ sifter -i Opens the Info-based Module menu

$ sifter -d Opens the Domain Focused Modules

$ sifter -n Opens the Network Mapping Modules menu

$ sifter -w Opens the Website Focused Modules

$ sifter -q Opens Router Focused Tools

$ sifter -b Opens the Web-App Focused Module menu

$ sifter -v Opens the Vulnerability Scanning Module Menu

$ sifter -m Opens the Module Menu directly

$ sifter -p opens the password tools for quick passlist generation or hash decryption

$ sifter -r opens the results folder for viewing of files or photos

$ sifter -u Checks for any updates on Github

$ sifter --stealth Starts sifter in Anonymous mode

$ sifter -z Opens the Module Information Menu

$ sifter -h This Help Menu


Other Projects


All information on projects in development can be found here.

For any requests or ideas on current projects please submit an issue request to the corresponding tool.

For ideas or collaboration requests on future projects., contact details can be found on the page.


GitHub Pages can be found here.

MkCheck = MikroTik Router Exploitation Tool

TigerShark = Multi-Tooled Phishing Framework



<!--########________________ VGhlIERlYWQgQnVubnkgQ2x1Yg== ________________########--!>