Sifter: Fully Loaded Operations Center for Pentesters

Sifter is a fully stocked Op Centre for Pentesters. Made up of over 80 different tools. It combines a plethara of OSINT, recon and vulnerability analysis tools within catagorized modsets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the ‘blue’ vulnerabilities within microsoft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM.

Gathered info is saved to the results folder, these output files can be easily parsed over to TigerShark in order to be utilised within your campaign. Or compiled for a final report to wrap up a penetration test.

Notice

If you are the developer of any of the tools within Sifter and don’t think your tool is being utilized to its full potential please let me know and i will take another look or optionally you can make an edit to the execution script of your specific tool and submit a pull request and I will review it within 12hrs

Sifter Plugins

Sifter main menu

Menu

Tested OS

Working on:

Works on windows with linux-subsystem but please ensure docker is properly installed and configured,
following the instructions from docker website

Untested on mac, though theoretically the same should apply to mac as windows – regarding docker install & tools

Important

Please do not run sifter or the install as ROOT user. Use a regular user and give permissions only when needed.

Note

If a scan does not work correctly at first, remove web-protocol from target. eg:

Installation

For oneliner install (Deb Package), copy and paste the following code into a terminal:

wget https://github.com/s1l3nt78/sifter/releases/download/12/sifter_12.deb; sudo dpkg -i sifter_12.deb; sifter

For oneliner install (source), copy and paste the following into a terminal:

git clone https://github.com/s1l3nt78/sifter.git && cd sifter && bash install.sh

To install Sifter with plugins run: (Sifter Plugins can be found at https://github.com/Sifter-Ex)

git clone --recursive https://github.com/s1l3nt78/sifter; cd sifter; bash install.sh

Modules

  1. theHarvester
  2. Osmedeus
  3. ReconSpider
  4. Emagnet
  5. CredNinja
  6. OSINT-Framework
  1. Maryam
  2. Seeker
  3. Sherlock
  4. E2P (Email2Phone)
  5. CardPwn
  6. iKy
  7. GHunt
  1. DnsTwist
  2. Armory
  3. SpiderFoot
  4. Pulsar
  5. SubFinder
  6. SubDover
  1. ActiveReign
  2. iSpy
  3. SMBGhost
      – SMBGhost Scanner
      – SMBGhost Exploit
  1. DDoS
      – Dark-Star
      – Impulse
      – UFONet
  2. NekoBot
  3. xShock
  4. VulnX
  1. FindSploit
  2. ShodanSploit
  3. GitSearcher
  1. EoP Exploit (Privilege Escalation Exploit)
  2. Potatoes
      – BadPotato
      – SweetPotato
  3. PEAS
      – winPEAS
      – linPEAS
  4. WinPwn
  5. CredHarvester
  6. PowerSharp
  7. ACLight2
  8. PowerHub
  9. InveighZero
  1. DanderFuzz – Equation Group, Courtesy of the Shadow Brokers
      - FuzzBunch
      - Danderspritz
     (Provided by the F plugin.)
  2. CobaltStrike
      (Provided by the C plugin.)
  3. PHPSploit
  4. Thoron
  5. Metasploit
  1. TigerShark
  1. BruteDUM
  2. WBruter
  1. Mentalist
  2. DCipher
  3. Ciphey
  1. nMap
  2. WebMap
  3. AttackSurfaceMapper
  4. aSnip
  5. wafw00f
  6. Arp-Scan
  7. Espionage
  8. Intrigue-Core
  9. Responder
  1. HoneyCaught
  2. SniffingBear
  3. HoneyTel (telnet-iot-honeypot)
  4. HFish
  1. Flan
  2. Rapidscan
  3. Yuki-Chan
  4. Katana-VF (Vulnerability Framework)
  5. OWASP-Nettacker
  6. Big IP Remote Execution Scanner
  7. WeblogicScanner
  8. Vailyn
  1. RouterSploit
  2. MkCheck
  3. Airgeddon
  1. Sitadel
  2. OneFind
  3. AapFinder
  4. reNgine
  1. Nikto
  2. Blackwidow
  3. WordPress
      — WPScan
      — WPForce/Yertle
  4. Zeus-Scanner
  5. Dirb
  6. DorksEye
  7. Katana-DS (Dork Scanner)
  1. EventCleaner
  2. Threat Dragon
  3. TruffleSNout
  4. Snaffler
  5. Mitre-Attack Website
  1. SQLinjection
      — WhiteWidow
      — V3n0M-Scanner
  2. Cross-Site Scripting
      — XSStrike
      — finDOM-XSS
      — XSS-Freak

This was added in order to have a fun way to pass timeduring the more time intensive modules. Such as nMap Full Port scan or a RapidScan run.

Sifter Help menu
Exit mobile version