Exploitation Tools
Cyberstrike integrates exploitation tools for authorized penetration testing.
Danger
Only use exploitation tools on systems you have explicit permission to test.
SQL Injection
SQLMap
Automated SQL injection exploitation:
cyberstrike> Test https://example.com/page?id=1 for SQL injection with sqlmapWeb Exploitation
WPScan
WordPress vulnerability scanner:
cyberstrike> Scan the WordPress site at example.com with wpscanCommix
Command injection exploitation:
cyberstrike> Test example.com/cmd?input=test for command injectionPassword Attacks
Hydra
Network login brute-forcer:
cyberstrike> Brute force SSH login on 192.168.1.1 with common credentialsJohn the Ripper
Password hash cracker:
cyberstrike> Crack the password hashes in hashes.txtPost-Exploitation
LinPEAS / WinPEAS
Privilege escalation scripts:
cyberstrike> Run privilege escalation enumeration on the targetReporting
After exploitation, generate reports:
cyberstrike> Generate a penetration test report for this session