Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool, Seatbelt. It includes nearly all modules from Seatbelt, focusing on remote execution capabilities.
Designed for cybersecurity professionals, Carseat is particularly useful for gathering system information and assessing security configurations on target hosts.
However, privileged access is typically required to execute its modules effectively.
Carseat relies on two non-standard Python libraries: impacket
and pefile
. These can be installed individually or via a requirements file:
bashpip3 install -r requirements.txt
Carseat provides flexibility in executing commands. Below are examples of its usage:
python CarSeat.py domain/user:password@10.10.10.10 AntiVirus
python CarSeat.py domain/user:password@10.10.10.10 AntiVirus,UAC,ScheduledTasks
python CarSeat.py -group remote domain/user:password@10.10.10.10 InterestingProcesses
python CarSeat.py -group remote domain/user:password@10.10.10.10 ExplicitLogonEvents 10
Carseat supports authentication via passwords, NTLM hashes, or Kerberos tickets, similar to other impacket
tools.
Carseat includes a wide range of modules for system auditing and forensic analysis, such as:
AntiVirus
, WindowsDefender
, and UAC
help identify defensive measures.OSInfo
and InstalledProducts
provide insights into the operating system and installed software.LogonEvents
and ProcessCreationEvents
parse event logs for sensitive data.ChromiumHistory
and FirefoxHistory
.CloudCredentials
and CredGuard
identify stored credentials or related configurations.While Carseat mirrors Seatbelt’s functionality, it focuses exclusively on modules supporting remote execution. The -group remote
flag ensures all available modules are executed remotely.
Carseat builds upon the foundational work of Will (@harmj0y) and Lee (@tifkin_), the creators of Seatbelt, with additional event log parsing inspired by Iwan Timmer’s tivan project.
Carseat is a powerful tool for security auditing and reconnaissance, offering extensive functionality for remote environments while maintaining compatibility with existing Seatbelt workflows1.
BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…
ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…
Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…
Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…
FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…
Pyda is an innovative tool designed to simplify dynamic binary analysis by allowing developers to…