Pocsuite3 : Open-Sourced Remote Vulnerability Testing Framework

Pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.

It comes with a powerful proof-of-concept engine, many powerful features for the ultimate penetration testers and security researchers.

Features

  • PoC scripts can running with attack,verify, shell mode in different way
  • Plugin ecosystem
  • Dynamic loading PoC script from any where (local file, redis , database, Seebug …)
  • Load multi-target from any where (CIDR, local file, redis , database, Zoomeye, Shodan …)
  • Results can be easily exported
  • Dynamic patch and hook requests
  • Both command line tool and python package import to use
  • IPV6 support
  • Global HTTP/HTTPS/SOCKS proxy support
  • Simple spider API for PoC script to use
  • Integrate with Seebug (for load PoC from Seebug website)
  • Integrate with ZoomEye (for load target from ZoomEye Dork)
  • Integrate with Shodan (for load target from Shodan Dork)
  • Integrate with Ceye (for verify blind DNS and HTTP request)
  • Friendly debug PoC scripts with IDEs
  • More …

Also Read – CHAOS : PoC that Allow Generate Payloads & Control Remote OS

Screenshots

pocsuite3 console mode

pocsuite3 shell mode

pocsuite3 load PoC from Seebug

pocsuite3 load multi-target from ZoomEye

pocsuite3 load multi-target from Shodan

Requirements

Python 3.4+
Works on Linux, Windows, Mac OSX, BSD

Installation

The quick way:

$ pip install pocsuite3

Or click here to download the latest source zip package and extract

$ wget https://github.com/knownsec/pocsuite3/archive/master.zip
$ unzip master.zip

The latest version of this software is available from: http://pocsuite.org

Disclaimer

Usage of pocsuite for attacking targets without prior mutual consent is illegal.pocsuite is for security testing purposes only.

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

15 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

15 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago