Sh00t is a testing environment for manual security testers. Security Testing is not as simple as right click > Scan. It’s messy, a tough game.
What if you had missed to test just that one thing and had to regret later? Sh00t is a highly customizable, intelligent platform that understands the life of bug hunters and emphasises on manual security testing.
Also Read : Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters
Sh00t requires Python 3 and a few more packages. The simplest way to set up Sh00t is using Conda Environments. However, Anaconda is optional if you have Python 3 and pip installed – you can jump to step 4 below.
Pre-requisite – One time setup:
Anaconda Prompt
and run all the below commands in that window only.conda create -n sh00t python=3.6
conda activate sh00t
. If you see an error message like CommandNotFoundError: Your shell has not been properly configured to use 'conda activate'.
, you have to manually enable conda command. Follow the instructions shown with the error message. You may have to reload your bash profile or restart your terminal. Try activating sh00t again: conda activate sh00t
. You should be seeing (sh00t) XXXX$
in your terminal.https://github.com/pavanw3b/sh00t
. git clone
requires installation of Git.cd sh00t
. Note that this is the outer-most sh00tdirectory in project files. Not sh00t/sh00t.pip install -r requirements.txt
python manage.py migrate
python manage.py createsuperuser
and follow the UI to create an account.python reset.py
.That’s all for the first time. Follow the next steps whenever you want to start Sh00t.
Starting Sh00t:
If you have Python 3 installed on your machine, you can jump to Step 3.
Anaconda Prompt
.conda activate sh00t
cd sh00t
python manage.py runserver
Ctrl + C
conda deactivate
.cd sh00t
Ctrl + C
git pull
or download the source from github and replace the files.conda activate sh00t
pip install -r requirements.txt
python manage.py migrate
python manage.py runserver
Sh00t is written in Python and powered by Django Web Framework. If you are stuck with any errors, Googling on the error message, should help you most of the times. If you are not sure, please file a new issue on github.
Begin with creating a new Assessment. Choose what methodology you want to test with.
Today there are 330 test cases, grouped into 86 Flags, belonging to 13 Modules which are created with reference to “Web Application Hacker’s Handbook” Testing Methodology.
Modules & Flags can be handpicked & customized. Once Assessments are created with the Flags, now the tester has to test them either manually, or semi automated with the help of scanners, tools or however it’s required, mark it “Done” on completion.
While performing assessment we often come with custom test cases that is specific to certain scenario in the application. A new Flag can be created easily at any point of time.
Whenever a Flag is confirmed to be a valid bug, a Sh0t can be created. One can choose a bug template that matches best, and sh00t will auto fill the bug report based on the template chosen.
Who can use Sh00t?
Credit: Hari Valugonda,Mohd Aqeel Ahmed,Ajeeth Rakkappan
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…