Jump to content
  • Hello visitors, welcome to the Hacker World Forum!

    Red Team 1949  (formerly CHT Attack and Defense Team) In this rapidly changing Internet era, we maintain our original intention and create the best community to jointly exchange network technologies. You can obtain hacker attack and defense skills and knowledge in the forum, or you can join our Telegram communication group to discuss and communicate in real time. All kinds of advertisements are prohibited in the forum. Please register as a registered user to check our usage and privacy policy. Thank you for your cooperation.

    TheHackerWorld Official



Recommended Posts

  • Yasso

    强大的内网渗透辅助工具集-让Yasso像风一样 支持rdp,ssh,redis,postgres,mongodb,mssql,mysql,winrm等服务爆破,快速的端口扫描,强大的web指纹识别,各种内置服务的一键利用(包括ssh完全交互式登录,mssql提权,redis一键利用,mysql数据库查询,winrm横向利用,多种服务利用支持socks5代理执行)



    • 新版并未发布release版本,请自行clone去编译


      Yasso [command]
    Available Commands:
      all         Use all scanner module (.attention) Traffic is very big   
      completion  Generate the autocompletion script for the specified shell
      exploit     Exploits to attack the service
      help        Help about any command
      service     Detection or blasting services by module
      -h, --help            help for Yasso
          --output string   set logger file (default "result.txt")
    • all 一键扫描功能
    • exploit 常见服务利用(sqlserver,redis,ssh,向日葵等)
    • service 服务爆破和子扫描模块


Link to post
Link to comment
Share on other sites


discussion group

discussion group

    You don't have permission to chat.
    • Recently Browsing   0 members

      • No registered users viewing this page.
    • Create New...