Skip to content

A modern IPv6 discovery, and exploitation toolkit that supports various IPv6 CVE exploits from the past decade with Python3 & Scapy.

License

Notifications You must be signed in to change notification settings

Th3Tr1ckst3r/Exip6

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Exip6 Logo

Exip6

License GitHub Stars GitHub Forks GitHub Issues

A modern IPv6 discovery, and exploitation toolkit that supports various IPv6 CVE exploits from the past decade with Python3 & Scapy.

About

Exip6 started out as a relatively simple tool I built to verify wether my own systems were vulnerable to a select few of the Windows IPv6 CVE's supported by Exip6. After awhile, I found myself, & other researchers using similar tools while trying to debug various IPv6 bugs.

Why Use Exip6?

If your a security researcher, pentester, or just work I.T. in your department. It can be useful when it comes to the IPv6 protocol for discovery purposes, or just checking if any Windows systems on your network may be vulnerable to recent bugs.

Features

  • Blazing fast speeds, stability, & control.
  • Powered by Python3, Scapy, & NMap with multiprocessing, & even some multithreading.
  • Verifiable Proof-of-Concept payloads for testing if systems in your network are vulnerable.
  • Two modes to keep things simple which serve as the foundation of the framework: Discovery mode, & Exploit mode.
  • Automated IPv6 discovery mode with optimized NMap scanning all being handled in the background.
  • Verbose output that can actually be of use when required for debugging even the toughest situations.
  • Control over RA packets when discovery matters, but you don't want to trigger your network protection systems.

And more!

Installation Notice

Exip6 uses Python3 natively, so you will need to have it installed before proceeding. Currently, Exip6 only supports Linux due to network stack constraints with the Windows operating system, & Scapy.

You will also have to be able to run sudo, or as root user.

Once you have Python3 installed, you can follow the steps below.

Required Libraries Install Guide

To use Exip6, the following Python3 libraries will need to be installed. You can install them using the Python package manager pip. It is also highly recommended that you use a virtual environment with venv. Below are the installation instructions for each library that are not part of the standard Python3 library:

pip install scapy
pip install nmap3
pip install dnspython
pip install mac-vendor-lookup

With these libraries installed, you can proceed to with using Exip6!

Contributors

I welcome you to contribute code to Exip6, and thank you for your contributions, feedback, and support.

Disclaimer

Only use on systems, & servers you have explicit permission to. Your actions are your own.

About

A modern IPv6 discovery, and exploitation toolkit that supports various IPv6 CVE exploits from the past decade with Python3 & Scapy.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Languages