From 9521ae2e65d779d6c4035ce6c05a135501d9b50b Mon Sep 17 00:00:00 2001 From: axi0m Date: Wed, 2 Aug 2023 09:09:18 -0500 Subject: [PATCH] Add formatted __init__ --- .github/workflows/codeql.yml | 2 +- .gitignore | 3 + .isort.cfg | 2 + .pre-commit-config.yaml | 7 +- GitHub_Tools_List.csv | 471 +------------------------------- poetry.lock | 133 ++++++++- pyproject.toml | 1 + sbom.json | 1 + sbom.xml | 1 + src/ratatoskr/__init__.py | 42 +-- src/ratatoskr/convert_to_csv.py | 4 +- src/ratatoskr/ratatoskr.py | 8 +- src/tests/ratatoskr_test.py | 1 + 13 files changed, 177 insertions(+), 499 deletions(-) create mode 100644 .isort.cfg create mode 100644 sbom.json create mode 100644 sbom.xml diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index 70a0fcb..8ee5226 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -43,6 +43,6 @@ jobs: uses: github/codeql-action/init@v2 with: languages: ${{ matrix.language }} - + - name: Perform CodeQL Analysis uses: github/codeql-action/analyze@v2 diff --git a/.gitignore b/.gitignore index 9a785c4..b09acb3 100644 --- a/.gitignore +++ b/.gitignore @@ -233,3 +233,6 @@ tracker.db # Ignore pyenv files .python-version + +# Exclude runner +runner.sh diff --git a/.isort.cfg b/.isort.cfg new file mode 100644 index 0000000..5d7bf33 --- /dev/null +++ b/.isort.cfg @@ -0,0 +1,2 @@ +[tool.isort] +profile = "black" diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml index a29cc9d..51722fb 100644 --- a/.pre-commit-config.yaml +++ b/.pre-commit-config.yaml @@ -1,6 +1,6 @@ repos: - repo: https://github.com/pre-commit/pre-commit-hooks - rev: v4.3.0 + rev: v4.4.0 hooks: - id: trailing-whitespace - id: end-of-file-fixer @@ -8,10 +8,11 @@ repos: - id: check-toml - id: check-added-large-files - repo: https://github.com/psf/black - rev: 22.6.0 + rev: 23.7.0 hooks: - id: black - repo: https://github.com/PyCQA/isort - rev: 5.10.1 + rev: 5.12.0 hooks: - id: isort + args: ["--profile", "black"] diff --git a/GitHub_Tools_List.csv b/GitHub_Tools_List.csv index 400edf8..3ea49d1 100644 --- a/GitHub_Tools_List.csv +++ b/GitHub_Tools_List.csv @@ -1,468 +1,5 @@ Repo,Category,Currently Used with Approved Aggressor Collection,Added Date -https://github.com/0x09AL/RsaTokenExtractor,.NET Assembly C# Tools,, -https://github.com/0xhexmex/Aggressor-Scripts,aggscripts,revisit, -https://github.com/0xthirteen/CleanRunMRU,.NET Assembly C# Tools,, -https://github.com/0xthirteen/MoveKit,.NET Assembly C# Tools,, -https://github.com/0xthirteen/SharpMove,.NET Assembly C# Tools,, -https://github.com/0xthirteen/SharpRDP,.NET Assembly C# Tools,, -https://github.com/0xthirteen/SharpStay,.NET Assembly C# Tools,, -https://github.com/0xthirteen/StayKit,.NET Assembly C# Tools,, -https://github.com/3gstudent/SharpRDPCheck,.NET Assembly C# Tools,, -https://github.com/3xpl01tc0d3r/Obfuscator,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,keep an eye out on this one for later, -https://github.com/3xpl01tc0d3r/ProcessInjection,Payload/Shellcode Injection/Loaders,Assembly shellcode injector to be used with Obfuscator, -https://github.com/Aetsu/OffensivePipeline,DevOps,to be used at a later date when we figure out DevOps tooling, -https://github.com/airzero24/WMIReg,.NET Assembly C# Tools,, -https://github.com/ajpc500/BOFs,BOF,come back later – BOFs for shellcode injection, -https://github.com/AlessandroZ/BeRoot,PrivEsc Tools,python tool … doesnt work with CS execute assembly, -https://github.com/AlessandroZ/LaZagne,Cracking & Password Tools,python EXE – does not work with CS execute assembly, -https://github.com/alphaSeclab/all-my-collection-repos,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/alphaSeclab/windows-security,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/am0nsec/SharpHellsGate,.NET Assembly C# Tools,, -https://github.com/am0nsec/sharptools,.NET Assembly C# Tools,, -https://github.com/An0nUD4Y/Evilginx2-Phishlets,Phishign Tools,phishlet profiles for EvilNginx2, -https://github.com/anthemtotheego/SharpCradle,.NET Assembly C# Tools,, -https://github.com/anthemtotheego/SharpExec,.NET Assembly C# Tools,, -https://github.com/antonioCoco/Mapping-Injection,Payload/Shellcode Injection/Loaders,keep an eye out on this one for later, -https://github.com/antonioCoco/RoguePotato,PrivEsc Tools,C++ assembly will not work with CS execute assembly, -https://github.com/antonioCoco/RogueWinRM,PrivEsc Tools,C++ assembly will not work with CS execute assembly.. also triggers bits service locally, -https://github.com/antonioCoco/RunasCs,.NET Assembly C# Tools,, -https://github.com/AonCyberLabs/Windows-Exploit-Suggester,Other Tools and Scripts,offline windows exploit suggester – parses systeminfo , -https://github.com/api0cradle/UltimateAppLockerByPassList,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/ashemery/exploitation-course,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/b4rtik/SharpKatz,.NET Assembly C# Tools,, -https://github.com/b4rtik/SharpMiniDump,.NET Assembly C# Tools,, -https://github.com/BankSecurity/Red_Team,Other Tools and Scripts,keep an eye out on this one for later, -https://github.com/bats3c/ChromeTools,aggscripts,didnt work on my win10 build… revisit at some point, -https://github.com/bats3c/darkarmour,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,keep an eye out on this one for later, -https://github.com/bats3c/Ghost-In-The-Logs,Evasion Tools,dont think we need.. disables/enables ETW … could open up additional vulns on target, -https://github.com/bitsadmin/fakelogonscreen,.NET Assembly C# Tools,, -https://github.com/bitsadmin/nopowershell,.NET Assembly C# Tools,, -https://github.com/bitsadmin/wesng,Exploits,offline windows exploit suggester – parses systeminfo , -https://github.com/BloodHoundAD/SharpHound3,.NET Assembly C# Tools,, -https://github.com/boh/RedCsharp,.NET Assembly C# Tools,, -https://github.com/bohops/Notes,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/bohops/SharpCradle,.NET Assembly C# Tools,, -https://github.com/bohops/SharpRDPHijack,.NET Assembly C# Tools,, -https://github.com/byt3bl33d3r/CrackMapExec,Other Tools and Scripts,kali manages updates to toolkit.. install via apt or python, -https://github.com/byt3bl33d3r/OffensiveDLR,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/byt3bl33d3r/OffensiveNim,Payload/Shellcode Generators/Runners,keep an eye out on this one for later, -https://github.com/byt3bl33d3r/SILENTTRINITY,C2 Frameworks,keep an eye out on this one for later, -https://github.com/byt3bl33d3r/SprayingToolkit,Other Tools and Scripts,password spraying toolkit for OWA etc..., -https://github.com/byt3bl33d3r/UhOh365,MS Office Tools,o365 email enum tool, -https://github.com/byt3bl33d3r/WitnessMe,OSINT/Recon Tools,eyewitness alternative with added features, -https://github.com/bytecode77/r77-rootkit,Rootkits,need to look into this more.. its got some unique capabilities, -https://github.com/bohops/WSMan-WinRM,.NET Assembly C# Tools,,44313.0 -https://github.com/bytecode77/self-morphing-csharp-binary,.NET Assembly C# Tools,, -https://github.com/c6fc/npk,Cracking & Password Tools,password cracking with AWS services, -https://github.com/carlospolop/hacktricks,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite,PrivEsc Tools,added winpeas assembly and included modules within POSTEXSTRIKE,44319.0 -https://github.com/CCob/MirrorDump,Memory Dumping/Scraping Tools,installs an LSA plugin.. apparently not opsec safe, -https://github.com/CCob/SharpBlock,.NET Assembly C# Tools,, -https://github.com/CCob/SweetPotato,PrivEsc Tools,, -https://github.com/Ch0pin/AVIator,Payload/Shellcode Generators/Runners,come back later … do not think it takes in stageless shellcode, -https://github.com/ChadSki/SharpNeedle,.NET Assembly C# Tools,, -https://github.com/checkymander/Carbuncle,.NET Assembly C# Tools,,44308.0 -https://github.com/checkymander/Sharp-SMBExec,.NET Assembly C# Tools,doesnt seem to work, -https://github.com/checkymander/Sharp-WMIExec,.NET Assembly C# Tools,doesnt seem to work, -https://github.com/checkymander/sshiva,.NET Assembly C# Tools,,44309.0 -https://github.com/chrismaddalena/SharpCloud,.NET Assembly C# Tools,no need to use – seatbelt rolled in functionality, -https://github.com/chryzsh/Aggressor-Scripts,aggscripts,,44316.0 -https://github.com/Coalfire-Research/Vampire,aggscripts,can revisit later… we dont currently use bloodhound during ops, -https://github.com/cobbr/C2Bridge,C2 Frameworks,Covenant Tool, -https://github.com/cobbr/Covenant,C2 Frameworks,C2 framework, -https://github.com/cobbr/SharpGen,.NET Assembly C# Tools,not an execute-assembly tool, -https://github.com/cobbr/SharpSploit,.NET Assembly C# Tools,sharpsploit is a DLL you must roll into your own binaries, -https://github.com/codewhitesec/LethalHTA,aggscripts,dont think we need, -https://github.com/cube0x0/SharpeningCobaltStrike,aggscripts,can revisit later… we dont currently use bloodhound during ops, -https://github.com/cube0x0/SharpMapExec,.NET Assembly C# Tools,WinRM capability is the only thing of value – Look into CSharpWinRM, -https://github.com/curi0usJack/rubeus2ccache,Other Tools and Scripts,,44320.0 -https://github.com/Cybellum/DoubleAgent,Persistence Tools,probably patched… might want to test, -https://github.com/cyberark/Evasor,Evasion Tools,most likely wont work through cobalt strike … menu driven console application, -https://github.com/cyberark/zBang,Domain Recon Tools,gui tool – could be ran on windows 10 machine with proxychains/socat redirection to target, -https://github.com/dafthack/MailSniper,MS Office Tools,OWA password spray and GAL retrieval , -https://github.com/dafthack/MFASweep,Other Tools and Scripts,added to cobaltstrike_extension_kit under powershell_tools,44320.0 -https://github.com/dale-ruane/Fudge,Phishign Tools,Golang tool to smuggle EXE into HTML for phishing campaigns,44320.0 -https://github.com/DamonMohammadbagher/eBook-BypassingAVsByCSharp,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/DamonMohammadbagher/Videos-BypassingAVsByCSharp,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/danielmiessler/SecLists,Cracking & Password Tools,keep an eye out on this one for later- Contains updated PW Lists, -https://github.com/darkr4y/geacon,Payload/Shellcode Generators/Runners,keep an eye out on this one for later – still in its infancy, -https://github.com/deadjakk/patch-checker,PrivEsc Tools,online tool, -https://github.com/deadjakk/Reg1c1de,.NET Assembly C# Tools,, -https://github.com/dirkjanm/PrivExchange,MS Office Tools,Keep an eye out on this one for later – Abuses Exchange to gain DA, -https://github.com/dirkjanm/ROADtoken,.NET Assembly C# Tools,Azure AD SSO Token Abuse Tool, -https://github.com/djhohnstein/Pwdb-Public,Cracking & Password Tools,keep an eye out on this one for later- Contains updated PW Lists, -https://github.com/djhohnstein/SharpChromium,.NET Assembly C# Tools,, -https://github.com/djhohnstein/SharpLogger,.NET Assembly C# Tools,Author Recommends Using WireTap Project, -https://github.com/djhohnstein/SharpSC,.NET Assembly C# Tools,currently using sharpsvc from jnqpblc, -https://github.com/djhohnstein/SharpSearch,.NET Assembly C# Tools,, -https://github.com/djhohnstein/SharpShares,.NET Assembly C# Tools,removed from aggressor collection – outdated,44313.0 -https://github.com/djhohnstein/SharpWeb,.NET Assembly C# Tools,, -https://github.com/djhohnstein/WireTap,.NET Assembly C# Tools,, -https://github.com/dsnezhkov/TruffleSnout,.NET Assembly C# Tools,AD recon tool, -https://github.com/dxa4481/truffleHog,OSINT/Recon Tools,searches github for secrets, -https://github.com/dxa4481/truffleHogRegexes,OSINT/Recon Tools,regexes for trufflehog, -https://github.com/eladshamir/Internal-Monologue,.NET Assembly C# Tools,, -https://github.com/EncodeGroup/BOF-RegSave,BOF,, -https://github.com/EncodeGroup/Gopher,.NET Assembly C# Tools,cred harvesting tool.. keep an eye on this one for enhancements, -https://github.com/EncodeGroup/RegSave,.NET Assembly C# Tools,currently have BOF Regsave.. this creates event ID 4656, -https://github.com/EncodeGroup/SharpDirLister,.NET Assembly C# Tools,saves dirlisting to a file… dont think we need, -https://github.com/EncodeGroup/UAC-SilentClean,aggscripts,come back to this… looks like a better option than chryzsh’s version of uac silent cleanup, -https://github.com/FatRodzianko/SharpBypassUAC,.NET Assembly C# Tools,, -https://github.com/fireeye/ADFSDump,.NET Assembly C# Tools,, -https://github.com/fireeye/DueDLLigence,Payload/Shellcode Generators/Runners,Dev Tool for DLL Side Loading – Need to Add to dev boxes, -https://github.com/fireeye/gocrack,Cracking & Password Tools,distributed cracking tool, -https://github.com/fireeye/OfficePurge,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,Purge P-Code from Office Doc – Need to Add to dev boxes, -https://github.com/fireeye/SharPersist,.NET Assembly C# Tools,, -https://github.com/Flangvik/NetLoader,.NET Assembly C# Tools,dont think we need, -https://github.com/Flangvik/RosFuscator,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,Come back later to test this, -https://github.com/Flangvik/SharpAppLocker,.NET Assembly C# Tools,Come back later to test this, -https://github.com/Flangvik/SharpDllProxy,Payload/Shellcode Generators/Runners,Creates DLLs for DLL Proxying – Need to Add to dev boxes, -https://github.com/Flangvik/RemotePotato0,PrivEsc Tools,come back later to test this – User to DA elevation abusing Exchange, -https://github.com/Flangvik/squiblydoo-payload-generator,Payload/Shellcode Generators/Runners,Repo no longer exists, -https://github.com/FortyNorthSecurity/AggressorAssessor,aggscripts,, -https://github.com/FortyNorthSecurity/C2concealer,Malleable C2,Part of Malleable C2 workflow, -https://github.com/FortyNorthSecurity/EDD,.NET Assembly C# Tools,Come back later to test this, -https://github.com/FortyNorthSecurity/EXCELntDonut,Payload/Shellcode Generators/Runners,Excel4.0 Macro Gen – issues working with stageless shellcode, -https://github.com/FortyNorthSecurity/EyeWitness,.NET Assembly C# Tools,not sure if we need.. there is a C# version that may work with CS, -https://github.com/FortyNorthSecurity/MiddleOut,.NET Assembly C# Tools,, -https://github.com/FortyNorthSecurity/Screenshooter,.NET Assembly C# Tools,not sure if we need.. replacement for cobalt strike native screenshot tool if it decides not to work. Must drop to disk, -https://github.com/FortyNorthSecurity/SqlClient,.NET Assembly C# Tools,Come back later to test this – only function is for sql queries, -https://github.com/fox-it/adconnectdump,Other Tools and Scripts,Come back later to test this – Azure AD Secrets Dumper, -https://github.com/fox-it/bloodhound-import,Domain Recon Tools,dont think we need, -https://github.com/fox-it/BloodHound.py,Domain Recon Tools,docker tool, -https://github.com/fox-it/LDAPFragger,.NET Assembly C# Tools,Come back later to test this – routes C2 traffic through LDAP, -https://github.com/foxglovesec/Potato,PrivEsc Tools,sweetpotato part of CS already.. dont need, -https://github.com/foxglovesec/RottenPotatoNG,PrivEsc Tools,sweetpotato part of CS already.. dont need, -https://github.com/FSecureLABS/C3,C2 Frameworks,C2 Framework – Uses esoteric C2 channels to route beacon – complex, -https://github.com/FSecureLABS/SharpClipHistory,.NET Assembly C# Tools,custom version added to approved aggressor collection,44312.0 -https://github.com/FSecureLABS/SharpGPO-RemoteAccessPolicies,.NET Assembly C# Tools,Come back later to test this, -https://github.com/FSecureLABS/SharpGPOAbuse,.NET Assembly C# Tools,,44312.0 -https://github.com/fullmetalcache/SharpFiles,.NET Assembly C# Tools,not sure if we need.., -https://github.com/FULLSHADE/WindowsExploitationResources,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/FuzzySecurity/Sharp-Suite,.NET Assembly C# Tools,come back later – MACE tool seems interesting to modify timestamps, -https://github.com/FuzzySecurity/StandIn,.NET Assembly C# Tools,,44312.0 -https://github.com/G0ldenGunSec/SharpSecDump,.NET Assembly C# Tools,not sure if we need.. its a c# version of impackets secrets dump.. we can come back to this later, -https://github.com/G0ldenGunSec/wmiServSessEnum,.NET Assembly C# Tools,Come back later… uses wmi to detect users on remote hosts who can modify services, -https://github.com/G1ft3dC0d3/MsfMania,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,not sure if we need… metasploit tool, -https://github.com/gentilkiwi/kekeo,Memory Dumping/Scraping Tools,not sure if we need… kerberos interaction in C, -https://github.com/gentilkiwi/mimikatz,Memory Dumping/Scraping Tools,already part of Cobalt Strike – we also have offline capabilities, -https://github.com/GhostPack/KeeThief,.NET Assembly C# Tools,keetheft part of POST-EX STRIKE, -https://github.com/GhostPack/Lockless,.NET Assembly C# Tools,,44312.0 -https://github.com/GhostPack/Rubeus,.NET Assembly C# Tools,, -https://github.com/GhostPack/SafetyKatz,.NET Assembly C# Tools,, -https://github.com/GhostPack/SeatBelt,.NET Assembly C# Tools,, -https://github.com/GhostPack/SharpDPAPI,.NET Assembly C# Tools,, -https://github.com/GhostPack/SharpDump,.NET Assembly C# Tools,C# port of minidump .. do not think this is opsec safe, -https://github.com/GhostPack/SharpUp,.NET Assembly C# Tools,, -https://github.com/GhostPack/SharpWMI,.NET Assembly C# Tools,, -https://github.com/golem445/Corporate_Masks,Cracking & Password Tools,keep an eye out on this one for later.. hashcat masks, -https://github.com/guyinatuxedo/nightmare,Other Tools and Scripts,ctf binary exploitation challenges, -https://github.com/Hackplayers/evil-winrm,Other Tools and Scripts,Add to TeamServer, -https://github.com/harleyQu1nn/AggressorScripts,aggscripts,, -https://github.com/HarmJ0y/SharpSphere,.NET Assembly C# Tools,Come back later to this… not sure if we need., -https://github.com/hash3liZer/phishlets,Phishign Tools,phishlet profiles for EvilNginx2, -https://github.com/hashcat/hashcat,Cracking & Password Tools,Installed on kali, -https://github.com/hashview/hashview,Cracking & Password Tools,web UI for hashcat – would be nice to have if we have a dedicated cracker, -https://github.com/hfiref0x/UACME,PrivEsc Tools,UAC bypass methods written in C – doesnt work with execute-assembly, -https://github.com/hlldz/dazzleUP,aggscripts,not working, -https://github.com/hoangprod/AndrewSpecial,Memory Dumping/Scraping Tools,C++ Lsass dumping tool – Custom version used by FE Red Team, -https://github.com/HunnicCyber/SharpDomainSpray,.NET Assembly C# Tools,not sure if we need.. password spraying tool, -https://github.com/HunnicCyber/SharpSniper,.NET Assembly C# Tools,, -https://github.com/Ignitetch/AdvPhishing,Phishign Tools,Phishing Framework, -https://github.com/Ignitetch/Ashok,OSINT/Recon Tools,Recon tool, -https://github.com/Ignitetechnologies/Command-Control,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/Ignitetechnologies/Credential-Dumping,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/Ignitetechnologies/Privilege-Escalation,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/Imanfeng/Telemetry,Persistence Tools,keep an eye out on this one for later – windows telemetry persistence, -https://github.com/infosecn1nja/AD-Attack-Defense,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/infosecn1nja/Red-Teaming-Toolkit,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/infosecn1nja/SharpDoor,.NET Assembly C# Tools,Come back later to this… patches termsvr.dll to allow multiple RDP connections to target. Spawn cmd.exe. Not opsec safe, -https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/intelowlproject/IntelOwl,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,deployed on opsecchecker, -https://github.com/invokethreatguy/extps-cobalt-strike-bof,BOF,,44319.0 -https://github.com/invokethreatguy/FindObjects-BOF,BOF,dont need .. fork from outflank, -https://github.com/ionescu007/faxhell,Other Tools and Scripts,DLL planting in system32.. run Fax service to trigger, -https://github.com/itm4n/PrintSpoofer,PrivEsc Tools,UAC bypass methods written in C – doesnt work with execute-assembly, -https://github.com/its-a-feature/Mythic,C2 Frameworks,C2 framework, -https://github.com/its-a-feature/offensive_macos,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/jaredhaight/scout,.NET Assembly C# Tools,, -https://github.com/jivoi/awesome-osint,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/jivoi/pentest,Other Tools and Scripts,some pentest automation scripts, -https://github.com/jnqpblc/SharpDir,.NET Assembly C# Tools,, -https://github.com/jnqpblc/SharpReg,.NET Assembly C# Tools,, -https://github.com/jnqpblc/SharpSpray,.NET Assembly C# Tools,not sure if we need.. password spraying tool, -https://github.com/jnqpblc/SharpSvc,.NET Assembly C# Tools,, -https://github.com/jnqpblc/SharpTask,.NET Assembly C# Tools,, -https://github.com/jofpin/trape,OSINT/Recon Tools,keep an eye out on this one.. we currently use in our arsenal, -https://github.com/josephkingstone/cobalt_strike_extension_kit,aggscripts,, -https://github.com/jthuraisamy/SysWhispers2,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,keep an eye out on this one for later...could be used with artifact kit, -https://github.com/kendfinger/MacHack,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/Kevin-Robertson/InveighZero,.NET Assembly C# Tools,, -https://github.com/Kevin-Robertson/Sharpmad,.NET Assembly C# Tools,powermad c# alternative – keep an eye out on this, -https://github.com/kgretzky/evilginx2,Phishign Tools,Phishing Framework, -https://github.com/kgretzky/pwndrop,Payload Hosting,keep an eye out on this one.. tool used to host payloads, -https://github.com/khast3x/h8mail,OSINT/Recon Tools,email OSINT tool.. lots of capability here, -https://github.com/kluo84/CS-notes,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/l0ss/Grouper2,.NET Assembly C# Tools,, -https://github.com/lanmaster53/recon-ng,OSINT/Recon Tools,kali manages updates to toolkit, -https://github.com/lanmaster53/recon-ng-marketplace,OSINT/Recon Tools,kali manages updates to toolkit, -https://github.com/leftp/VmdkReader,Other Tools and Scripts,come back later , -https://github.com/leoloobeek/csharp,.NET Assembly C# Tools,not sure if we need.., -https://github.com/leoloobeek/keyring,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,look into this at a later time … payload keying, -https://github.com/leoloobeek/keyserver,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,look into this at a later time … payload keying, -https://github.com/M00nRise/ProcessHider,.NET Assembly C# Tools,"Come back later to this… tool allows for hiding processes from from monitoring tools such as Task Manager and Process Explorer, thus preventing the admins from discovering payload's processes. The tool works on both 32 and 64 bit versions, by self detecting the OS version and using the right version of the tool.", -https://github.com/m57/cobaltstrike_bofs,BOF,come back later – BOF for queueuserapc injection, -https://github.com/malcomvetter/CSExec,.NET Assembly C# Tools,not sure if we need.. psexec replacement .. not execute-assembly friendly, -https://github.com/mantvydasb/Red-Team-Infrastructure-Automation,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/matterpreter/DefenderCheck,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,Rasta-Mouse ThreatCheck is better, -https://github.com/matterpreter/OffensiveCSharp,.NET Assembly C# Tools,Most tools are already part of approved aggressor collection .. look into MockDirBypassUAC to see how that work before rolling into arsenal., -https://github.com/matterpreter/Shhmon,.NET Assembly C# Tools,probably dont want to use.. this tool kills sysmon, -https://github.com/mdsecactivebreach/CACTUSTORCH,Payload/Shellcode Generators/Runners,Outdated (4 yrs) keep an eye out in case of updates.. or obfuscate code for use., -https://github.com/mdsecactivebreach/Chameleon,DNS Tools,Updated 9 months ago.. integrates into redelk.. still doesnt include talos categorization. , -https://github.com/mdsecactivebreach/Execute-GithubAssembly-Aggressor,aggscripts,dont think we need, -https://github.com/mdsecactivebreach/Farmer,.NET Assembly C# Tools,farmer and crop already part of aggressor collection, -https://github.com/mdsecactivebreach/LinkedInt,OSINT/Recon Tools,Outdated … havnt tested but I assume it no longer works against LinkedIn anymore, -https://github.com/mdsecactivebreach/o365-attack-toolkit,MS Office Tools,keep an eye out on this one for later, -https://github.com/mdsecactivebreach/SharpPack,.NET Assembly C# Tools,probably dont need… revisit in the future, -https://github.com/mdsecactivebreach/SharpShooter,Payload/Shellcode Generators/Runners,outdated for a few years… payload creation framework.. most likely signatured.. need to obfuscate code if its going to be used, -https://github.com/mdsecactivebreach/sitrep,.NET Assembly C# Tools,, -https://github.com/mdsecactivebreach/WMIPersistence,Persistence Tools,keep an eye out on this one for later, -https://github.com/med0x2e/GadgetToJScript,Payload/Shellcode Generators/Runners,payload creation .. most likely signatured.. need to obfuscate code if its going to be used, -https://github.com/mez-0/CMSTPBypass,.NET Assembly C# Tools,doesnt work with windows 10 version 10.0.19042, -https://github.com/mez-0/CSharpExec,.NET Assembly C# Tools,not sure if we need.. psexec replacement .. currently have sharpexec in arsenal, -https://github.com/mez-0/CSharpRunAs,.NET Assembly C# Tools,runas replacement.. requires seimpersonate privilege.. reqs admin to use, -https://github.com/mez-0/CSharpWinRM,.NET Assembly C# Tools,probably dont need… SharpWSManWinRM assembly currently part of aggressor collection, -https://github.com/mez-0/DecryptRDCManager,.NET Assembly C# Tools,come back to this later., -https://github.com/mez-0/linky,OSINT/Recon Tools,probably dont need… outdated and according to notes the validation method via O365 has been patched, -https://github.com/mez-0/MoveScheduler,.NET Assembly C# Tools,, -https://github.com/mez-0/SharpShares,.NET Assembly C# Tools,,44313.0 -https://github.com/mgeeky/cobalt-arsenal,aggscripts,using some of the scripts listed here, -https://github.com/mgeeky/Penetration-Testing-Tools,Other Tools and Scripts,keep an eye out on this one for later, -https://github.com/mgeeky/RobustPentestMacro,Payload/Shellcode Generators/Runners,outdated but good macro techniques used here, -https://github.com/mgeeky/SharpWebServer,.NET Assembly C# Tools,,44313.0 -https://github.com/mgeeky/SharpWMI,.NET Assembly C# Tools,probably dont need… using GhostPacks sharpwmi version .. mgeeky’s changes I believed were pushed to GhostPack, -https://github.com/mgeeky/Stracciatella,aggscripts,keep an eye out on this one for later… promising, -https://github.com/michaelweber/Macrome,Payload/Shellcode Generators/Runners,most up to date macro generation tool … test this , -https://github.com/michenriksen/aquatone,OSINT/Recon Tools,eyewitness alternative with added features, -https://github.com/michenriksen/birdwatcher,OSINT/Recon Tools,dont think we need.. twitter monitor, -https://github.com/michenriksen/bucketlist,OSINT/Recon Tools,keep an eye out on this one for later.. S3 bucket crawler, -https://github.com/michenriksen/gitrob,OSINT/Recon Tools,outdated… github OSINT tool, -https://github.com/mitchmoser/LACheck,.NET Assembly C# Tools,,44313.0 -https://github.com/mitchmoser/SharPermission,.NET Assembly C# Tools,, -https://github.com/mitchmoser/SharpLDAPSearch,.NET Assembly C# Tools,,44313.0 -https://github.com/mitchmoser/SharpShares,.NET Assembly C# Tools,,44313.0 -https://github.com/mkaring/ConfuserEx,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,currently use with payload gen, -https://github.com/Mr-Un1k0d3r/CatMyPhish,DNS Tools,will get your expireddomains acct banned, -https://github.com/Mr-Un1k0d3r/DKMC,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,powershell tool … hides shellcode in a BMP image.. requires powershell one liner to retrieve and decode image, -https://github.com/Mr-Un1k0d3r/EDRs,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/Mr-Un1k0d3r/MaliciousClickOnceGenerator,Payload/Shellcode Generators/Runners,Outdated … can create a click once manually , -https://github.com/Mr-Un1k0d3r/MaliciousDLLGenerator,Payload/Shellcode Generators/Runners,Outdated .. only supports 64bit shellcode, -https://github.com/Mr-Un1k0d3r/MaliciousMacroGenerator,Payload/Shellcode Generators/Runners,Outdated macro gen, -https://github.com/Mr-Un1k0d3r/MiniDump,Memory Dumping/Scraping Tools,updated SafeMiniDump,44321.0 -https://github.com/Mr-Un1k0d3r/PoisonHandler,Other Tools and Scripts,lateral movement technique.. look into this later, -https://github.com/Mr-Un1k0d3r/RedTeamCCode,Other Tools and Scripts,repo for C code, -https://github.com/Mr-Un1k0d3r/RedTeamCSharpScripts,.NET Assembly C# Tools,,44314.0 -https://github.com/Mr-Un1k0d3r/RemoteProcessInjection,aggscripts,dont think we need, -https://github.com/Mr-Un1k0d3r/SCShell,BOF,come back to this later.. it seems to work but can mess up system services binpaths .. if the program does not exit gracefully the modify binpath does not revert to its original value. , -https://github.com/Mr-Un1k0d3r/SCShell,.NET Assembly C# Tools,come back to this later.. it seems to work but can mess up system services binpaths .. if the program does not exit gracefully the modify binpath does not revert to its original value. , -https://github.com/Mr-Un1k0d3r/SCT-obfuscator,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,Outdated .. not sure if we have a use for SCT files, -https://github.com/Mr-Un1k0d3r/SPFAbuse,Phishign Tools,python script to send emails on behalf of target org.. abuses SPF.. , -https://github.com/Mr-Un1k0d3r/UniByAv,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,Outdated .. payload creation and cryption tool, -https://github.com/mubix/post-exploitation,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/mubix/post-exploitation-wiki,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/mubix/red-team-scripts,Other Tools and Scripts,dont think we need.. forked from threatexpress, -https://github.com/mubix/repos,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/n1nj4sec/pupy,C2 Frameworks,C2 framework, -https://github.com/nccgroup/acCOMplice,Other Tools and Scripts,COM hijacking tool… test on dev windows box, -https://github.com/nccgroup/demiguise,Payload/Shellcode Generators/Runners,Outdated HTA encryption tool.. might be able to use still.. even though HTA’s are typically flagged, -https://github.com/nccgroup/GTFOBLookup,Other Tools and Scripts,GTFOB local lookup tool, -https://github.com/nccgroup/nccfsas,Other Tools and Scripts,SigWhatever tool needs to be evaluated.. backdoors user’s outlook signature with a 1x1 pixel to collect Net-NTLM hashes , -https://github.com/nccgroup/redsnarf,Other Tools and Scripts,Outdated.. python tool to retrieve credential material from windows hosts among other things… look into it later, -https://github.com/nccgroup/ScoutSuite,Infrastructure Monitoring,currently used on a frequent basis., -https://github.com/nccgroup/WMIcmd,.NET Assembly C# Tools,come back to this later … great concept.. but can spawn a cmd.exe child process depending on the commands you issue, -https://github.com/netbiosX/CheatSheets,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/netbiosX/Checklists,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/netbiosX/Default-Credentials,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/netbiosX/Pentest-Bookmarks,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/netbiosX/Red-Team-CheatSheets,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/NetSPI/DAFT,Database Tools,, -https://github.com/NetSPI/ESC,Database Tools,come back later , -https://github.com/NetSPI/goddi,Domain Recon Tools,goland domain dumper tool, -https://github.com/NetSPI/MicroBurst,Cloud Tools,come back later – powershell tools to test cloud, -https://github.com/NetSPI/PowerUpSQL,Database Tools,powershell script – should use on windows box w/ proxychains/socat redirection to target, -https://github.com/NetSPI/SQLInjectionWiki,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/nettitude/Prowl,OSINT/Recon Tools,Outdated (2 years) Yahoo and LinkedIn scrapper to find search tearms and job details., -https://github.com/nettitude/SharpSocks,.NET Assembly C# Tools,probably dont need… can revisit later, -https://github.com/nixawk/pentest-wiki,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/NotPrab/.NET-Obfuscator,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,probably dont need…currently using confuserex2, -https://github.com/NVISO-BE/FileSearcher,.NET Assembly C# Tools,,44314.0 -https://github.com/odzhan/injection,Payload/Shellcode Injection/Loaders,process injection types, -https://github.com/offseccat/VaultBreaker,.NET Assembly C# Tools,probably dont need… can revisit later, -https://github.com/ohpe/juicy-potato,Exploits,dont think we need… currently have sweetpotato in arsenal, -https://github.com/OlivierLaflamme/Cheatsheet-God,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/Ondrik8/exploit,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/Ondrik8/lateral_movement,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/outflanknl/Dumpert,aggscripts,tested against win 10 20H2 … breaks beacon, -https://github.com/outflanknl/EvilClippy,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,macro gen and obfuscation tool… slightly outdated but could be useful, -https://github.com/outflanknl/Excel4-DCOM,aggscripts,dont think we need… powershell tool, -https://github.com/outflanknl/Exploits,Exploits,outdated… keep an eye out, -https://github.com/outflanknl/FindObjects-BOF,BOF,dont think we need, -https://github.com/outflanknl/InlineWhispers,BOF,helps make BOFs, -https://github.com/outflanknl/Net-GPPPassword,.NET Assembly C# Tools,,44314.0 -https://github.com/outflanknl/Ps-Tools,aggscripts,can revisit later… reflective DLL tool that monitors processess, -https://github.com/outflanknl/Recon-AD,aggscripts,, -https://github.com/outflanknl/RedELK,Infrastructure Monitoring,in use, -https://github.com/outflanknl/RedFile,Payload Hosting,dont think we need.. pwndrop looks like a better tools, -https://github.com/outflanknl/SharpHide,.NET Assembly C# Tools,, -https://github.com/outflanknl/Spray-AD,aggscripts,dont think we need...password spraying tool.. will trigger, -https://github.com/outflanknl/WdToggle,BOF,dont think we need.. does in memory patching of lsass to enable wdigest on the machine. This could leave the machine vulnerable, -https://github.com/outflanknl/Zipper,aggscripts,, -https://github.com/pandasec888/taowu-cobalt-strike,aggscripts,can revisit later… chinese repo with cobalt strike tooling, -https://github.com/paranoidninja/Boomerang,Domain Recon Tools,dont think we need, -https://github.com/paranoidninja/CarbonCopy,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,cert spoofer for binaries, -https://github.com/paranoidninja/Pandoras-Box,Other Tools and Scripts,random offensive scripts, -https://github.com/phra/PEzor,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,Open source PE packer and encrypter.. looks up to date, -https://github.com/Pickfordmatt/SharpLocker,.NET Assembly C# Tools,come back to this later … code seems dorked.. we currently have the older binary within our approved aggressor collection that seems to work, -https://github.com/pkb1s/SharpAllowedToAct,.NET Assembly C# Tools,, -https://github.com/praetorian-inc/Hob0Rules,Cracking & Password Tools,hashcat rules, -https://github.com/PwnDexter/SharpEDRChecker,.NET Assembly C# Tools,upgraded,44314.0 -https://github.com/quentinhardy/msdat,Database Tools,part of teamserver build, -https://github.com/quentinhardy/odat,Database Tools,part of teamserver build, -https://github.com/Raikia/CredNinja,.NET Assembly C# Tools,"come back to this later … password spraying tool to validate if stolen creds can authenticate to hosts as local admin, etc…", -https://github.com/Raikia/SharpStat,.NET Assembly C# Tools,probably dont need…, -https://github.com/Raikia/UhOh365,MS Office Tools,O365 email enumeration tool… test later, -https://github.com/rarecoil/pantagrule,Cracking & Password Tools,hashcat rules, -https://github.com/rasta-mouse/MiscTools,.NET Assembly C# Tools,probably dont need… we have sharpexec and sharpcom in our arsenal, -https://github.com/rasta-mouse/SharpWitness,.NET Assembly C# Tools,come back to this later … barely functions according to rasta-mouse, -https://github.com/rasta-mouse/Watson,.NET Assembly C# Tools,, -https://github.com/rasta-mouse/ThreatCheck,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,Better version than Matterpreters DefenderCheck – option to check AMSI, -https://github.com/RedCursorSecurityConsulting/PPLKiller,.NET Assembly C# Tools,probably dont want to use… this tool installs a driver and disables LSA protections, -https://github.com/RedLectroid/OutlookSend,.NET Assembly C# Tools,come back to this later … code is not working as intended, -https://github.com/RedLectroid/SearchOutlook,.NET Assembly C# Tools,upgraded,44314.0 -https://github.com/RedXRanger/OSCE_BIBLE,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/RedXRanger/StageStrike,Payload/Shellcode Generators/Runners,cobalt stager in C .., -https://github.com/Ridter/SharpAddDomainMachine,.NET Assembly C# Tools,come back to this later … keep an eye out for this, -https://github.com/rmusser01/Infosec_Reference,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/rootm0s/WinPwnage,PrivEsc Tools,UAC bypass methods written in python – doesnt work with execute-assembly, -https://github.com/rsmudge/unhook-bof,BOF,keep an eye out on this one for later, -https://github.com/rsmudge/ZeroLogon-BOF,BOF,dont think we need… BOF exploit for zerologon, -https://github.com/rvazarkar/DomainPasswordTest,.NET Assembly C# Tools,come back to this later … need to test in lab env, -https://github.com/rvazarkar/GMSAPasswordReader,.NET Assembly C# Tools,,44315.0 -https://github.com/rvrsh3ll/BOF_Collection,BOF,keep an eye out on this one for later, -https://github.com/rvrsh3ll/FindFrontableDomains,DNS Tools,might want to use if we plan on domain fronting, -https://github.com/rvrsh3ll/SharpCOM,.NET Assembly C# Tools,updated with additional help menu items,44315.0 -https://github.com/rvrsh3ll/SharpExcel4-DCOM,.NET Assembly C# Tools,commented out to prevent master-import.cna from loading,44315.0 -https://github.com/rvrsh3ll/SharpFruit,.NET Assembly C# Tools,updated assembly and aggsript,44315.0 -https://github.com/rvrsh3ll/SharpPrinter,.NET Assembly C# Tools,, -https://github.com/rvrsh3ll/SharpSMBSpray,.NET Assembly C# Tools,dont think we need, -https://github.com/rxwx/chlonium,Browser Tools,dont think we need, -https://github.com/rxwx/spoolsystem,PrivEsc Tools,, -https://github.com/s0lst1c3/dropengine,Payload/Shellcode Generators/Runners,malleable framework for shellcode runners .. look into it more, -https://github.com/s0lst1c3/SharpFinder,.NET Assembly C# Tools,part of postex-strike, -https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/S1ckB0y1337/Cobalt-Strike-CheatSheet,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/S3cur3Th1sSh1t/Creds,Other Tools and Scripts,scripts and stuff for offensive testing, -https://github.com/SafeBreach-Labs/BACE,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/SafeBreach-Labs/pinjectra,Payload/Shellcode Injection/Loaders,process injection library, -https://github.com/sailay1996/awesome_windows_logical_bugs,Exploits,collection of exploits and links, -https://github.com/sailay1996/Bashfuscator,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,Obfuscates bash one liners .. could be used at some point, -https://github.com/sailay1996/expl-bin,Exploits,collection of modified exploits, -https://github.com/sailay1996/FileWrite2system,PrivEsc Tools,FileWrite2System PrivEsc – C++ tool, -https://github.com/sailay1996/GUI_UAC_bypassX,PrivEsc Tools,GUI UAC Bypass , -https://github.com/sailay1996/magnifier0day,PrivEsc Tools,GUI privesc tool.. loads DLL upon using the magnify feature during logon procedure, -https://github.com/sailay1996/RpcSsImpersonator,PrivEsc Tools,C++ PrivEsc assembly will not work with CS execute assembly, -https://github.com/sailay1996/SECOMN_EoP,PrivEsc Tools,Win10 EoP .. requires restart of computer, -https://github.com/sailay1996/UAC_Bypass_In_The_Wild,PrivEsc Tools,UAC bypass methods leveraging autoelevate true and DLL planting, -https://github.com/sailay1996/UAC_bypass_windows_store,PrivEsc Tools,UAC bypass methods written in C – doesnt work with execute-assembly, -https://github.com/sailay1996/WerTrigger,PrivEsc Tools,Windows error reporting EoP .. possibly patched, -https://github.com/SecureAuthCorp/impacket,Other Tools and Scripts,kali manages updates to toolkit, -https://github.com/sensepost/ruler,MS Office Tools,Interact with Exchange Servers remotely, -https://github.com/sevagas/macro_pack,Payload/Shellcode Generators/Runners,macro gen and obfuscation tool .. typically updated.. pro version also available at a cost, -https://github.com/shantanu561993/SharpLoginPrompt,.NET Assembly C# Tools,updated,44315.0 -https://github.com/shellfarmer/WeakestLink,OSINT/Recon Tools,LinkedIn OSINT/Recon tool.. updated fairly recently, -https://github.com/shr3ddersec/Shr3dKit,Other Tools and Scripts,Outdated (2 years) collection of cobalt strike tools and scripts, -https://github.com/skelsec/pypykatz,Memory Dumping/Scraping Tools,can install on box : pip3 install pypykatz, -https://github.com/slaeryan/AQUARMOURY,Evasion Tools,keep an eye out on this one for later, -https://github.com/slyd0g/C-Sharp-Out-Minidump,.NET Assembly C# Tools,dont think we need, -https://github.com/slyd0g/LNKMod,.NET Assembly C# Tools,dont think we need. Staykit has LNK creation, -https://github.com/slyd0g/SharpClipboard,.NET Assembly C# Tools,Alias : clipboard_monitor, -https://github.com/slyd0g/WhiteChocolateMacademiaNut,Browser Tools,dont think we need, -https://github.com/SnaffCon/Snaffler,.NET Assembly C# Tools,Not adding for now… super noisy and not opsec safe, -https://github.com/Soledge/BlockEtw,.NET Assembly C# Tools,keep an eye out on this one for later, -https://github.com/srnframe/eviloffice,Payload/Shellcode Generators/Runners,dont think we need.. macro reverse shell generator, -https://github.com/stufus/certerator,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,"create root CA, sign binary and add CA root to trust store on target…. Look into this later", -https://github.com/stufus/reconerator,.NET Assembly C# Tools,dont think we need.. author says GhostPack is more feature rich, -https://github.com/swisskyrepo/PayloadsAllTheThings,Payload/Shellcode Generators/Runners,Apt-get install payloadsallthethings : kali install, -https://github.com/swisskyrepo/SharpLAPS,.NET Assembly C# Tools,,44315.0 -https://github.com/tevora-threat/SharpView,.NET Assembly C# Tools,Outdated (3 yrs) keep an eye out for EDD, -https://github.com/TheWover/donut,Payload/Shellcode Generators/Runners,PIC shellcode runner .. need to tinker around with this more, -https://github.com/TheWover/ProcessManager,.NET Assembly C# Tools,dont think we need, -https://github.com/threatexpress/aggressor-scripts,aggscripts,keep an eye out on this one for later.. only addded jump wmi_msbuild lat movement, -https://github.com/threatexpress/domainhunter,DNS Tools,domain hunting tool.. checks expired domains etc.., -https://github.com/threatexpress/malleable-c2,Malleable C2,Malleable C2 Profiles, -https://github.com/threatexpress/pasties,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/threatexpress/random_c2_profile,Malleable C2,Random C2 generator… could be modified for our use, -https://github.com/threatexpress/red-team-scripts,aggscripts,outdated… keep an eye out, -https://github.com/timwhitez/Cobalt-Strike-Aggressor-Scripts,aggscripts,can revisit later… chinese repo with cobalt strike tooling, -https://github.com/tomcarver16/ADSearch,.NET Assembly C# Tools,,44315.0 -https://github.com/tomcarver16/Athena,Payload/Shellcode Injection/Loaders,stealthy shellcode injector, -https://github.com/tothi/dll-hijack-by-proxying,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/trustedsec/CS-Situational-Awareness-BOF,BOF,updated,44319.0 -https://github.com/trustedsec/hate_crack,Cracking & Password Tools,Optimized hash cracking tool.. integrates with hashcat, -https://github.com/trustedsec/social-engineer-toolkit,Social Engineering,kali manages updates to toolkit, -https://github.com/trustedsec/unicorn,Payload/Shellcode Generators/Runners,payload generator.. typically signatured by AV, -https://github.com/TryCatchHCF/Cloakify,Data Exfil Tools,data exfil tool.. not sure how itll work internally , -https://github.com/ustayready/SharpHose,.NET Assembly C# Tools,dont think we need… password spraying tool, -https://github.com/V1V1/SharpScribbles,.NET Assembly C# Tools,Project Contains SharpStickyNotes – Sticky Note Extraction … localized testing seems like it doesn work… SQLite WAL file doesnt write to plum.db for some reason… so the tool cant extract the sticky note data, -https://github.com/violentlydave/mkhtaccess_red,apache redirect tools,I believe we currently use, -https://github.com/vivami/OutlookParasite,Persistence Tools,has potential.. outlook VSTO addin persistence.. uses powershell though… could possibly write a C# alternative, -https://github.com/vivami/SauronEye,.NET Assembly C# Tools,updated,44315.0 -https://github.com/vysecurity/DefaultCreds-cheat-sheet,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/vysecurity/DomainFrontingLists,DNS Tools,keep an eye out on this one for later, -https://github.com/vysecurity/RedTips,"Tips, Tricks, References",keep an eye out on this one for later, -https://github.com/x3419/AggressorScripts,aggscripts,keep an eye out.. tried out fileviewer.cna and that doesnt work, -https://github.com/x3419/OutlookSearcher,.NET Assembly C# Tools,replacing searchoutlook… searchoutlook does not provide To/From/Subject/Body fields when searching for keywords,44316.0 -https://github.com/x3419/ShareShooter,.NET Assembly C# Tools,Not adding for now… keep an eye out for this tool, -https://github.com/x3419/SharpDNS,.NET Assembly C# Tools,Not adding for now… keep an eye out for this tool, -https://github.com/x3419/SharperSearch,.NET Assembly C# Tools,dont need… sharpsearcher code rolled into original SharpSearch repo, -https://github.com/xillwillx/tricky.lnk,Payload/Shellcode Generators/Runners,dont think we need .. staykit has a LNK gen option, -https://github.com/Yaxser/CobaltStrike-BOF,BOF,keep an eye out on this one for later – lateral movment BOFs, -https://github.com/Zenix-Blurryface/SneakyEXE,PrivEsc Tools,embeds UAC bypassing functions into EXE.. requires admin to elevate… keep an eye on this, -https://github.com/zeronetworks/BloodHound-Tools,Domain Recon Tools,dont think we need, -https://github.com/zeronetworks/cornershot,Domain Recon Tools,python tool – uses RPC to detect if hosts have access to other hosts on specific ports..CornerShot package allows one to look at a remote host’s network access without the need to have any special privileges on that host., -https://gitlab.com/illwill/skiptracer,OSINT/Recon Tools,OSINT scraping framework.. keep an eye on this, -https://github.com/ZeroPointSecurity/Domain-Enumeration-Tool,,Not adding for now… keep an eye out for this tool.. still in its infancy, -https://github.com/9emin1/charlotte,Payload/Shellcode Generators/Runners,FUD DLL generator.. need to test, -https://github.com/vysecurity/DomainFrontingLists,Domain Fronting,keep an eye out on this, -https://github.com/h4wkst3r/InvisibilityCloak,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,keep an eye out on this.. need to test, -https://github.com/mgeeky/RedWarden,apache redirect tools,keep an eye out on this.. need to test, -https://github.com/IlanKalendarov/SharpHook,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://github.com/jfmaes/SharpZipRunner,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://github.com/GhostPack/Certify,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://github.com/GhostPack/ForgeCert,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://github.com/GhostPack/PSPKIAudit,Domain Recon Tools,keep an eye out on this.. need to test, -https://github.com/TheWover/CertStealer,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://gitlab.com/KevinJClark/csharptoolbox,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://github.com/mez-0/pantry,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://github.com/xforcered/WFH,Exploit Discovery (DLL hijacks and Side Loading),keep an eye out on this.. need to test, -https://github.com/cube0x0/CVE-2021-1675,.NET Assembly C# Tools,Working LPE – Added to aggressor collection,44383.0 -https://github.com/capt-meelo/Beaconator,aggscripts,keep an eye out on this.. need to test, -https://github.com/GossiTheDog/HiveNightmare,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://github.com/topotam/PetitPotam,PrivEsc Tools,keep an eye out on this.. need to test, -https://github.com/bats3c/ADCSPwn,PrivEsc Tools,keep an eye out on this.. need to test, -https://github.com/eladshamir/Whisker,PrivEsc Tools,keep an eye out on this.. need to test, -https://github.com/capt-meelo/Beaconator,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,keep an eye out on this.. need to test, -https://github.com/cribdragg3r/Alaris,Payload Encoders/Encryption/Evasion/Obfuscation/Signing,keep an eye out on this.. need to test, -https://github.com/S3cur3Th1sSh1t/SharpNamedPipePTH,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://github.com/outflanknl/FindObjects-BOF,BOF,Added to aggressor collection,44425.0 -https://github.com/netero1010/ServiceMove-BOF,BOF,keep an eye out on this.. need to test, -https://github.com/netero1010/TrustedPath-UACBypass-BOF,BOF,keep an eye out on this.. need to test, -https://github.com/mgeeky/cobalt-arsenal/tree/master/mgeekys_arsenal,aggscripts,keep an eye out on this.. need to test, -https://github.com/monoxgas/Koppeling,DLL Hijack Tool,keep an eye out on this.. works with bof-servicemove, -https://github.com/Tylous/SourcePoint,Malleable C2,keep an eye out on this.. need to test, -https://github.com/jfmaes/Invoke-DLLClone,DLL Hijack Tool,keep an eye out on this.. need to test, -https://github.com/mgeeky/ElusiveMice,aggscripts,keep an eye out on this.. need to test, -https://github.com/trainr3kt/MemReader_BoF,BOF,keep an eye out on this.. need to test, -https://github.com/GhostPack/RestrictedAdmin,.NET Assembly C# Tools,keep an eye out on this.. need to test, -https://gitlab.com/nephosec/bof-adios,bof,keep an eye out on this.. need to test, +https://github.com/squidfunk/mkdocs-material,MaterialUI for MkDocs,No,02-15-2023 +https://github.com/mkdocs/mkdocs,Documentation,No,02-15-2023 +https://github.com/facelessuser/pymdown-extensions,Plugin for MkDocs,No,03-06-2023 +https://github.com/axi0m/ratatoskr,Repo Notifier,No,03-30-23 diff --git a/poetry.lock b/poetry.lock index 88a038f..acaa7c6 100644 --- a/poetry.lock +++ b/poetry.lock @@ -50,6 +50,35 @@ python-versions = "*" [package.extras] test = ["flake8 (==3.7.8)", "hypothesis (==3.55.3)"] +[[package]] +name = "cyclonedx-bom" +version = "3.10.1" +description = "CycloneDX Software Bill of Materials (SBOM) generation utility" +category = "main" +optional = false +python-versions = ">=3.6,<4.0" + +[package.dependencies] +cyclonedx-python-lib = ">=2.0.0,<4.0.0" +packageurl-python = ">=0.9" +pip-requirements-parser = ">=32.0.0,<33.0.0" +setuptools = ">=47.0.0" +toml = ">=0.10.0,<0.11.0" + +[[package]] +name = "cyclonedx-python-lib" +version = "3.1.5" +description = "A library for producing CycloneDX SBOM (Software Bill of Materials) files." +category = "main" +optional = false +python-versions = ">=3.6,<4.0" + +[package.dependencies] +packageurl-python = ">=0.9" +setuptools = ">=47.0.0" +sortedcontainers = ">=2.4.0,<3.0.0" +toml = ">=0.10.0,<0.11.0" + [[package]] name = "exceptiongroup" version = "1.0.4" @@ -77,14 +106,42 @@ category = "dev" optional = false python-versions = "*" +[[package]] +name = "packageurl-python" +version = "0.10.4" +description = "A purl aka. Package URL parser and builder" +category = "main" +optional = false +python-versions = ">=3.6" + +[package.extras] +build = ["wheel"] +test = ["black", "isort", "pytest"] + [[package]] name = "packaging" version = "22.0" description = "Core utilities for Python packages" -category = "dev" +category = "main" optional = false python-versions = ">=3.7" +[[package]] +name = "pip-requirements-parser" +version = "32.0.1" +description = "pip requirements parser - a mostly correct pip requirements parsing library because it uses pip's own code." +category = "main" +optional = false +python-versions = ">=3.6.0" + +[package.dependencies] +packaging = "*" +pyparsing = "*" + +[package.extras] +docs = ["Sphinx (>=3.3.1)", "doc8 (>=0.8.1)", "sphinx-rtd-theme (>=0.5.0)"] +testing = ["aboutcode-toolkit (>=6.0.0)", "black", "pytest (>=6,!=7.0.0)", "pytest-xdist (>=2)"] + [[package]] name = "pluggy" version = "1.0.0" @@ -108,6 +165,17 @@ python-versions = ">=3.6" [package.extras] plugins = ["importlib-metadata"] +[[package]] +name = "pyparsing" +version = "3.0.9" +description = "pyparsing module - Classes and methods to define and execute parsing grammars" +category = "main" +optional = false +python-versions = ">=3.6.8" + +[package.extras] +diagrams = ["jinja2", "railroad-diagrams"] + [[package]] name = "pytest" version = "7.2.0" @@ -172,6 +240,35 @@ pygments = ">=2.6.0,<3.0.0" [package.extras] jupyter = ["ipywidgets (>=7.5.1,<8.0.0)"] +[[package]] +name = "setuptools" +version = "65.7.0" +description = "Easily download, build, install, upgrade, and uninstall Python packages" +category = "main" +optional = false +python-versions = ">=3.7" + +[package.extras] +docs = ["furo", "jaraco.packaging (>=9)", "jaraco.tidelift (>=1.4)", "pygments-github-lexers (==0.0.5)", "rst.linker (>=1.9)", "sphinx (>=3.5)", "sphinx-favicon", "sphinx-hoverxref (<2)", "sphinx-inline-tabs", "sphinx-lint", "sphinx-notfound-page (==0.8.3)", "sphinx-reredirects", "sphinxcontrib-towncrier"] +testing = ["build[virtualenv]", "filelock (>=3.4.0)", "flake8 (<5)", "flake8-2020", "ini2toml[lite] (>=0.9)", "jaraco.envs (>=2.2)", "jaraco.path (>=3.2.0)", "pip (>=19.1)", "pip-run (>=8.8)", "pytest (>=6)", "pytest-black (>=0.3.7)", "pytest-checkdocs (>=2.4)", "pytest-cov", "pytest-enabler (>=1.3)", "pytest-flake8", "pytest-mypy (>=0.9.1)", "pytest-perf", "pytest-timeout", "pytest-xdist", "tomli-w (>=1.0.0)", "virtualenv (>=13.0.0)", "wheel"] +testing-integration = ["build[virtualenv]", "filelock (>=3.4.0)", "jaraco.envs (>=2.2)", "jaraco.path (>=3.2.0)", "pytest", "pytest-enabler", "pytest-xdist", "tomli", "virtualenv (>=13.0.0)", "wheel"] + +[[package]] +name = "sortedcontainers" +version = "2.4.0" +description = "Sorted Containers -- Sorted List, Sorted Dict, Sorted Set" +category = "main" +optional = false +python-versions = "*" + +[[package]] +name = "toml" +version = "0.10.2" +description = "Python Library for Tom's Obvious, Minimal Language" +category = "main" +optional = false +python-versions = ">=2.6, !=3.0.*, !=3.1.*, !=3.2.*" + [[package]] name = "tomli" version = "2.0.1" @@ -209,7 +306,7 @@ test = ["pytest", "pytest-cov"] [metadata] lock-version = "1.1" python-versions = "~3.9" -content-hash = "29046712db453166db1ec46926311b94e746e1a2f2c3217f842f68a97ab4a36b" +content-hash = "cb53c9f0f52957ab8bc856232ae55bdd5db27aef8ea2f0dec4dfb429334d1889" [metadata.files] attrs = [ @@ -232,6 +329,14 @@ commonmark = [ {file = "commonmark-0.9.1-py2.py3-none-any.whl", hash = "sha256:da2f38c92590f83de410ba1a3cbceafbc74fee9def35f9251ba9a971d6d66fd9"}, {file = "commonmark-0.9.1.tar.gz", hash = "sha256:452f9dc859be7f06631ddcb328b6919c67984aca654e5fefb3914d54691aed60"}, ] +cyclonedx-bom = [ + {file = "cyclonedx_bom-3.10.1-py3-none-any.whl", hash = "sha256:a5d79303f51701fd8e08d7985761ddba04c44d9f0c9f0be3e8453344632af4cf"}, + {file = "cyclonedx_bom-3.10.1.tar.gz", hash = "sha256:890083089216ba3487c6e344588ca89c65eeace2c534eced3b524142f851ff15"}, +] +cyclonedx-python-lib = [ + {file = "cyclonedx_python_lib-3.1.5-py3-none-any.whl", hash = "sha256:8981ca462fba91469c268d684a03f72c89c7a807674d884f83a28d8c2822a9b6"}, + {file = "cyclonedx_python_lib-3.1.5.tar.gz", hash = "sha256:1ccd482024a30b95c4fffb3fe567a9df97b705f34c1075f8abde8537867600c3"}, +] exceptiongroup = [ {file = "exceptiongroup-1.0.4-py3-none-any.whl", hash = "sha256:542adf9dea4055530d6e1279602fa5cb11dab2395fa650b8674eaec35fc4a828"}, {file = "exceptiongroup-1.0.4.tar.gz", hash = "sha256:bd14967b79cd9bdb54d97323216f8fdf533e278df937aa2a90089e7d6e06e5ec"}, @@ -244,10 +349,18 @@ iniconfig = [ {file = "iniconfig-1.1.1-py2.py3-none-any.whl", hash = "sha256:011e24c64b7f47f6ebd835bb12a743f2fbe9a26d4cecaa7f53bc4f35ee9da8b3"}, {file = "iniconfig-1.1.1.tar.gz", hash = "sha256:bc3af051d7d14b2ee5ef9969666def0cd1a000e121eaea580d4a313df4b37f32"}, ] +packageurl-python = [ + {file = "packageurl-python-0.10.4.tar.gz", hash = "sha256:5c91334f942cd55d45eb0c67dd339a535ef90e25f05b9ec016ad188ed0ef9048"}, + {file = "packageurl_python-0.10.4-py3-none-any.whl", hash = "sha256:bf8a1ffe755634776f6563904d792fb0aa13b377fc86115c36fe17f69b6e59db"}, +] packaging = [ {file = "packaging-22.0-py3-none-any.whl", hash = "sha256:957e2148ba0e1a3b282772e791ef1d8083648bc131c8ab0c1feba110ce1146c3"}, {file = "packaging-22.0.tar.gz", hash = "sha256:2198ec20bd4c017b8f9717e00f0c8714076fc2fd93816750ab48e2c41de2cfd3"}, ] +pip-requirements-parser = [ + {file = "pip-requirements-parser-32.0.1.tar.gz", hash = "sha256:b4fa3a7a0be38243123cf9d1f3518da10c51bdb165a2b2985566247f9155a7d3"}, + {file = "pip_requirements_parser-32.0.1-py3-none-any.whl", hash = "sha256:4659bc2a667783e7a15d190f6fccf8b2486685b6dba4c19c3876314769c57526"}, +] pluggy = [ {file = "pluggy-1.0.0-py2.py3-none-any.whl", hash = "sha256:74134bbf457f031a36d68416e1509f34bd5ccc019f0bcc952c7b909d06b37bd3"}, {file = "pluggy-1.0.0.tar.gz", hash = "sha256:4224373bacce55f955a878bf9cfa763c1e360858e330072059e10bad68531159"}, @@ -256,6 +369,10 @@ pygments = [ {file = "Pygments-2.13.0-py3-none-any.whl", hash = "sha256:f643f331ab57ba3c9d89212ee4a2dabc6e94f117cf4eefde99a0574720d14c42"}, {file = "Pygments-2.13.0.tar.gz", hash = "sha256:56a8508ae95f98e2b9bdf93a6be5ae3f7d8af858b43e02c5a2ff083726be40c1"}, ] +pyparsing = [ + {file = "pyparsing-3.0.9-py3-none-any.whl", hash = "sha256:5026bae9a10eeaefb61dab2f09052b9f4307d44aee4eda64b309723d8d206bbc"}, + {file = "pyparsing-3.0.9.tar.gz", hash = "sha256:2b020ecf7d21b687f219b71ecad3631f644a47f01403fa1d1036b0c6416d70fb"}, +] pytest = [ {file = "pytest-7.2.0-py3-none-any.whl", hash = "sha256:892f933d339f068883b6fd5a459f03d85bfcb355e4981e146d2c7616c21fef71"}, {file = "pytest-7.2.0.tar.gz", hash = "sha256:c4014eb40e10f11f355ad4e3c2fb2c6c6d1919c73f3b5a433de4708202cade59"}, @@ -272,6 +389,18 @@ rich = [ {file = "rich-12.6.0-py3-none-any.whl", hash = "sha256:a4eb26484f2c82589bd9a17c73d32a010b1e29d89f1604cd9bf3a2097b81bb5e"}, {file = "rich-12.6.0.tar.gz", hash = "sha256:ba3a3775974105c221d31141f2c116f4fd65c5ceb0698657a11e9f295ec93fd0"}, ] +setuptools = [ + {file = "setuptools-65.7.0-py3-none-any.whl", hash = "sha256:8ab4f1dbf2b4a65f7eec5ad0c620e84c34111a68d3349833494b9088212214dd"}, + {file = "setuptools-65.7.0.tar.gz", hash = "sha256:4d3c92fac8f1118bb77a22181355e29c239cabfe2b9effdaa665c66b711136d7"}, +] +sortedcontainers = [ + {file = "sortedcontainers-2.4.0-py2.py3-none-any.whl", hash = "sha256:a163dcaede0f1c021485e957a39245190e74249897e2ae4b2aa38595db237ee0"}, + {file = "sortedcontainers-2.4.0.tar.gz", hash = "sha256:25caa5a06cc30b6b83d11423433f65d1f9d76c4c6a0c90e3379eaa43b9bfdb88"}, +] +toml = [ + {file = "toml-0.10.2-py2.py3-none-any.whl", hash = "sha256:806143ae5bfb6a3c6e736a764057db0e6a0e05e338b5630894a5f779cabb4f9b"}, + {file = "toml-0.10.2.tar.gz", hash = "sha256:b3bda1d108d5dd99f4a20d24d9c348e91c4db7ab1b749200bded2f839ccbe68f"}, +] tomli = [ {file = "tomli-2.0.1-py3-none-any.whl", hash = "sha256:939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecc"}, {file = "tomli-2.0.1.tar.gz", hash = "sha256:de526c12914f0c550d15924c62d72abc48d6fe7364aa87328337a31007fe8a4f"}, diff --git a/pyproject.toml b/pyproject.toml index c410e6a..2f040f7 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -11,6 +11,7 @@ requests = "^2.28.0" rich = "^12.4.4" python-dotenv = "^0.20.0" xlrd = "^2.0.1" +cyclonedx-bom = "^3.10.1" [tool.poetry.dev-dependencies] pytest = "^7.1.2" diff --git a/sbom.json b/sbom.json new file mode 100644 index 0000000..498bfbf --- /dev/null +++ b/sbom.json @@ -0,0 +1 @@ +{"$schema": "http://cyclonedx.org/schema/bom-1.4.schema.json", "bomFormat": "CycloneDX", "specVersion": "1.4", "serialNumber": "urn:uuid:48203189-4702-4717-a4dd-022b65ccc731", "version": 1, "metadata": {"timestamp": "2023-01-13T18:51:39.002073+00:00", "tools": [{"vendor": "CycloneDX", "name": "cyclonedx-bom", "version": "3.10.1"}, {"vendor": "CycloneDX", "name": "cyclonedx-python-lib", "version": "3.1.5", "externalReferences": [{"url": "https://github.com/CycloneDX/cyclonedx-python-lib/actions", "type": "build-system"}, {"url": "https://pypi.org/project/cyclonedx-python-lib/", "type": "distribution"}, {"url": "https://cyclonedx.github.io/cyclonedx-python-lib/", "type": "documentation"}, {"url": "https://github.com/CycloneDX/cyclonedx-python-lib/issues", "type": "issue-tracker"}, {"url": "https://github.com/CycloneDX/cyclonedx-python-lib/blob/main/LICENSE", "type": "license"}, {"url": "https://github.com/CycloneDX/cyclonedx-python-lib/blob/main/CHANGELOG.md", "type": "release-notes"}, {"url": "https://github.com/CycloneDX/cyclonedx-python-lib", "type": "vcs"}, {"url": "https://cyclonedx.org", "type": "website"}]}]}, "components": [{"type": "library", "bom-ref": "d9094fe1-cf0c-4241-a5d8-137046c329f5", "name": "attrs", "version": "22.1.0", "purl": "pkg:pypi/attrs@22.1.0", "externalReferences": [{"url": "https://pypi.org/project/attrs/22.1.0", "comment": "Distribution file: attrs-22.1.0-py2.py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "86efa402f67bf2df34f51a335487cf46b1ec130d02b8d39fd248abfd30da551c"}]}, {"url": "https://pypi.org/project/attrs/22.1.0", "comment": "Distribution file: attrs-22.1.0.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "29adc2665447e5191d0e7c568fde78b21f9672d344281d0c6e1ab085429b22b6"}]}]}, {"type": "library", "bom-ref": "1abc3315-8c2c-47ab-958e-fabb7f294c14", "name": "certifi", "version": "2022.12.7", "purl": "pkg:pypi/certifi@2022.12.7", "externalReferences": [{"url": "https://pypi.org/project/certifi/2022.12.7", "comment": "Distribution file: certifi-2022.12.7-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "4ad3232f5e926d6718ec31cfc1fcadfde020920e278684144551c91769c7bc18"}]}, {"url": "https://pypi.org/project/certifi/2022.12.7", "comment": "Distribution file: certifi-2022.12.7.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "35824b4c3a97115964b408844d64aa14db1cc518f6562e8d7261699d1350a9e3"}]}]}, {"type": "library", "bom-ref": "0254d936-11cb-4181-a0cb-9932980ed812", "name": "charset-normalizer", "version": "2.1.1", "purl": "pkg:pypi/charset-normalizer@2.1.1", "externalReferences": [{"url": "https://pypi.org/project/charset-normalizer/2.1.1", "comment": "Distribution file: charset-normalizer-2.1.1.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845"}]}, {"url": "https://pypi.org/project/charset-normalizer/2.1.1", "comment": "Distribution file: charset_normalizer-2.1.1-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f"}]}]}, {"type": "library", "bom-ref": "00d18de2-bfd3-4f92-9a4d-f7925cb0e8fd", "name": "colorama", "version": "0.4.6", "purl": "pkg:pypi/colorama@0.4.6", "externalReferences": [{"url": "https://pypi.org/project/colorama/0.4.6", "comment": "Distribution file: colorama-0.4.6-py2.py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "4f1d9991f5acc0ca119f9d443620b77f9d6b33703e51011c16baf57afb285fc6"}]}, {"url": "https://pypi.org/project/colorama/0.4.6", "comment": "Distribution file: colorama-0.4.6.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "08695f5cb7ed6e0531a20572697297273c47b8cae5a63ffc6d6ed5c201be6e44"}]}]}, {"type": "library", "bom-ref": "676fda99-194e-4d83-aeab-7374e17f7f8a", "name": "commonmark", "version": "0.9.1", "purl": "pkg:pypi/commonmark@0.9.1", "externalReferences": [{"url": "https://pypi.org/project/commonmark/0.9.1", "comment": "Distribution file: commonmark-0.9.1-py2.py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "da2f38c92590f83de410ba1a3cbceafbc74fee9def35f9251ba9a971d6d66fd9"}]}, {"url": "https://pypi.org/project/commonmark/0.9.1", "comment": "Distribution file: commonmark-0.9.1.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "452f9dc859be7f06631ddcb328b6919c67984aca654e5fefb3914d54691aed60"}]}]}, {"type": "library", "bom-ref": "cf26e705-e086-461d-ade2-d406ab3c7ecc", "name": "cyclonedx-bom", "version": "3.10.1", "purl": "pkg:pypi/cyclonedx-bom@3.10.1", "externalReferences": [{"url": "https://pypi.org/project/cyclonedx-bom/3.10.1", "comment": "Distribution file: cyclonedx_bom-3.10.1-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "a5d79303f51701fd8e08d7985761ddba04c44d9f0c9f0be3e8453344632af4cf"}]}, {"url": "https://pypi.org/project/cyclonedx-bom/3.10.1", "comment": "Distribution file: cyclonedx_bom-3.10.1.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "890083089216ba3487c6e344588ca89c65eeace2c534eced3b524142f851ff15"}]}]}, {"type": "library", "bom-ref": "6907e95b-ba3b-405e-a889-c306a58ab056", "name": "cyclonedx-python-lib", "version": "3.1.5", "purl": "pkg:pypi/cyclonedx-python-lib@3.1.5", "externalReferences": [{"url": "https://pypi.org/project/cyclonedx-python-lib/3.1.5", "comment": "Distribution file: cyclonedx_python_lib-3.1.5-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "8981ca462fba91469c268d684a03f72c89c7a807674d884f83a28d8c2822a9b6"}]}, {"url": "https://pypi.org/project/cyclonedx-python-lib/3.1.5", "comment": "Distribution file: cyclonedx_python_lib-3.1.5.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "1ccd482024a30b95c4fffb3fe567a9df97b705f34c1075f8abde8537867600c3"}]}]}, {"type": "library", "bom-ref": "fbc2d5c3-34fd-468e-9c8b-e435b3080a0a", "name": "exceptiongroup", "version": "1.0.4", "purl": "pkg:pypi/exceptiongroup@1.0.4", "externalReferences": [{"url": "https://pypi.org/project/exceptiongroup/1.0.4", "comment": "Distribution file: exceptiongroup-1.0.4-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "542adf9dea4055530d6e1279602fa5cb11dab2395fa650b8674eaec35fc4a828"}]}, {"url": "https://pypi.org/project/exceptiongroup/1.0.4", "comment": "Distribution file: exceptiongroup-1.0.4.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "bd14967b79cd9bdb54d97323216f8fdf533e278df937aa2a90089e7d6e06e5ec"}]}]}, {"type": "library", "bom-ref": "f86cea0c-adca-4992-b330-b8e6a7d5a849", "name": "idna", "version": "3.4", "purl": "pkg:pypi/idna@3.4", "externalReferences": [{"url": "https://pypi.org/project/idna/3.4", "comment": "Distribution file: idna-3.4-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2"}]}, {"url": "https://pypi.org/project/idna/3.4", "comment": "Distribution file: idna-3.4.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4"}]}]}, {"type": "library", "bom-ref": "1482e4c0-6be7-40bf-9b66-3245f45f7c87", "name": "iniconfig", "version": "1.1.1", "purl": "pkg:pypi/iniconfig@1.1.1", "externalReferences": [{"url": "https://pypi.org/project/iniconfig/1.1.1", "comment": "Distribution file: iniconfig-1.1.1-py2.py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "011e24c64b7f47f6ebd835bb12a743f2fbe9a26d4cecaa7f53bc4f35ee9da8b3"}]}, {"url": "https://pypi.org/project/iniconfig/1.1.1", "comment": "Distribution file: iniconfig-1.1.1.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "bc3af051d7d14b2ee5ef9969666def0cd1a000e121eaea580d4a313df4b37f32"}]}]}, {"type": "library", "bom-ref": "baf07740-3fdf-46a0-b39c-0b87ba7f7be3", "name": "packageurl-python", "version": "0.10.4", "purl": "pkg:pypi/packageurl-python@0.10.4", "externalReferences": [{"url": "https://pypi.org/project/packageurl-python/0.10.4", "comment": "Distribution file: packageurl-python-0.10.4.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "5c91334f942cd55d45eb0c67dd339a535ef90e25f05b9ec016ad188ed0ef9048"}]}, {"url": "https://pypi.org/project/packageurl-python/0.10.4", "comment": "Distribution file: packageurl_python-0.10.4-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "bf8a1ffe755634776f6563904d792fb0aa13b377fc86115c36fe17f69b6e59db"}]}]}, {"type": "library", "bom-ref": "ca4f7f11-19c1-46ac-9b00-5241c0fca2c6", "name": "packaging", "version": "22.0", "purl": "pkg:pypi/packaging@22.0", "externalReferences": [{"url": "https://pypi.org/project/packaging/22.0", "comment": "Distribution file: packaging-22.0-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "957e2148ba0e1a3b282772e791ef1d8083648bc131c8ab0c1feba110ce1146c3"}]}, {"url": "https://pypi.org/project/packaging/22.0", "comment": "Distribution file: packaging-22.0.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "2198ec20bd4c017b8f9717e00f0c8714076fc2fd93816750ab48e2c41de2cfd3"}]}]}, {"type": "library", "bom-ref": "10efec1c-862f-4900-909d-2d709e8345d2", "name": "pip-requirements-parser", "version": "32.0.1", "purl": "pkg:pypi/pip-requirements-parser@32.0.1", "externalReferences": [{"url": "https://pypi.org/project/pip-requirements-parser/32.0.1", "comment": "Distribution file: pip-requirements-parser-32.0.1.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "b4fa3a7a0be38243123cf9d1f3518da10c51bdb165a2b2985566247f9155a7d3"}]}, {"url": "https://pypi.org/project/pip-requirements-parser/32.0.1", "comment": "Distribution file: pip_requirements_parser-32.0.1-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "4659bc2a667783e7a15d190f6fccf8b2486685b6dba4c19c3876314769c57526"}]}]}, {"type": "library", "bom-ref": "2058e295-77ad-4dd1-b434-b2dbc435a655", "name": "pluggy", "version": "1.0.0", "purl": "pkg:pypi/pluggy@1.0.0", "externalReferences": [{"url": "https://pypi.org/project/pluggy/1.0.0", "comment": "Distribution file: pluggy-1.0.0-py2.py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "74134bbf457f031a36d68416e1509f34bd5ccc019f0bcc952c7b909d06b37bd3"}]}, {"url": "https://pypi.org/project/pluggy/1.0.0", "comment": "Distribution file: pluggy-1.0.0.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "4224373bacce55f955a878bf9cfa763c1e360858e330072059e10bad68531159"}]}]}, {"type": "library", "bom-ref": "cda93626-d3bf-4a7a-ac05-821cc09c946a", "name": "pygments", "version": "2.13.0", "purl": "pkg:pypi/pygments@2.13.0", "externalReferences": [{"url": "https://pypi.org/project/pygments/2.13.0", "comment": "Distribution file: Pygments-2.13.0-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "f643f331ab57ba3c9d89212ee4a2dabc6e94f117cf4eefde99a0574720d14c42"}]}, {"url": "https://pypi.org/project/pygments/2.13.0", "comment": "Distribution file: Pygments-2.13.0.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "56a8508ae95f98e2b9bdf93a6be5ae3f7d8af858b43e02c5a2ff083726be40c1"}]}]}, {"type": "library", "bom-ref": "b7d69f6d-174f-43a5-8c3c-7c89e7dc74aa", "name": "pyparsing", "version": "3.0.9", "purl": "pkg:pypi/pyparsing@3.0.9", "externalReferences": [{"url": "https://pypi.org/project/pyparsing/3.0.9", "comment": "Distribution file: pyparsing-3.0.9-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "5026bae9a10eeaefb61dab2f09052b9f4307d44aee4eda64b309723d8d206bbc"}]}, {"url": "https://pypi.org/project/pyparsing/3.0.9", "comment": "Distribution file: pyparsing-3.0.9.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "2b020ecf7d21b687f219b71ecad3631f644a47f01403fa1d1036b0c6416d70fb"}]}]}, {"type": "library", "bom-ref": "ba01c2c3-86c6-4162-b706-3c892372bb40", "name": "pytest", "version": "7.2.0", "purl": "pkg:pypi/pytest@7.2.0", "externalReferences": [{"url": "https://pypi.org/project/pytest/7.2.0", "comment": "Distribution file: pytest-7.2.0-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "892f933d339f068883b6fd5a459f03d85bfcb355e4981e146d2c7616c21fef71"}]}, {"url": "https://pypi.org/project/pytest/7.2.0", "comment": "Distribution file: pytest-7.2.0.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "c4014eb40e10f11f355ad4e3c2fb2c6c6d1919c73f3b5a433de4708202cade59"}]}]}, {"type": "library", "bom-ref": "7e540d28-aeb3-49ab-91df-cf547976781a", "name": "python-dotenv", "version": "0.20.0", "purl": "pkg:pypi/python-dotenv@0.20.0", "externalReferences": [{"url": "https://pypi.org/project/python-dotenv/0.20.0", "comment": "Distribution file: python-dotenv-0.20.0.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "b7e3b04a59693c42c36f9ab1cc2acc46fa5df8c78e178fc33a8d4cd05c8d498f"}]}, {"url": "https://pypi.org/project/python-dotenv/0.20.0", "comment": "Distribution file: python_dotenv-0.20.0-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "d92a187be61fe482e4fd675b6d52200e7be63a12b724abbf931a40ce4fa92938"}]}]}, {"type": "library", "bom-ref": "70e9d5a5-1fbc-4075-b44a-737713375430", "name": "requests", "version": "2.28.1", "purl": "pkg:pypi/requests@2.28.1", "externalReferences": [{"url": "https://pypi.org/project/requests/2.28.1", "comment": "Distribution file: requests-2.28.1-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349"}]}, {"url": "https://pypi.org/project/requests/2.28.1", "comment": "Distribution file: requests-2.28.1.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983"}]}]}, {"type": "library", "bom-ref": "bab83f01-1d72-4114-b1b0-90ebd6f9cd07", "name": "rich", "version": "12.6.0", "purl": "pkg:pypi/rich@12.6.0", "externalReferences": [{"url": "https://pypi.org/project/rich/12.6.0", "comment": "Distribution file: rich-12.6.0-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "a4eb26484f2c82589bd9a17c73d32a010b1e29d89f1604cd9bf3a2097b81bb5e"}]}, {"url": "https://pypi.org/project/rich/12.6.0", "comment": "Distribution file: rich-12.6.0.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "ba3a3775974105c221d31141f2c116f4fd65c5ceb0698657a11e9f295ec93fd0"}]}]}, {"type": "library", "bom-ref": "ee074447-eb44-4687-9c63-c2c690cdee02", "name": "setuptools", "version": "65.7.0", "purl": "pkg:pypi/setuptools@65.7.0", "externalReferences": [{"url": "https://pypi.org/project/setuptools/65.7.0", "comment": "Distribution file: setuptools-65.7.0-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "8ab4f1dbf2b4a65f7eec5ad0c620e84c34111a68d3349833494b9088212214dd"}]}, {"url": "https://pypi.org/project/setuptools/65.7.0", "comment": "Distribution file: setuptools-65.7.0.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "4d3c92fac8f1118bb77a22181355e29c239cabfe2b9effdaa665c66b711136d7"}]}]}, {"type": "library", "bom-ref": "b949b877-355d-432a-aba9-19928b033d2c", "name": "sortedcontainers", "version": "2.4.0", "purl": "pkg:pypi/sortedcontainers@2.4.0", "externalReferences": [{"url": "https://pypi.org/project/sortedcontainers/2.4.0", "comment": "Distribution file: sortedcontainers-2.4.0-py2.py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "a163dcaede0f1c021485e957a39245190e74249897e2ae4b2aa38595db237ee0"}]}, {"url": "https://pypi.org/project/sortedcontainers/2.4.0", "comment": "Distribution file: sortedcontainers-2.4.0.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "25caa5a06cc30b6b83d11423433f65d1f9d76c4c6a0c90e3379eaa43b9bfdb88"}]}]}, {"type": "library", "bom-ref": "7d6fcc4e-7791-489b-9a0b-8da9ab645c73", "name": "toml", "version": "0.10.2", "purl": "pkg:pypi/toml@0.10.2", "externalReferences": [{"url": "https://pypi.org/project/toml/0.10.2", "comment": "Distribution file: toml-0.10.2-py2.py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "806143ae5bfb6a3c6e736a764057db0e6a0e05e338b5630894a5f779cabb4f9b"}]}, {"url": "https://pypi.org/project/toml/0.10.2", "comment": "Distribution file: toml-0.10.2.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "b3bda1d108d5dd99f4a20d24d9c348e91c4db7ab1b749200bded2f839ccbe68f"}]}]}, {"type": "library", "bom-ref": "a4a60f80-0712-43ca-9757-2505da743830", "name": "tomli", "version": "2.0.1", "purl": "pkg:pypi/tomli@2.0.1", "externalReferences": [{"url": "https://pypi.org/project/tomli/2.0.1", "comment": "Distribution file: tomli-2.0.1-py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecc"}]}, {"url": "https://pypi.org/project/tomli/2.0.1", "comment": "Distribution file: tomli-2.0.1.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "de526c12914f0c550d15924c62d72abc48d6fe7364aa87328337a31007fe8a4f"}]}]}, {"type": "library", "bom-ref": "4b82debd-f750-470f-81c1-6995e9e90b36", "name": "urllib3", "version": "1.26.13", "purl": "pkg:pypi/urllib3@1.26.13", "externalReferences": [{"url": "https://pypi.org/project/urllib3/1.26.13", "comment": "Distribution file: urllib3-1.26.13-py2.py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fc"}]}, {"url": "https://pypi.org/project/urllib3/1.26.13", "comment": "Distribution file: urllib3-1.26.13.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "c083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8"}]}]}, {"type": "library", "bom-ref": "825f23f0-a06e-48d1-9276-7ee8db5cd837", "name": "xlrd", "version": "2.0.1", "purl": "pkg:pypi/xlrd@2.0.1", "externalReferences": [{"url": "https://pypi.org/project/xlrd/2.0.1", "comment": "Distribution file: xlrd-2.0.1-py2.py3-none-any.whl", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "6a33ee89877bd9abc1158129f6e94be74e2679636b8a205b43b85206c3f0bbdd"}]}, {"url": "https://pypi.org/project/xlrd/2.0.1", "comment": "Distribution file: xlrd-2.0.1.tar.gz", "type": "distribution", "hashes": [{"alg": "SHA-256", "content": "f72f148f54442c6b056bf931dbc34f986fd0c3b0b6b5a58d013c9aef274d0c88"}]}]}], "dependencies": [{"ref": "d9094fe1-cf0c-4241-a5d8-137046c329f5", "dependsOn": []}, {"ref": "1abc3315-8c2c-47ab-958e-fabb7f294c14", "dependsOn": []}, {"ref": "0254d936-11cb-4181-a0cb-9932980ed812", "dependsOn": []}, {"ref": "00d18de2-bfd3-4f92-9a4d-f7925cb0e8fd", "dependsOn": []}, {"ref": "676fda99-194e-4d83-aeab-7374e17f7f8a", "dependsOn": []}, {"ref": "cf26e705-e086-461d-ade2-d406ab3c7ecc", "dependsOn": []}, {"ref": "6907e95b-ba3b-405e-a889-c306a58ab056", "dependsOn": []}, {"ref": "fbc2d5c3-34fd-468e-9c8b-e435b3080a0a", "dependsOn": []}, {"ref": "f86cea0c-adca-4992-b330-b8e6a7d5a849", "dependsOn": []}, {"ref": "1482e4c0-6be7-40bf-9b66-3245f45f7c87", "dependsOn": []}, {"ref": "baf07740-3fdf-46a0-b39c-0b87ba7f7be3", "dependsOn": []}, {"ref": "ca4f7f11-19c1-46ac-9b00-5241c0fca2c6", "dependsOn": []}, {"ref": "10efec1c-862f-4900-909d-2d709e8345d2", "dependsOn": []}, {"ref": "2058e295-77ad-4dd1-b434-b2dbc435a655", "dependsOn": []}, {"ref": "cda93626-d3bf-4a7a-ac05-821cc09c946a", "dependsOn": []}, {"ref": "b7d69f6d-174f-43a5-8c3c-7c89e7dc74aa", "dependsOn": []}, {"ref": "ba01c2c3-86c6-4162-b706-3c892372bb40", "dependsOn": []}, {"ref": "7e540d28-aeb3-49ab-91df-cf547976781a", "dependsOn": []}, {"ref": "70e9d5a5-1fbc-4075-b44a-737713375430", "dependsOn": []}, {"ref": "bab83f01-1d72-4114-b1b0-90ebd6f9cd07", "dependsOn": []}, {"ref": "ee074447-eb44-4687-9c63-c2c690cdee02", "dependsOn": []}, {"ref": "b949b877-355d-432a-aba9-19928b033d2c", "dependsOn": []}, {"ref": "7d6fcc4e-7791-489b-9a0b-8da9ab645c73", "dependsOn": []}, {"ref": "a4a60f80-0712-43ca-9757-2505da743830", "dependsOn": []}, {"ref": "4b82debd-f750-470f-81c1-6995e9e90b36", "dependsOn": []}, {"ref": "825f23f0-a06e-48d1-9276-7ee8db5cd837", "dependsOn": []}]} diff --git a/sbom.xml b/sbom.xml new file mode 100644 index 0000000..02a51c8 --- /dev/null +++ b/sbom.xml @@ -0,0 +1 @@ +2023-01-13T18:51:28.429372+00:00CycloneDXcyclonedx-bom3.10.1CycloneDXcyclonedx-python-lib3.1.5https://github.com/CycloneDX/cyclonedx-python-lib/actionshttps://pypi.org/project/cyclonedx-python-lib/https://cyclonedx.github.io/cyclonedx-python-lib/https://github.com/CycloneDX/cyclonedx-python-lib/issueshttps://github.com/CycloneDX/cyclonedx-python-lib/blob/main/LICENSEhttps://github.com/CycloneDX/cyclonedx-python-lib/blob/main/CHANGELOG.mdhttps://github.com/CycloneDX/cyclonedx-python-libhttps://cyclonedx.orgattrs22.1.0pkg:pypi/attrs@22.1.0https://pypi.org/project/attrs/22.1.0Distribution file: attrs-22.1.0-py2.py3-none-any.whl86efa402f67bf2df34f51a335487cf46b1ec130d02b8d39fd248abfd30da551chttps://pypi.org/project/attrs/22.1.0Distribution file: attrs-22.1.0.tar.gz29adc2665447e5191d0e7c568fde78b21f9672d344281d0c6e1ab085429b22b6certifi2022.12.7pkg:pypi/certifi@2022.12.7https://pypi.org/project/certifi/2022.12.7Distribution file: certifi-2022.12.7-py3-none-any.whl4ad3232f5e926d6718ec31cfc1fcadfde020920e278684144551c91769c7bc18https://pypi.org/project/certifi/2022.12.7Distribution file: certifi-2022.12.7.tar.gz35824b4c3a97115964b408844d64aa14db1cc518f6562e8d7261699d1350a9e3charset-normalizer2.1.1pkg:pypi/charset-normalizer@2.1.1https://pypi.org/project/charset-normalizer/2.1.1Distribution file: charset-normalizer-2.1.1.tar.gz5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845https://pypi.org/project/charset-normalizer/2.1.1Distribution file: charset_normalizer-2.1.1-py3-none-any.whl83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29fcolorama0.4.6pkg:pypi/colorama@0.4.6https://pypi.org/project/colorama/0.4.6Distribution file: colorama-0.4.6-py2.py3-none-any.whl4f1d9991f5acc0ca119f9d443620b77f9d6b33703e51011c16baf57afb285fc6https://pypi.org/project/colorama/0.4.6Distribution file: colorama-0.4.6.tar.gz08695f5cb7ed6e0531a20572697297273c47b8cae5a63ffc6d6ed5c201be6e44commonmark0.9.1pkg:pypi/commonmark@0.9.1https://pypi.org/project/commonmark/0.9.1Distribution file: commonmark-0.9.1-py2.py3-none-any.whlda2f38c92590f83de410ba1a3cbceafbc74fee9def35f9251ba9a971d6d66fd9https://pypi.org/project/commonmark/0.9.1Distribution file: commonmark-0.9.1.tar.gz452f9dc859be7f06631ddcb328b6919c67984aca654e5fefb3914d54691aed60cyclonedx-bom3.10.1pkg:pypi/cyclonedx-bom@3.10.1https://pypi.org/project/cyclonedx-bom/3.10.1Distribution file: cyclonedx_bom-3.10.1-py3-none-any.whla5d79303f51701fd8e08d7985761ddba04c44d9f0c9f0be3e8453344632af4cfhttps://pypi.org/project/cyclonedx-bom/3.10.1Distribution file: cyclonedx_bom-3.10.1.tar.gz890083089216ba3487c6e344588ca89c65eeace2c534eced3b524142f851ff15cyclonedx-python-lib3.1.5pkg:pypi/cyclonedx-python-lib@3.1.5https://pypi.org/project/cyclonedx-python-lib/3.1.5Distribution file: cyclonedx_python_lib-3.1.5-py3-none-any.whl8981ca462fba91469c268d684a03f72c89c7a807674d884f83a28d8c2822a9b6https://pypi.org/project/cyclonedx-python-lib/3.1.5Distribution file: cyclonedx_python_lib-3.1.5.tar.gz1ccd482024a30b95c4fffb3fe567a9df97b705f34c1075f8abde8537867600c3exceptiongroup1.0.4pkg:pypi/exceptiongroup@1.0.4https://pypi.org/project/exceptiongroup/1.0.4Distribution file: exceptiongroup-1.0.4-py3-none-any.whl542adf9dea4055530d6e1279602fa5cb11dab2395fa650b8674eaec35fc4a828https://pypi.org/project/exceptiongroup/1.0.4Distribution file: exceptiongroup-1.0.4.tar.gzbd14967b79cd9bdb54d97323216f8fdf533e278df937aa2a90089e7d6e06e5ecidna3.4pkg:pypi/idna@3.4https://pypi.org/project/idna/3.4Distribution file: idna-3.4-py3-none-any.whl90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2https://pypi.org/project/idna/3.4Distribution file: idna-3.4.tar.gz814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4iniconfig1.1.1pkg:pypi/iniconfig@1.1.1https://pypi.org/project/iniconfig/1.1.1Distribution file: iniconfig-1.1.1-py2.py3-none-any.whl011e24c64b7f47f6ebd835bb12a743f2fbe9a26d4cecaa7f53bc4f35ee9da8b3https://pypi.org/project/iniconfig/1.1.1Distribution file: iniconfig-1.1.1.tar.gzbc3af051d7d14b2ee5ef9969666def0cd1a000e121eaea580d4a313df4b37f32packageurl-python0.10.4pkg:pypi/packageurl-python@0.10.4https://pypi.org/project/packageurl-python/0.10.4Distribution file: packageurl-python-0.10.4.tar.gz5c91334f942cd55d45eb0c67dd339a535ef90e25f05b9ec016ad188ed0ef9048https://pypi.org/project/packageurl-python/0.10.4Distribution file: packageurl_python-0.10.4-py3-none-any.whlbf8a1ffe755634776f6563904d792fb0aa13b377fc86115c36fe17f69b6e59dbpackaging22.0pkg:pypi/packaging@22.0https://pypi.org/project/packaging/22.0Distribution file: packaging-22.0-py3-none-any.whl957e2148ba0e1a3b282772e791ef1d8083648bc131c8ab0c1feba110ce1146c3https://pypi.org/project/packaging/22.0Distribution file: packaging-22.0.tar.gz2198ec20bd4c017b8f9717e00f0c8714076fc2fd93816750ab48e2c41de2cfd3pip-requirements-parser32.0.1pkg:pypi/pip-requirements-parser@32.0.1https://pypi.org/project/pip-requirements-parser/32.0.1Distribution file: pip-requirements-parser-32.0.1.tar.gzb4fa3a7a0be38243123cf9d1f3518da10c51bdb165a2b2985566247f9155a7d3https://pypi.org/project/pip-requirements-parser/32.0.1Distribution file: pip_requirements_parser-32.0.1-py3-none-any.whl4659bc2a667783e7a15d190f6fccf8b2486685b6dba4c19c3876314769c57526pluggy1.0.0pkg:pypi/pluggy@1.0.0https://pypi.org/project/pluggy/1.0.0Distribution file: pluggy-1.0.0-py2.py3-none-any.whl74134bbf457f031a36d68416e1509f34bd5ccc019f0bcc952c7b909d06b37bd3https://pypi.org/project/pluggy/1.0.0Distribution file: pluggy-1.0.0.tar.gz4224373bacce55f955a878bf9cfa763c1e360858e330072059e10bad68531159pygments2.13.0pkg:pypi/pygments@2.13.0https://pypi.org/project/pygments/2.13.0Distribution file: Pygments-2.13.0-py3-none-any.whlf643f331ab57ba3c9d89212ee4a2dabc6e94f117cf4eefde99a0574720d14c42https://pypi.org/project/pygments/2.13.0Distribution file: Pygments-2.13.0.tar.gz56a8508ae95f98e2b9bdf93a6be5ae3f7d8af858b43e02c5a2ff083726be40c1pyparsing3.0.9pkg:pypi/pyparsing@3.0.9https://pypi.org/project/pyparsing/3.0.9Distribution file: pyparsing-3.0.9-py3-none-any.whl5026bae9a10eeaefb61dab2f09052b9f4307d44aee4eda64b309723d8d206bbchttps://pypi.org/project/pyparsing/3.0.9Distribution file: pyparsing-3.0.9.tar.gz2b020ecf7d21b687f219b71ecad3631f644a47f01403fa1d1036b0c6416d70fbpytest7.2.0pkg:pypi/pytest@7.2.0https://pypi.org/project/pytest/7.2.0Distribution file: pytest-7.2.0-py3-none-any.whl892f933d339f068883b6fd5a459f03d85bfcb355e4981e146d2c7616c21fef71https://pypi.org/project/pytest/7.2.0Distribution file: pytest-7.2.0.tar.gzc4014eb40e10f11f355ad4e3c2fb2c6c6d1919c73f3b5a433de4708202cade59python-dotenv0.20.0pkg:pypi/python-dotenv@0.20.0https://pypi.org/project/python-dotenv/0.20.0Distribution file: python-dotenv-0.20.0.tar.gzb7e3b04a59693c42c36f9ab1cc2acc46fa5df8c78e178fc33a8d4cd05c8d498fhttps://pypi.org/project/python-dotenv/0.20.0Distribution file: python_dotenv-0.20.0-py3-none-any.whld92a187be61fe482e4fd675b6d52200e7be63a12b724abbf931a40ce4fa92938requests2.28.1pkg:pypi/requests@2.28.1https://pypi.org/project/requests/2.28.1Distribution file: requests-2.28.1-py3-none-any.whl8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349https://pypi.org/project/requests/2.28.1Distribution file: requests-2.28.1.tar.gz7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983rich12.6.0pkg:pypi/rich@12.6.0https://pypi.org/project/rich/12.6.0Distribution file: rich-12.6.0-py3-none-any.whla4eb26484f2c82589bd9a17c73d32a010b1e29d89f1604cd9bf3a2097b81bb5ehttps://pypi.org/project/rich/12.6.0Distribution file: rich-12.6.0.tar.gzba3a3775974105c221d31141f2c116f4fd65c5ceb0698657a11e9f295ec93fd0setuptools65.7.0pkg:pypi/setuptools@65.7.0https://pypi.org/project/setuptools/65.7.0Distribution file: setuptools-65.7.0-py3-none-any.whl8ab4f1dbf2b4a65f7eec5ad0c620e84c34111a68d3349833494b9088212214ddhttps://pypi.org/project/setuptools/65.7.0Distribution file: setuptools-65.7.0.tar.gz4d3c92fac8f1118bb77a22181355e29c239cabfe2b9effdaa665c66b711136d7sortedcontainers2.4.0pkg:pypi/sortedcontainers@2.4.0https://pypi.org/project/sortedcontainers/2.4.0Distribution file: sortedcontainers-2.4.0-py2.py3-none-any.whla163dcaede0f1c021485e957a39245190e74249897e2ae4b2aa38595db237ee0https://pypi.org/project/sortedcontainers/2.4.0Distribution file: sortedcontainers-2.4.0.tar.gz25caa5a06cc30b6b83d11423433f65d1f9d76c4c6a0c90e3379eaa43b9bfdb88toml0.10.2pkg:pypi/toml@0.10.2https://pypi.org/project/toml/0.10.2Distribution file: toml-0.10.2-py2.py3-none-any.whl806143ae5bfb6a3c6e736a764057db0e6a0e05e338b5630894a5f779cabb4f9bhttps://pypi.org/project/toml/0.10.2Distribution file: toml-0.10.2.tar.gzb3bda1d108d5dd99f4a20d24d9c348e91c4db7ab1b749200bded2f839ccbe68ftomli2.0.1pkg:pypi/tomli@2.0.1https://pypi.org/project/tomli/2.0.1Distribution file: tomli-2.0.1-py3-none-any.whl939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecchttps://pypi.org/project/tomli/2.0.1Distribution file: tomli-2.0.1.tar.gzde526c12914f0c550d15924c62d72abc48d6fe7364aa87328337a31007fe8a4furllib31.26.13pkg:pypi/urllib3@1.26.13https://pypi.org/project/urllib3/1.26.13Distribution file: urllib3-1.26.13-py2.py3-none-any.whl47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fchttps://pypi.org/project/urllib3/1.26.13Distribution file: urllib3-1.26.13.tar.gzc083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8xlrd2.0.1pkg:pypi/xlrd@2.0.1https://pypi.org/project/xlrd/2.0.1Distribution file: xlrd-2.0.1-py2.py3-none-any.whl6a33ee89877bd9abc1158129f6e94be74e2679636b8a205b43b85206c3f0bbddhttps://pypi.org/project/xlrd/2.0.1Distribution file: xlrd-2.0.1.tar.gzf72f148f54442c6b056bf931dbc34f986fd0c3b0b6b5a58d013c9aef274d0c88 diff --git a/src/ratatoskr/__init__.py b/src/ratatoskr/__init__.py index 195df0f..12a0199 100644 --- a/src/ratatoskr/__init__.py +++ b/src/ratatoskr/__init__.py @@ -5,23 +5,25 @@ __version__ = "0.5.0" __prog__ = "ratatoskr.py" -from ratatoskr import verify_environment -from ratatoskr import get_ratelimit_status -from ratatoskr import get_urls -from ratatoskr import get_gitlab_latest_release -from ratatoskr import get_gitlab_latest_commit -from ratatoskr import get_latest_release -from ratatoskr import get_latest_commit -from ratatoskr import update_tracker -from ratatoskr import insert_repo -from ratatoskr import confirm_table -from ratatoskr import delete_repo -from ratatoskr import confirm_repo -from ratatoskr import bootstrap_db -from ratatoskr import dump_table -from ratatoskr import read_repositories -from ratatoskr import save_messages -from ratatoskr import send_webhook -from ratatoskr import parse_arguments -from ratatoskr import prepare_database -from ratatoskr import main +from ratatoskr import ( + bootstrap_db, + confirm_repo, + confirm_table, + delete_repo, + dump_table, + get_gitlab_latest_commit, + get_gitlab_latest_release, + get_latest_commit, + get_latest_release, + get_ratelimit_status, + get_urls, + insert_repo, + main, + parse_arguments, + prepare_database, + read_repositories, + save_messages, + send_webhook, + update_tracker, + verify_environment, +) diff --git a/src/ratatoskr/convert_to_csv.py b/src/ratatoskr/convert_to_csv.py index 860abc9..a16aee5 100644 --- a/src/ratatoskr/convert_to_csv.py +++ b/src/ratatoskr/convert_to_csv.py @@ -3,9 +3,10 @@ # This python script is to extract each sheet in an Excel workbook as a new csv file import csv -import xlrd import sys +import xlrd + def ExceltoCSV(excel_file, csv_file): """Convert Excel XLS file to CSV""" @@ -15,7 +16,6 @@ def ExceltoCSV(excel_file, csv_file): # Iterate over each tab/sheet name for sheet_name in workbook.sheet_names(): - print(f"[-] INFO Processing sheet name - {sheet_name}") # Define our worksheet by index diff --git a/src/ratatoskr/ratatoskr.py b/src/ratatoskr/ratatoskr.py index 0f700e1..867f9ca 100644 --- a/src/ratatoskr/ratatoskr.py +++ b/src/ratatoskr/ratatoskr.py @@ -92,7 +92,6 @@ def verify_gitlab_token(session): # If we don't have 2XX status code if not response.ok: - # Check if we have expired GitLab Token if response_json["message"] == "401 Unauthorized": console.print( @@ -504,9 +503,10 @@ def send_webhook(message, webhook_url, provider, filename): # https://docs.rocket.chat/guides/administration/admin-panel/integrations if provider == "rocketchat": data = { - "username": "rocket.cat", - "icon_emoji": ":chipmunk:", - "attachments": [{"text": message, "color": "#764FA5"}], + "emoji": ":chipmunk:", + "attachments": [ + {"title": "ratatoskr notify", "text": message, "color": "#764FA5"} + ], } # HTTP POST to our Webhook URL diff --git a/src/tests/ratatoskr_test.py b/src/tests/ratatoskr_test.py index 417bede..f78352b 100644 --- a/src/tests/ratatoskr_test.py +++ b/src/tests/ratatoskr_test.py @@ -1,4 +1,5 @@ import pytest + from ratatoskr import verify_environment