日韩av黄I国产麻豆传媒I国产91av视频在线观看I日韩一区二区三区在线看I美女国产在线I麻豆视频国产在线观看I成人黄色短片

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

红队武器库-网络安全人员必备

發(fā)布時間:2024/3/7 编程问答 47 豆豆
生活随笔 收集整理的這篇文章主要介紹了 红队武器库-网络安全人员必备 小編覺得挺不錯的,現(xiàn)在分享給大家,幫大家做個參考.

包含內(nèi)容:

偵察

武器化

投遞

命令與控制

橫向移動

建立立足點

提權(quán)

數(shù)據(jù)傳輸

雜項

內(nèi)容很不錯,建議轉(zhuǎn)發(fā)朋友圈作為存檔。

偵察

主動情報收集

  • EyeWitness?is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.?

    https://github.com/ChrisTruncer/EyeWitness

  • AWSBucketDump?is a tool to quickly enumerate AWS S3 buckets to look for loot.?

    https://github.com/jordanpotti/AWSBucketDump

  • AQUATONE?is a set of tools for performing reconnaissance on domain names.?

    https://github.com/michenriksen/aquatone

  • spoofcheck?a program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing.?

    https://github.com/BishopFox/spoofcheck

  • Nmap?is used to discover hosts and services on a computer network, thus building a "map" of the network.?

    https://github.com/nmap/nmap

  • dnsrecon?a tool DNS Enumeration Script.?

    https://github.com/darkoperator/dnsrecon

  • dirsearch?is a simple command line tool designed to brute force directories and files in websites.?

    https://github.com/maurosoria/dirsearch

  • Sn1per?automated pentest recon scanner.?

    https://github.com/1N3/Sn1per

被動情報收集

  • Social Mapper?OSINT Social Media Mapping Tool, takes a list of names & images (or LinkedIn company name) and performs automated target searching on a huge scale across multiple social media sites. Not restricted by APIs as it instruments a browser using Selenium. Outputs reports to aid in correlating targets across sites.?

    https://github.com/SpiderLabs/social_mapper

  • skiptracer?OSINT scraping framework, utilizes some basic python webscraping (BeautifulSoup) of PII paywall sites to compile passive information on a target on a ramen noodle budget.?

    https://github.com/xillwillx/skiptracer

  • FOCA?(Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans.?

    https://github.com/ElevenPaths/FOCA

  • theHarvester?is a tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names from different public sources.?

? ? ? ?https://github.com/laramies/theHarvester

  • Metagoofil?is a tool for extracting metadata of public documents (pdf,doc,xls,ppt,etc) availables in the target websites.?

    https://github.com/laramies/metagoofil

  • SimplyEmail?Email recon made fast and easy, with a framework to build on.?

    https://github.com/killswitch-GUI/SimplyEmail

  • truffleHog?searches through git repositories for secrets, digging deep into commit history and branches.?

    https://github.com/dxa4481/truffleHog

  • Just-Metadata?is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within a large dataset.

    ?https://github.com/ChrisTruncer/Just-Metadata

  • typofinder?a finder of domain typos showing country of IP address.?

    https://github.com/nccgroup/typofinder

  • pwnedOrNot?is a python script which checks if the email account has been compromised in a data breach, if the email account is compromised it proceeds to find passwords for the compromised account.?

    https://github.com/thewhiteh4t/pwnedOrNot

  • GitHarvester?This tool is used for harvesting information from GitHub like google dork.?

    https://github.com/metac0rtex/GitHarvester

  • pwndb?is a python command-line tool for searching leaked credentials using the Onion service with the same name.?

    https://github.com/davidtavarez/pwndb/

  • LinkedInt?LinkedIn Recon Tool.?

    https://github.com/vysecurity/LinkedInt

  • CrossLinked?LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping.?

    https://github.com/m8r0wn/CrossLinked

  • findomain?is a fast domain enumeration tool that uses Certificate Transparency logs and a selection of APIs.?

    https://github.com/Edu4rdSHL/findomain

框架

  • Maltego?is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.?

    https://www.paterva.com/web7/downloads.php

  • SpiderFoot?the open source footprinting and intelligence-gathering tool.?

    https://github.com/smicallef/spiderfoot

  • datasploit?is an OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.?

    https://github.com/DataSploit/datasploit

  • Recon-ng?is a full-featured Web Reconnaissance framework written in Python.?

    https://bitbucket.org/LaNMaSteR53/recon-ng

紅隊武器化

  • WinRAR Remote Code Execution?Proof of Concept exploit for CVE-2018-20250.?https://github.com/WyAtu/CVE-2018-20250

  • Composite Moniker?Proof of Concept exploit for CVE-2017-8570.?

    https://github.com/rxwx/CVE-2017-8570

  • Exploit toolkit CVE-2017-8759?is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE.?

    https://github.com/bhdresh/CVE-2017-8759

  • CVE-2017-11882 Exploit?accepts over 17k bytes long command/code in maximum.?

    https://github.com/unamer/CVE-2017-11882

  • Adobe Flash Exploit?CVE-2018-4878.?

    https://github.com/anbai-inc/CVE-2018-4878

  • Exploit toolkit CVE-2017-0199?is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE.?

    https://github.com/bhdresh/CVE-2017-0199

  • demiguise?is a HTA encryption tool for RedTeams.?

    https://github.com/nccgroup/demiguise

  • Office-DDE-Payloads?collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.?

    https://github.com/0xdeadbeefJERKY/Office-DDE-Payloads

  • CACTUSTORCH?Payload Generation for Adversary Simulations.?

    https://github.com/mdsecactivebreach/CACTUSTORCH

  • SharpShooter?is a payload creation framework for the retrieval and execution of arbitrary CSharp source code.?

    https://github.com/mdsecactivebreach/SharpShooter

  • Don't kill my cat?is a tool that generates obfuscated shellcode that is stored inside of polyglot images. The image is 100% valid and also 100% valid shellcode.?

    https://github.com/Mr-Un1k0d3r/DKMC

  • Malicious Macro Generator Utility?Simple utility design to generate obfuscated macro that also include a AV / Sandboxes escape mechanism.?

    https://github.com/Mr-Un1k0d3r/MaliciousMacroGenerator

  • SCT Obfuscator?Cobalt Strike SCT payload obfuscator.?

    https://github.com/Mr-Un1k0d3r/SCT-obfuscator

  • Invoke-Obfuscation?PowerShell Obfuscator.?

    https://github.com/danielbohannon/Invoke-Obfuscation

  • Invoke-CradleCrafter?PowerShell remote download cradle generator and obfuscator.

    https://github.com/danielbohannon/Invoke-CradleCrafter

  • Invoke-DOSfuscation?cmd.exe Command Obfuscation Generator & Detection Test Harness.?

    https://github.com/danielbohannon/Invoke-DOSfuscation

  • morphHTA?Morphing Cobalt Strike's evil.HTA.?

    https://github.com/vysec/morphHTA

  • Unicorn?is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory.?

    https://github.com/trustedsec/unicorn

  • Shellter?is a dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.?

    https://www.shellterproject.com/

  • EmbedInHTML?Embed and hide any file in an HTML file.?

    https://github.com/Arno0x/EmbedInHTML

  • SigThief?Stealing Signatures and Making One Invalid Signature at a Time.?

    https://github.com/secretsquirrel/SigThief

  • Veil?is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.?

    https://github.com/Veil-Framework/Veil

  • CheckPlease?Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.?

    https://github.com/Arvanaghi/CheckPlease

  • Invoke-PSImage?is a tool to embeded a PowerShell script in the pixels of a PNG file and generates a oneliner to execute.?

    https://github.com/peewpw/Invoke-PSImage

  • LuckyStrike?a PowerShell based utility for the creation of malicious Office macro documents. To be used for pentesting or educational purposes only.?

    https://github.com/curi0usJack/luckystrike

  • ClickOnceGenerator?Quick Malicious ClickOnceGenerator for Red Team. The default application a simple WebBrowser widget that point to a website of your choice.?

    https://github.com/Mr-Un1k0d3r/ClickOnceGenerator

  • macro_pack?is a tool by @EmericNasi used to automatize obfuscation and generation of MS Office documents, VB scripts, and other formats for pentest, demo, and social engineering assessments.?

    https://github.com/sevagas/macro_pack

  • StarFighters?a JavaScript and VBScript Based Empire Launcher.?https://github.com/Cn33liz/StarFighters

  • nps_payload?this script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources.?

? ? ? ?https://github.com/trustedsec/nps_payload

  • SocialEngineeringPayloads?a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.?

    https://github.com/bhdresh/SocialEngineeringPayloads

  • The Social-Engineer Toolkit?is an open-source penetration testing framework designed for social engineering.?

    https://github.com/trustedsec/social-engineer-toolkit

  • Phishery?is a Simple SSL Enabled HTTP server with the primary purpose of phishing credentials via Basic Authentication.?

    https://github.com/ryhanson/phishery

  • PowerShdll?run PowerShell with rundll32. Bypass software restrictions.?

    https://github.com/p3nt4/PowerShdll

  • Ultimate AppLocker ByPass List?The goal of this repository is to document the most common techniques to bypass AppLocker.?

    https://github.com/api0cradle/UltimateAppLockerByPassList

  • Ruler?is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol.?

    https://github.com/sensepost/ruler

  • Generate-Macro?is a standalone PowerShell script that will generate a malicious Microsoft Office document with a specified payload and persistence method.?

    https://github.com/enigma0x3/Generate-Macro

  • Malicious Macro MSBuild Generator?Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.?

    https://github.com/infosecn1nja/MaliciousMacroMSBuild

  • Meta Twin?is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into another.?

    https://github.com/threatexpress/metatwin

  • WePWNise?generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.?

    https://github.com/mwrlabs/wePWNise

  • DotNetToJScript?a tool to create a JScript file which loads a .NET v2 assembly from memory.?

    https://github.com/tyranid/DotNetToJScript

  • PSAmsi?is a tool for auditing and defeating AMSI signatures.?

    https://github.com/cobbr/PSAmsi

  • Reflective DLL injection?is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.?

    https://github.com/stephenfewer/ReflectiveDLLInjection

  • ps1encode?use to generate and encode a powershell based metasploit payloads.?

    https://github.com/CroweCybersecurity/ps1encode

  • Worse PDF?turn a normal PDF file into malicious. Use to steal Net-NTLM Hashes from windows machines.?

    https://github.com/3gstudent/Worse-PDF

  • SpookFlare?has a different perspective to bypass security measures and it gives you the opportunity to bypass the endpoint countermeasures at the client-side detection and network-side detection.?

    https://github.com/hlldz/SpookFlare

  • GreatSCT?is an open source project to generate application white list bypasses. This tool is intended for BOTH red and blue team.?

    https://github.com/GreatSCT/GreatSCT

  • nps?running powershell without powershell.?

    https://github.com/Ben0xA/nps

  • Meterpreter_Paranoid_Mode.sh?allows users to secure your staged/stageless connection for Meterpreter by having it check the certificate of the handler it is connecting to.?

    https://github.com/r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL

  • The Backdoor Factory (BDF)?is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state.?

    https://github.com/secretsquirrel/the-backdoor-factory

  • MacroShop?a collection of scripts to aid in delivering payloads via Office Macros.?

    https://github.com/khr0x40sh/MacroShop

  • UnmanagedPowerShell?Executes PowerShell from an unmanaged process.?

    https://github.com/leechristensen/UnmanagedPowerShell

  • evil-ssdp?Spoof SSDP replies to phish for NTLM hashes on a network. Creates a fake UPNP device, tricking users into visiting a malicious phishing page.?https://gitlab.com/initstring/evil-ssdp

  • Ebowla?Framework for Making Environmental Keyed Payloads.?

    https://github.com/Genetic-Malware/Ebowla

  • make-pdf-embedded?a tool to create a PDF document with an embedded file.

? ? ??https://github.com/DidierStevens/DidierStevensSuite/blob/master/make-pdf-embedded.py

  • avet?(AntiVirusEvasionTool) is targeting windows machines with executable files using different evasion techniques.?

    https://github.com/govolution/avet

  • EvilClippy?A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.?

    https://github.com/outflanknl/EvilClippy

  • CallObfuscator?Obfuscate windows apis from static analysis tools and debuggers.?

    https://github.com/d35ha/CallObfuscator

  • Donut?is a shellcode generation tool that creates position-independant shellcode payloads from .NET Assemblies. This shellcode may be used to inject the Assembly into arbitrary Windows processes.?

    https://github.com/TheWover/donut

Delivery

Phishing

  • King Phisher?is a tool for testing and promoting user awareness by simulating real world phishing attacks.?

    https://github.com/securestate/king-phisher

  • FiercePhish?is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.?

    https://github.com/Raikia/FiercePhish

  • ReelPhish?is a Real-Time Two-Factor Phishing Tool.?

    https://github.com/fireeye/ReelPhish/

  • Gophish?is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training.?

    https://github.com/gophish/gophish

  • CredSniper?is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.?

    https://github.com/ustayready/CredSniper

  • PwnAuth?a web application framework for launching and managing OAuth abuse campaigns.?

    https://github.com/fireeye/PwnAuth

  • Phishing Frenzy?Ruby on Rails Phishing Framework.?

    https://github.com/pentestgeek/phishing-frenzy

  • Phishing Pretexts?a library of pretexts to use on offensive phishing engagements.?https://github.com/L4bF0x/PhishingPretexts

  • Modlishka?is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level.?

    https://github.com/drk1wi/Modlishka

  • Evilginx2?is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.?

    https://github.com/kgretzky/evilginx2

Watering Hole Attack

  • BeEF?is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.?https://github.com/beefproject/beef

Command and Control

Remote Access Tools

  • Cobalt Strike?is software for Adversary Simulations and Red Team Operations.?

    https://cobaltstrike.com/

  • Empire?is a post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent.?

    https://github.com/EmpireProject/Empire

  • Metasploit Framework?is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.?

    https://github.com/rapid7/metasploit-framework

  • SILENTTRINITY?A post-exploitation agent powered by Python, IronPython, C#/.NET.?

    https://github.com/byt3bl33d3r/SILENTTRINITY

  • Pupy?is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python.?https://github.com/n1nj4sec/pupy

  • Koadic?or COM Command & Control, is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire.?

    https://github.com/zerosum0x0/koadic

  • PoshC2?is a proxy aware C2 framework written completely in PowerShell to aid penetration testers with red teaming, post-exploitation and lateral movement.?

    https://github.com/nettitude/PoshC2_Python

  • Gcat?a stealthy Python based backdoor that uses Gmail as a command and control server.?

    https://github.com/byt3bl33d3r/gcat

  • TrevorC2?is a legitimate website (browsable) that tunnels client/server communications for covert command execution.?

    https://github.com/trustedsec/trevorc2

  • Merlin?is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.?

    https://github.com/Ne0nd0g/merlin

  • Quasar?is a fast and light-weight remote administration tool coded in C#. Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you.?

    https://github.com/quasar/QuasarRAT

  • Covenant?is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.?

    https://github.com/cobbr/Covenant

  • FactionC2?is a C2 framework which use websockets based API that allows for interacting with agents and transports.?

    https://github.com/FactionC2/

  • DNScat2?is a tool is designed to create an encrypted command-and-control (C&C) channel over the DNS protocol.?

    https://github.com/iagox86/dnscat2

  • Sliver?is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS.?

    https://github.com/BishopFox/sliver

  • EvilOSX?An evil RAT (Remote Administration Tool) for macOS / OS X.?

    https://github.com/Marten4n6/EvilOSX

  • EggShell?is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine.?

    https://github.com/neoneggplant/EggShell

Staging

  • Rapid Attack Infrastructure (RAI)?Red Team Infrastructure... Quick... Fast... Simplified One of the most tedious phases of a Red Team Operation is usually the infrastructure setup. This usually entails a teamserver or controller, domains, redirectors, and a Phishing server.?

    https://github.com/obscuritylabs/RAI

  • Red Baron?is a set of modules and custom/third-party providers for Terraform which tries to automate creating resilient, disposable, secure and agile infrastructure for Red Teams.?

    https://github.com/byt3bl33d3r/Red-Baron

  • EvilURL?generate unicode evil domains for IDN Homograph Attack and detect them.?

    https://github.com/UndeadSec/EvilURL

  • Domain Hunter?checks expired domains, bluecoat categorization, and Archive.org history to determine good candidates for phishing and C2 domain names.?

    https://github.com/threatexpress/domainhunter

  • PowerDNS?is a simple proof of concept to demonstrate the execution of PowerShell script using DNS only.?https://github.com/mdsecactivebreach/PowerDNS

  • Chameleon?a tool for evading Proxy categorisation.?https://github.com/mdsecactivebreach/Chameleon

  • CatMyFish?Search for categorized domain that can be used during red teaming engagement. Perfect to setup whitelisted domain for your Cobalt Strike beacon C&C.?https://github.com/Mr-Un1k0d3r/CatMyFish

  • Malleable C2?is a domain specific language to redefine indicators in Beacon's communication.?https://github.com/rsmudge/Malleable-C2-Profiles

  • Malleable-C2-Randomizer?This script randomizes Cobalt Strike Malleable C2 profiles through the use of a metalanguage, hopefully reducing the chances of flagging signature-based detection controls.?https://github.com/bluscreenofjeff/Malleable-C2-Randomizer

  • FindFrontableDomains?search for potential frontable domains.?https://github.com/rvrsh3ll/FindFrontableDomains

  • Postfix-Server-Setup?Setting up a phishing server is a very long and tedious process. It can take hours to setup, and can be compromised in minutes.?https://github.com/n0pe-sled/Postfix-Server-Setup

  • DomainFrontingLists?a list of Domain Frontable Domains by CDN.?https://github.com/vysec/DomainFrontingLists

  • Apache2-Mod-Rewrite-Setup?Quickly Implement Mod-Rewrite in your infastructure.?https://github.com/n0pe-sled/Apache2-Mod-Rewrite-Setup

  • mod_rewrite rule?to evade vendor sandboxes.?https://gist.github.com/curi0usJack/971385e8334e189d93a6cb4671238b10

  • external_c2 framework?a python framework for usage with Cobalt Strike's External C2.?https://github.com/Und3rf10w/external_c2_framework

  • Malleable-C2-Profiles?A collection of profiles used in different projects using Cobalt Strike?https://www.cobaltstrike.com/.?https://github.com/xx0hcd/Malleable-C2-Profiles

  • ExternalC2?a library for integrating communication channels with the Cobalt Strike External C2 server.?https://github.com/ryhanson/ExternalC2

  • cs2modrewrite?a tools for convert Cobalt Strike profiles to modrewrite scripts.?https://github.com/threatexpress/cs2modrewrite

  • e2modrewrite?a tools for convert Empire profiles to Apache modrewrite scripts.?https://github.com/infosecn1nja/e2modrewrite

  • redi?automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt).?https://github.com/taherio/redi

  • cat-sites?Library of sites for categorization.?https://github.com/audrummer15/cat-sites

  • ycsm?is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2).?https://github.com/infosecn1nja/ycsm

  • Domain Fronting Google App Engine.?https://github.com/redteam-cyberark/Google-Domain-fronting

  • DomainFrontDiscover?Scripts and results for finding domain frontable CloudFront domains.?https://github.com/peewpw/DomainFrontDiscover

  • Automated Empire Infrastructure?https://github.com/bneg/RedTeam-Automation

  • Serving Random Payloads?with NGINX.?https://gist.github.com/jivoi/a33ace2e25515a31aa2ffbae246d98c9

  • meek?is a blocking-resistant pluggable transport for Tor. It encodes a data stream as a sequence of HTTPS requests and responses.?https://github.com/arlolra/meek

  • CobaltStrike-ToolKit?Some useful scripts for CobaltStrike.?https://github.com/killswitch-GUI/CobaltStrike-ToolKit

  • mkhtaccess_red?Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been seen before, and redirects them to a benign payload.?https://github.com/violentlydave/mkhtaccess_red

  • RedFile?a flask wsgi application that serves files with intelligence, good for serving conditional RedTeam payloads.?https://github.com/outflanknl/RedFile

  • keyserver?Easily serve HTTP and DNS keys for proper payload protection.?https://github.com/leoloobeek/keyserver

  • DoHC2?allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2) via DNS over HTTPS (DoH). This is built for the popular Adversary Simulation and Red Team Operations Software Cobalt Strike (https://www.cobaltstrike.com).?https://github.com/SpiderLabs/DoHC2

  • HTran?is a connection bouncer, a kind of proxy server. A “l(fā)istener” program is hacked stealthily onto an unsuspecting host anywhere on the Internet.?https://github.com/HiwinCN/HTran

Lateral Movement

  • CrackMapExec?is a swiss army knife for pentesting networks.?https://github.com/byt3bl33d3r/CrackMapExec

  • PowerLessShell?rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe.?https://github.com/Mr-Un1k0d3r/PowerLessShell

  • GoFetch?is a tool to automatically exercise an attack plan generated by the BloodHound application.?https://github.com/GoFetchAD/GoFetch

  • ANGRYPUPPY?a bloodhound attack path automation in CobaltStrike.?https://github.com/vysec/ANGRYPUPPY

  • DeathStar?is a Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments using a variety of techinques.?https://github.com/byt3bl33d3r/DeathStar

  • SharpHound?C# Rewrite of the BloodHound Ingestor.?https://github.com/BloodHoundAD/SharpHound

  • BloodHound.py?is a Python based ingestor for BloodHound, based on Impacket.?https://github.com/fox-it/BloodHound.py

  • Responder?is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.?https://github.com/SpiderLabs/Responder

  • SessionGopher?is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.?https://github.com/fireeye/SessionGopher

  • PowerSploit?is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment.?https://github.com/PowerShellMafia/PowerSploit

  • Nishang?is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.?https://github.com/samratashok/nishang

  • Inveigh?is a Windows PowerShell LLMNR/mDNS/NBNS spoofer/man-in-the-middle tool.?https://github.com/Kevin-Robertson/Inveigh

  • PowerUpSQL?a PowerShell Toolkit for Attacking SQL Server.?https://github.com/NetSPI/PowerUpSQL

  • MailSniper?is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.).?https://github.com/dafthack/MailSniper

  • DomainPasswordSpray?is a tool written in PowerShell to perform a password spray attack against users of a domain.?https://github.com/dafthack/DomainPasswordSpray

  • WMIOps?is a powershell script that uses WMI to perform a variety of actions on hosts, local or remote, within a Windows environment. It's designed primarily for use on penetration tests or red team engagements.?https://github.com/ChrisTruncer/WMIOps

  • Mimikatz?is an open-source utility that enables the viewing of credential information from the Windows lsass.?https://github.com/gentilkiwi/mimikatz

  • LaZagne?project is an open source application used to retrieve lots of passwords stored on a local computer.?https://github.com/AlessandroZ/LaZagne

  • mimipenguin?a tool to dump the login password from the current linux desktop user. Adapted from the idea behind the popular Windows tool mimikatz.?https://github.com/huntergregal/mimipenguin

  • PsExec?is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software.?https://docs.microsoft.com/en-us/sysinternals/downloads/psexec

  • KeeThief?allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system.?https://github.com/HarmJ0y/KeeThief

  • PSAttack?combines some of the best projects in the infosec powershell community into a self contained custom PowerShell console.?https://github.com/jaredhaight/PSAttack

  • Internal Monologue Attack?Retrieving NTLM Hashes without Touching LSASS.?https://github.com/eladshamir/Internal-Monologue

  • Impacket?is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (for instance NMB, SMB1-3 and MS-DCERPC) the protocol implementation itself.?https://github.com/CoreSecurity/impacket

  • icebreaker?gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment.?https://github.com/DanMcInerney/icebreaker

  • Living Off The Land Binaries and Scripts (and now also Libraries)?The goal of these lists are to document every binary, script and library that can be used for other purposes than they are designed to.?https://github.com/api0cradle/LOLBAS

  • WSUSpendu?for compromised WSUS server to extend the compromise to clients.?https://github.com/AlsidOfficial/WSUSpendu

  • Evilgrade?is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.?https://github.com/infobyte/evilgrade

  • NetRipper?is a post exploitation tool targeting Windows systems which uses API hooking in order to intercept network traffic and encryption related functions from a low privileged user, being able to capture both plain-text traffic and encrypted traffic before encryption/after decryption.?https://github.com/NytroRST/NetRipper

  • LethalHTA?Lateral Movement technique using DCOM and HTA.?https://github.com/codewhitesec/LethalHTA

  • Invoke-PowerThIEf?an Internet Explorer Post Exploitation library.?https://github.com/nettitude/Invoke-PowerThIEf

  • RedSnarf?is a pen-testing / red-teaming tool for Windows environments.?https://github.com/nccgroup/redsnarf

  • HoneypotBuster?Microsoft PowerShell module designed for red teams that can be used to find honeypots and honeytokens in the network or at the host.?https://github.com/JavelinNetworks/HoneypotBuster

  • PAExec?lets you launch Windows programs on remote Windows computers without needing to install software on the remote computer first.?https://www.poweradmin.com/paexec/

Establish Foothold

  • Tunna?is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.?https://github.com/SECFORCE/Tunna

  • reGeorg?the successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.?https://github.com/sensepost/reGeorg

  • Blade?is a webshell connection tool based on console, currently under development and aims to be a choice of replacement of Chooper.?https://github.com/wonderqs/Blade

  • TinyShell?Web Shell Framework.?https://github.com/threatexpress/tinyshell

  • PowerLurk?is a PowerShell toolset for building malicious WMI Event Subsriptions.?https://github.com/Sw4mpf0x/PowerLurk

  • DAMP?The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification.?https://github.com/HarmJ0y/DAMP

Escalate Privileges

Domain Escalation

  • PowerView?is a PowerShell tool to gain network situational awareness on Windows domains.?https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1

  • Get-GPPPassword?Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.?https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1

  • Invoke-ACLpwn?is a tool that automates the discovery and pwnage of ACLs in Active Directory that are unsafe configured.?https://github.com/fox-it/Invoke-ACLPwn

  • BloodHound?uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment.?https://github.com/BloodHoundAD/BloodHound

  • PyKEK?(Python Kerberos Exploitation Kit), a python library to manipulate KRB5-related data.?https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS14-068/pykek

  • Grouper?a PowerShell script for helping to find vulnerable settings in AD Group Policy.?https://github.com/l0ss/Grouper

  • ADRecon?is a tool which extracts various artifacts (as highlighted below) out of an AD environment in a specially formatted Microsoft Excel report that includes summary views with metrics to facilitate analysis.?https://github.com/sense-of-security/ADRecon

  • ADACLScanner?one script for ACL's in Active Directory.?https://github.com/canix1/ADACLScanner

  • ACLight?a useful script for advanced discovery of Domain Privileged Accounts that could be targeted - including Shadow Admins.?https://github.com/cyberark/ACLight

  • LAPSToolkit?a tool to audit and attack LAPS environments.?https://github.com/leoloobeek/LAPSToolkit

  • PingCastle?is a free, Windows-based utility to audit the risk level of your AD infrastructure and check for vulnerable practices.?https://www.pingcastle.com/download

  • RiskySPNs?is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name).?https://github.com/cyberark/RiskySPN

  • Mystique?is a PowerShell tool to play with Kerberos S4U extensions, this module can assist blue teams to identify risky Kerberos delegation configurations as well as red teams to impersonate arbitrary users by leveraging KCD with Protocol Transition.?https://github.com/machosec/Mystique

  • Rubeus?is a C# toolset for raw Kerberos interaction and abuses. It is heavily adapted from Benjamin Delpy's Kekeo project.?https://github.com/GhostPack/Rubeus

  • kekeo?is a little toolbox I have started to manipulate Microsoft Kerberos in C (and for fun).?https://github.com/gentilkiwi/kekeo

Local Escalation

  • UACMe?is an open source assessment tool that contains many methods for bypassing Windows User Account Control on multiple versions of the operating system.?https://github.com/hfiref0x/UACME

  • windows-kernel-exploits?a collection windows kernel exploit.?https://github.com/SecWiki/windows-kernel-exploits

  • PowerUp?aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.?https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1

  • The Elevate Kit?demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.?https://github.com/rsmudge/ElevateKit

  • Sherlock?a powerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.?https://github.com/rasta-mouse/Sherlock

  • Tokenvator?a tool to elevate privilege with Windows Tokens.?https://github.com/0xbadjuju/Tokenvator

Data Exfiltration

  • CloakifyFactory?& the Cloakify Toolset - Data Exfiltration & Infiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Defeat Data Whitelisting Controls; Evade AV Detection.?https://github.com/TryCatchHCF/Cloakify

  • DET?(is provided AS IS), is a proof of concept to perform Data Exfiltration using either single or multiple channel(s) at the same time.?https://github.com/sensepost/DET

  • DNSExfiltrator?allows for transfering (exfiltrate) a file over a DNS request covert channel. This is basically a data leak testing tool allowing to exfiltrate data over a covert channel.?https://github.com/Arno0x/DNSExfiltrator

  • PyExfil?a Python Package for Data Exfiltration.?https://github.com/ytisf/PyExfil

  • Egress-Assess?is a tool used to test egress data detection capabilities.?https://github.com/ChrisTruncer/Egress-Assess

  • Powershell RAT?python based backdoor that uses Gmail to exfiltrate data as an e-mail attachment.?https://github.com/Viralmaniar/Powershell-RAT

Misc

Adversary Emulation

  • MITRE CALDERA?- An automated adversary emulation system that performs post-compromise adversarial behavior within Windows Enterprise networks.?https://github.com/mitre/caldera

  • APTSimulator?- A Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised.?https://github.com/NextronSystems/APTSimulator

  • Atomic Red Team?- Small and highly portable detection tests mapped to the Mitre ATT&CK Framework.?https://github.com/redcanaryco/atomic-red-team

  • Network Flight Simulator?- flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility.?https://github.com/alphasoc/flightsim

  • Metta?- A security preparedness tool to do adversarial simulation.?https://github.com/uber-common/metta

  • Red Team Automation (RTA)?- RTA provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK.?https://github.com/endgameinc/RTA

Wireless Networks

  • Wifiphisher?is a security tool that performs Wi-Fi automatic association attacks to force wireless clients to unknowingly connect to an attacker-controlled Access Point.?https://github.com/wifiphisher/wifiphisher

  • mana?toolkit for wifi rogue AP attacks and MitM.?https://github.com/sensepost/mana

Embedded & Peripheral Devices Hacking

  • magspoof?a portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers.?https://github.com/samyk/magspoof

  • WarBerryPi?was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of time with being as stealth as possible.?https://github.com/secgroundzero/warberry

  • P4wnP1?is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W (required for HID backdoor).?https://github.com/mame82/P4wnP1

  • malusb?HID spoofing multi-OS payload for Teensy.?https://github.com/ebursztein/malusb

  • Fenrir?is a tool designed to be used "out-of-the-box" for penetration tests and offensive engagements. Its main feature and purpose is to bypass wired 802.1x protection and to give you an access to the target network.?https://github.com/Orange-Cyberdefense/fenrir-ocd

  • poisontap?exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.?https://github.com/samyk/poisontap

  • WHID?WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.?https://github.com/whid-injector/WHID

  • PhanTap?is an ‘invisible’ network tap aimed at red teams. With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.?https://github.com/nccgroup/phantap

Software For Team Communication

  • RocketChat?is free, unlimited and open source. Replace email & Slack with the ultimate team chat software solution.?https://rocket.chat

  • Etherpad?is an open source, web-based collaborative real-time editor, allowing authors to simultaneously edit a text document?https://etherpad.org/

Log Aggregation

  • RedELK?Red Team's SIEM - easy deployable tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.?https://github.com/outflanknl/RedELK/

  • CobaltSplunk?Splunk Dashboard for CobaltStrike logs.?https://github.com/vysec/CobaltSplunk

  • Red Team Telemetry?A collection of scripts and configurations to enable centralized logging of red team infrastructure.?https://github.com/ztgrace/red_team_telemetry

  • Elastic for Red Teaming?Repository of resources for configuring a Red Team SIEM using Elastic.?https://github.com/SecurityRiskAdvisors/RedTeamSIEM

  • Ghostwriter?is a Django project written in Python 3.7 and is designed to be used by a team of operators.?https://github.com/GhostManager/Ghostwriter

C# Offensive Framework

  • SharpSploit?is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive .NET easier for red teamers.?https://github.com/cobbr/SharpSploit

  • GhostPack?is (currently) a collection various C# implementations of previous PowerShell functionality, and includes six separate toolsets being released today- Seatbelt, SharpUp, SharpRoast, SharpDump, SafetyKatz, and SharpWMI.?https://github.com/GhostPack

  • SharpWeb?.NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.?https://github.com/djhohnstein/SharpWeb

  • reconerator?C# Targeted Attack Reconnissance Tools.?https://github.com/stufus/reconerator

  • SharpView?C# implementation of harmj0y's PowerView.?https://github.com/tevora-threat/SharpView

  • Watson?is a (.NET 2.0 compliant) C# implementation of Sherlock.?https://github.com/rasta-mouse/Watson

Labs

  • Detection Lab?This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations.?https://github.com/clong/DetectionLab

  • Modern Windows Attacks and Defense Lab?This is the lab configuration for the Modern Windows Attacks and Defense class that Sean Metcalf (@pyrotek3) and I teach.?https://github.com/jaredhaight/WindowsAttackAndDefenseLab

  • Invoke-UserSimulator?Simulates common user behaviour on local and remote Windows hosts.?https://github.com/ubeeri/Invoke-UserSimulator

  • Invoke-ADLabDeployer?Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.?https://github.com/outflanknl/Invoke-ADLabDeployer

  • Sheepl?Creating realistic user behaviour for supporting tradecraft development within lab environments.?https://github.com/SpiderLabs/sheepl

Scripts

  • Aggressor Scripts?is a scripting language for red team operations and adversary simulations inspired by scriptable IRC clients and bots.

    • https://github.com/invokethreatguy/CSASC

    • https://github.com/secgroundzero/CS-Aggressor-Scripts

    • https://github.com/Und3rf10w/Aggressor-scripts

    • https://github.com/harleyQu1nn/AggressorScripts

    • https://github.com/rasta-mouse/Aggressor-Script

    • https://github.com/RhinoSecurityLabs/Aggressor-Scripts

    • https://github.com/bluscreenofjeff/AggressorScripts

    • https://github.com/001SPARTaN/aggressor_scripts

    • https://github.com/360-A-Team/CobaltStrike-Toolset

    • https://github.com/FortyNorthSecurity/AggressorAssessor

    • https://github.com/ramen0x3f/AggressorScripts

  • A collection scripts useful for red teaming and pentesting

    • https://github.com/FuzzySecurity/PowerShell-Suite

    • https://github.com/nettitude/Powershell

    • https://github.com/Mr-Un1k0d3r/RedTeamPowershellScripts

    • https://github.com/threatexpress/red-team-scripts

    • https://github.com/SadProcessor/SomeStuff

    • https://github.com/rvrsh3ll/Misc-Powershell-Scripts

    • https://github.com/enigma0x3/Misc-PowerShell-Stuff

    • https://github.com/ChrisTruncer/PenTestScripts

    • https://github.com/bluscreenofjeff/Scripts

    • https://github.com/xorrior/RandomPS-Scripts

    • https://github.com/xorrior/Random-CSharpTools

    • https://github.com/leechristensen/Random

    • https://github.com/mgeeky/Penetration-Testing-Tools/tree/master/social-engineering

來源:https://github.com/infosecn1nja/Red-Teaming-Toolkit

總結(jié)

以上是生活随笔為你收集整理的红队武器库-网络安全人员必备的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網(wǎng)站內(nèi)容還不錯,歡迎將生活随笔推薦給好友。

日韩免费在线观看网站 | 91香蕉嫩草| 国外av在线 | 免费中文字幕在线观看 | 在线观看国产一区二区 | 人交video另类hd| 精品亚洲欧美无人区乱码 | 国产精品一区二区三区久久久 | 久久国产精品99久久人人澡 | 久久婷婷一区二区三区 | 国产分类视频 | 特级毛片在线免费观看 | 亚洲一级久久 | 午夜精品导航 | 久久久国产在线视频 | 贫乳av女优大全 | 成人毛片100免费观看 | 亚洲精品激情 | 天天干天天碰 | 超级碰碰碰碰 | 成人18视频| 天天天射 | 97国产一区二区 | 在线a视频免费观看 | 五月综合激情 | 欧美精品日韩 | 日韩免费小视频 | 国产欧美在线一区二区三区 | 久久视频这里有精品 | 黄色大片免费播放 | 夜夜视频 | 91免费高清| 六月丁香综合网 | 夜添久久精品亚洲国产精品 | 999ZYZ玖玖资源站永久 | 狠狠色丁香久久婷婷综合丁香 | 国产三级精品三级在线观看 | 黄色一级大片在线观看 | 国产免费一区二区三区最新 | 91麻豆精品国产91久久久久久久久 | 色婷婷亚洲 | 久久在现视频 | 亚洲欧美日韩在线一区二区 | 一区二区三区免费在线观看视频 | 久久精品视频观看 | 99国产精品一区 | 日韩毛片在线免费观看 | 婷婷四房综合激情五月 | 日韩丝袜在线 | 在线看av网址| 亚洲女欲精品久久久久久久18 | 中文字幕在线观看第一区 | 最近中文字幕在线 | 国产精品美女久久久久久免费 | 国产91精品一区二区绿帽 | 人人干网站 | 日日干夜夜草 | 精品久久一二三区 | 色福利网站 | 欧美性大战久久久久 | 国产精品一区免费在线观看 | 伊人天天狠天天添日日拍 | 麻花传媒mv免费观看 | 久久五月激情 | 九九激情视频 | 天天爽天天搞 | 在线观看av国产 | 91九色蝌蚪视频在线 | 伊人热| 亚洲欧洲国产视频 | 亚洲精品综合在线 | 九九九九热精品免费视频点播观看 | 日韩 在线| 成人av在线影视 | 国产亚洲一区 | 亚洲精品456在线播放乱码 | 黄色国产区| 国产裸体视频网站 | 麻豆传媒电影在线观看 | 又色又爽又黄高潮的免费视频 | av怡红院 | 一区在线观看视频 | 久久婷婷一区二区三区 | 国产伦精品一区二区三区高清 | 91在线影院| 国产第一二区 | 日韩理论电影在线 | 日韩mv欧美mv国产精品 | 欧美精品你懂的 | 国产美女视频免费 | 麻豆传媒视频观看 | 综合久久久久久 | 久草在线播放视频 | avav99| 亚洲日本va午夜在线电影 | 四虎影视精品永久在线观看 | 久久久久久久久艹 | 激情综合色综合久久综合 | 免费日韩视频 | 超碰人在线 | 成片视频在线观看 | 亚洲电影毛片 | 91三级视频| 一区二区三区在线免费观看视频 | 中文字幕在线免费观看视频 | 国产成人久 | 国产一区二区高清视频 | 黄色影院在线免费观看 | 国产91精品看黄网站在线观看动漫 | 韩国一区在线 | 国产小视频你懂的在线 | 狠狠天天| 亚洲精品国产精品久久99热 | 久久久久久福利 | 亚洲国产精品一区二区久久,亚洲午夜 | 亚洲精品一区二区18漫画 | 久久这里只有精品久久 | 国产麻豆精品传媒av国产下载 | 国产午夜精品免费一区二区三区视频 | 成人黄色中文字幕 | 福利av在线| 久久久久久久久久久网 | 久久精品99精品国产香蕉 | 国产精品黄色影片导航在线观看 | 久久国产精品视频观看 | 成年人视频在线免费观看 | 免费福利在线观看 | 911香蕉视频 | bayu135国产精品视频 | 一区二区视频网站 | 中文字幕在线观看资源 | 国产又粗又猛又爽又黄的视频先 | 中文字幕日本在线 | 色视频在线看 | 国产玖玖在线 | 亚洲精品女 | 四虎影视8848dvd | 视频一区二区三区视频 | 91成人在线观看喷潮 | 在线免费精品视频 | 高潮久久久久久久久 | 久久久久 | 国产一区二区三区久久久 | 国产日本在线播放 | 成人国产网站 | 国产成人一二片 | 玖玖在线精品 | av福利在线免费观看 | 色综合久久久网 | 亚洲日本一区二区在线 | 色视频一区 | 日韩色高清 | 亚洲精品国久久99热 | 又黄又爽又无遮挡免费的网站 | 丁香婷婷久久久综合精品国产 | 精品亚洲网 | 久久久影院一区二区三区 | 欧美天堂久久 | 精品亚洲免a | 中国一级片在线播放 | 久久字幕精品一区 | 国产手机在线观看视频 | 免费观看国产精品视频 | 天天翘av| 国产伦精品一区二区三区无广告 | 激情av网 | 免费看的av片 | 中文字幕av在线免费 | 韩国一区二区三区在线观看 | 在线视频一二三 | 99在线精品观看 | 日韩一区二区免费播放 | 婷婷av网站| av一级网站 | 国产精品11 | 韩国av不卡 | 中文字幕乱在线伦视频中文字幕乱码在线 | 精品国内自产拍在线观看视频 | 丰满少妇高潮在线观看 | 天天综合日日夜夜 | 91视频一8mav| 国产精品自产拍在线观看网站 | 日韩黄视频 | 亚洲精品麻豆 | 国产精品每日更新 | 一区二区三区国产精品 | 国外成人在线视频网站 | 98久9在线 | 免费 | av电影在线免费观看 | 免费在线观看av片 | 波多野结衣视频一区二区 | 人人狠狠综合久久亚洲婷 | 伊人久久av| 久久av电影 | 亚洲最新视频在线播放 | 天天插狠狠干 | 日韩高清毛片 | 最近最新中文字幕视频 | 狠狠色综合网站久久久久久久 | 超级碰碰免费视频 | 人人澡人摸人人添学生av | 亚洲精品乱码白浆高清久久久久久 | 久久婷亚洲五月一区天天躁 | 亚洲激情一区二区三区 | 久久久久高清毛片一级 | 日日噜噜噜噜夜夜爽亚洲精品 | 日韩一二区在线 | 欧美日韩国产精品久久 | 深爱综合网 | 国产色妞影院wwwxxx | 亚洲综合视频在线 | 精品久久久网 | 免费看片黄色 | 国产婷婷视频在线 | 天天弄天天操 | 天天狠狠操 | 中文字幕乱视频 | 亚洲精品国产精品国产 | 色综合婷婷久久 | 69av免费视频 | 欧美91成人网 | 国产中出在线观看 | 国产二区电影 | 日韩视频一区二区三区在线播放免费观看 | 日韩一区在线免费观看 | 丁香激情五月婷婷 | 久久免费视频5 | 日韩视频一区二区在线 | 国产免费成人av | 色综合久久久久综合 | 丁香花在线观看视频在线 | 91视频一8mav | 免费日韩视 | 色综合色综合久久综合频道88 | 日韩午夜电影网 | 精品国产免费av | 欧美久久久一区二区三区 | 粉嫩高清一区二区三区 | 国产精品一码二码三码在线 | 99国产情侣在线播放 | 中文乱码视频在线观看 | 亚洲激情六月 | 深爱五月激情五月 | 免费看一级黄色大全 | 在线av资源 | 亚洲视频网站在线观看 | 中文字幕久久精品 | 在线看片中文字幕 | 成人午夜在线电影 | av在线短片| 狠狠色丁香婷婷综合最新地址 | 一区精品久久 | 日韩高清免费在线 | 中文字幕免费看 | 福利视频 | 国产亚洲午夜高清国产拍精品 | 国产尤物视频在线 | 欧美久久99 | 欧美视频二区 | 亚洲夜夜爽 | 国产精品人人做人人爽人人添 | 精品女同一区二区三区在线观看 | 久久久久亚洲精品国产 | 久久视频二区 | 美女激情影院 | 黄色三级免费观看 | 日韩高清毛片 | 日韩国产精品毛片 | 久久艹欧美 | 伊人久久精品久久亚洲一区 | 国产午夜三级一区二区三桃花影视 | 亚洲精品视频在线观看免费视频 | a黄色片 | 国产精品久久久久久久久久久久久 | 国产精品久久久久久久久久久免费 | 免费美女久久99 | 国产精品青草综合久久久久99 | www.久久婷婷 | 欧美乱熟臀69xxxxxx | 黄色的网站在线 | 欧美日韩国产xxx | www.色就是色 | 久久久www成人免费精品张筱雨 | 亚洲专区中文字幕 | 国产精品久久久影视 | 久草在线视频中文 | 丁香国产视频 | 丁香婷婷久久久综合精品国产 | 91豆花在线 | 国产美女免费看 | 亚洲五月 | 黄色片网站大全 | 欧美黄色免费 | 久久男女视频 | 亚洲美女视频网 | 中文字幕在线观看不卡 | av成人免费在线看 | 中文字幕精品一区二区三区电影 | 日韩女同一区二区三区在线观看 | 日韩另类在线 | 婷婷丁香在线观看 | 波多在线视频 | 亚洲蜜桃av | 国产福利91精品一区 | 九九综合在线 | 国产韩国日本高清视频 | 大型av综合网站 | 亚洲国产电影在线观看 | 黄色一级大片在线免费看国产一 | 探花视频在线观看免费 | 中文字幕 第二区 | 亚洲伦理中文字幕 | 国内精品视频一区二区三区八戒 | 91资源在线观看 | 久久超碰网 | 国产精品欧美日韩在线观看 | 深爱婷婷| 国产一区二区久久久 | 在线观看av片 | www.成人久久 | 人人爽人人爽 | 天天综合天天综合 | 国产精品 亚洲精品 | 在线观看一区 | 久久久久日本精品一区二区三区 | 婷婷亚洲最大 | 欧美精品v国产精品 | 色婷婷视频在线观看 | 亚洲国产剧情av | 免费a一级 | 国产黄色视 | 日韩免费成人av | 久草视频在线资源站 | 成片免费观看视频999 | 精品日韩在线一区 | 91伊人久久大香线蕉蜜芽人口 | 视频成人| 97超在线 | 国产一区二区三区 在线 | 日韩午夜在线播放 | 亚洲中字幕 | 日韩在线视频国产 | 成人在线免费av | 东方av在线免费观看 | 超碰99在线 | 成人黄色电影在线观看 | 日韩性网站| 丁香五月缴情综合网 | 在线观看视频黄色 | 成人动漫一区二区 | 激情综合色图 | 午夜精品电影一区二区在线 | 国产精彩视频一区二区 | 免费网站黄 | 日韩欧美99| 欧美了一区在线观看 | 国产在线日本 | 超碰99人人 | 成年人免费在线看 | 欧美韩国在线 | 高清av不卡 | 婷婷激情综合五月天 | 免费在线观看黄色网 | 亚洲好视频| 日韩免费不卡视频 | 国产一区二区三区四区在线 | 欧美婷婷色 | 日本xxxx.com| 中文字幕av有码 | 伊人首页| 色搞搞| 久久久久久久久黄色 | 日韩欧美视频免费看 | 精品一区精品二区高清 | 日日干美女 | 中文字幕中文字幕 | 五月婷婷婷婷婷 | 久久久久久久99精品免费观看 | 亚洲国内精品视频 | 国产精品毛片久久久久久久 | 欧美a级在线 | 美女视频黄在线观看 | 亚洲精品视频网站在线观看 | 夜夜操天天干, | 中文字幕中文字幕在线中文字幕三区 | 黄污视频网站大全 | 国产精品精品视频 | 久久亚洲婷婷 | 欧美91精品 | 国产精品久久久久久模特 | 亚洲综合激情网 | 国产精品久久久久免费 | 99视频精品 | 天天操天天干天天操天天干 | 久久综合五月天婷婷伊人 | 久草在线中文888 | 欧美日韩中文字幕综合视频 | 六月丁香六月婷婷 | 人人爱人人做人人爽 | www欧美日韩| 亚洲一级二级 | 三级黄色理论片 | 天天狠狠操 | 国产99久久久精品 | 精品国产理论 | 在线看成人 | 欧美激情综合五月色丁香小说 | av蜜桃在线| 日韩一区二区三区高清在线观看 | 亚洲精品乱码久久久久 | 亚洲精品国产精品乱码在线观看 | 一区二区三区在线观看中文字幕 | 久久伊人热 | 久久国产精品二国产精品中国洋人 | 欧美国产精品一区二区 | 日韩在线无 | 美女网站视频一区 | 五月天天色 | 国产精品免费在线播放 | 香蕉视频国产在线观看 | 狠狠狠色丁香婷婷综合激情 | 久草在线免 | 在线视频成人 | 中文字幕精品三级久久久 | 97福利社 | 婷婷中文字幕综合 | 亚洲激情| 日韩欧美在线综合网 | 国产最新网站 | 激情五月在线视频 | 国产大尺度视频 | 久久精品久久精品久久精品 | 超碰97免费在线 | 日韩在线观看一区二区三区 | 国产69精品久久99不卡的观看体验 | 国产精品久久久久久吹潮天美传媒 | 国产亚洲欧美一区 | 99r在线| 99在线热播精品免费99热 | 婷婷激情网站 | 98久9在线 | 免费 | 日韩精品免费一区二区 | 天天操夜夜想 | 狠狠色噜噜狠狠 | 国产黄色精品在线 | 国产精品久久精品国产 | 免费国产一区二区 | 免费成人av电影 | 久久不见久久见免费影院 | 国产精品久久久久av免费 | 国产亚洲免费观看 | 五月天久久 | 亚洲视频第一页 | 最新av免费在线观看 | 91麻豆精品 | 国产精品av久久久久久无 | av怡红院 | av网站大全免费 | 午夜视频在线观看一区二区 | 久久精品美女视频网站 | 一本一本久久a久久精品牛牛影视 | 国产在线色 | 成人网页在线免费观看 | 亚洲 欧洲av | 91久久偷偷做嫩草影院 | 日日碰狠狠躁久久躁综合网 | 久久亚洲综合国产精品99麻豆的功能介绍 | 国产精品久久久久久吹潮天美传媒 | 国产91精品一区二区麻豆网站 | 人人爽人人舔 | 亚洲精品国产日韩 | 日本少妇高清做爰视频 | 精品久久久精品 | 亚洲午夜精品一区二区三区电影院 | 国产视频2021| 亚洲精品欧美成人 | 久久久久久综合网天天 | 香蕉视频网站在线观看 | 免费看的黄网站 | 亚洲美女久久 | 国产日韩精品一区二区三区在线 | 色天天天 | 亚洲精品在线观看免费 | 在线黄频 | 久久激情视频网 | 天天色天天操综合 | 中文av字幕在线观看 | 四虎亚洲精品 | 欧美日韩视频免费看 | 精品国产片 | 西西人体4444www高清视频 | 久久国产网站 | 玖玖玖在线观看 | 国产蜜臀av | 欧美日韩国产在线精品 | 在线观看免费一级片 | 国产一级免费在线观看 | 成人资源网| 亚洲欧洲中文日韩久久av乱码 | 深夜男人影院 | 久久国产影院 | 国产精品第一页在线观看 | 日韩欧美精品免费 | av免费看在线 | 韩国av免费观看 | 欧美大片在线看免费观看 | 97超碰人人网 | 欧美另类性 | 日韩欧美电影在线 | 欧美国产视频在线 | 国产高清免费观看 | 91精品视频在线看 | 麻豆成人精品视频 | 米奇狠狠狠888 | 天天伊人狠狠 | aaa免费毛片 | 国产在线传媒 | 精品在线亚洲视频 | 六月色播| 91视频观看免费 | 国产精品一区二区三区久久久 | 日韩亚洲在线 | 国产精品久久久久久久av电影 | 丁香综合| 超黄视频网站 | 国产高清在线一区 | 国产免费视频一区二区裸体 | 国产精品理论在线观看 | 在线va网站 | 欧美一级电影片 | 亚洲国产精品成人av | 国产成人精品一区二区三区在线 | 99精品国产免费久久久久久下载 | www黄com| 欧美激情xxxx| 六月婷婷色 | 二区三区在线观看 | 网站在线观看你们懂的 | 麻豆免费在线播放 | 欧美视频二区 | 久草在线视频首页 | 六月色婷婷 | 中文字幕在线免费观看视频 | 91九色成人蝌蚪首页 | 欧美日韩免费一区二区三区 | 久久综合久色欧美综合狠狠 | av在线一二三区 | 久久久网站 | 成年人免费在线看 | 日韩成人免费电影 | 久久免费播放视频 | 精品久久久久久电影 | 91天堂素人约啪 | 激情综合久久 | 亚洲精品乱码久久久久 | 在线免费观看麻豆视频 | 在线观看亚洲成人 | av亚洲产国偷v产偷v自拍小说 | 国产小视频网站 | 国产精品毛片一区二区 | 亚洲成a人片在线www | 亚洲国产成人精品在线观看 | 亚洲视频在线免费看 | 精品v亚洲v欧美v高清v | 色综合久久久久综合体桃花网 | 久草综合在线 | 日本一区二区不卡高清 | 一区二区视频欧美 | 日韩欧美视频在线观看免费 | 免费看片色 | 国产免费观看av | 99久久久久久久久久 | 美腿丝袜一区二区三区 | 国产福利一区二区在线 | 天天干中文字幕 | 999视频网| 亚洲在线a | 国产黄色片免费观看 | 在线免费色 | 西西www4444大胆在线 | 色婷婷骚婷婷 | 东方av在 | 日韩三级久久 | 丁香综合激情 | 网址你懂的在线观看 | 久久国产精品二国产精品中国洋人 | 99在线精品免费视频九九视 | 久久免费公开视频 | 91麻豆精品| 国产亚洲精品久久久久动 | 久久黄色免费视频 | 美女网站在线观看 | 狠狠成人| 天天爽夜夜爽人人爽一区二区 | 国产精品99久久久久久宅男 | 色婷丁香 | 天天天干夜夜夜操 | 波多野结衣在线观看一区二区三区 | 狠狠躁夜夜躁人人爽超碰97香蕉 | 视频一区在线播放 | 99r国产精品| 色网站在线观看 | 久久精品国产精品 | 日韩精品中文字幕有码 | 日韩av福利在线 | 69国产盗摄一区二区三区五区 | 亚洲资源在线网 | 免费成人黄色片 | 欧美激情va永久在线播放 | 久久精品视频4 | 最新国产精品久久精品 | 91亚洲国产 | 日韩中文免费视频 | 免费福利视频网 | 99久久99热这里只有精品 | 国产精品久久久久久久久久妇女 | 成人午夜黄色 | 精品视频一区在线 | 91桃色免费观看 | 综合网久久 | 日韩精品久久久久 | 久久久黄色 | 日韩高清无线码2023 | 热久久国产 | 国产精品女视频 | 黄网站免费久久 | 一区二区精品在线 | 在线免费观看黄色大片 | 九九久久影院 | 亚洲精品88欧美一区二区 | 亚洲精品资源在线观看 | av免费片| 成人在线视频一区 | 中文字幕黄网 | 最近日本韩国中文字幕 | 国产精品中文字幕在线 | 美女视频黄网站 | 三级视频片 | 中文字幕一区二区三区精华液 | 国产精品美女毛片真酒店 | 日韩首页 | 免费69视频 | 激情欧美一区二区三区免费看 | 久久这里只有精品视频首页 | 一级黄色免费网站 | 日韩欧美在线观看一区二区三区 | 免费一级特黄毛大片 | 亚洲成av | 精品黄色片| 亚洲人精品午夜 | 激情久久五月天 | 日韩精品久久久久 | 啪啪动态视频 | 中文字幕制服丝袜av久久 | 高清av在线免费观看 | 久久精品久久精品久久精品 | 99高清视频有精品视频 | 亚洲一二区视频 | 插插插色综合 | 九九热精| 美女网站在线看 | 日韩高清免费无专码区 | sesese图片| 波多野结衣在线播放视频 | 深爱激情综合 | 亚洲女同videos | 黄色软件视频大全免费下载 | 国产午夜三级一区二区三桃花影视 | 欧美日韩在线精品 | 婷婷丁香导航 | 99久久日韩精品视频免费在线观看 | 亚洲精品玖玖玖av在线看 | 怡红院av久久久久久久 | 欧美爽爽爽| 久久高清视频免费 | 色综合久久88色综合天天 | 9999在线 | 欧美日韩国产一区二区三区 | 日日干天天操 | av手机在线播放 | 99在线视频免费观看 | 麻豆成人小视频 | 这里只有精品视频在线观看 | 夜夜夜夜爽| 在线影视 一区 二区 三区 | 久久福利在线 | 韩国av三级 | 免费三级网| 五月婷在线视频 | 色99之美女主播在线视频 | 香蕉视频在线观看免费 | 97超碰超碰 | 国产成人精品女人久久久 | 激情久久伊人 | 在线一级片 | 国产精品观看在线亚洲人成网 | 亚洲精品在线免费 | 日本精品在线视频 | 一区二区三区四区免费视频 | 久久久免费高清视频 | 五月婷婷电影网 | 中文在线中文a | 免费激情在线电影 | av一本久道久久波多野结衣 | 五月天激情开心 | 欧美性猛片,| 亚洲精品女人久久久 | 18做爰免费视频网站 | 黄色av播放 | 久久久午夜精品理论片中文字幕 | 免费a视频在线 | 在线视频手机国产 | 亚洲九九九在线观看 | 狠狠狠狠狠狠狠狠 | 中文字幕在线观看三区 | 欧美永久视频 | 超碰97公开 | 国产情侣一区 | 国产高清一级 | 日韩在线视频播放 | 色网站在线免费观看 | 日本精品久久久久 | 国产高清在线视频 | 国产99久久久精品 | 日韩免费大片 | 天天射天天干 | 五月激情视频 | 亚洲精品中文字幕在线观看 | 亚洲国产日韩精品 | 久久99精品一区二区三区三区 | 日韩理论在线观看 | 日韩久久网站 | 96av麻豆蜜桃一区二区 | 在线成人中文字幕 | 久久久久久久久久久久久国产精品 | 99精品一区二区三区 | www.久久精品视频 | 激情久久五月 | 久久久久久高潮国产精品视 | 欧美日韩精品国产 | 99久久精品国产亚洲 | 中国成人一区 | 久久久国产在线视频 | 亚州性色| 天堂av在线网站 | 国产视频18| 国产精品中文字幕在线观看 | 玖玖精品在线 | 国产精品99久久久久久武松影视 | 精品免费久久久久久 | 日韩深夜在线观看 | 国产亚洲欧美在线视频 | 福利一区二区 | 69精品在线观看 | 成年人国产视频 | 精品主播网红福利资源观看 | 中文字幕九九 | 中日韩三级视频 | 欧美91精品久久久久国产性生爱 | 欧美一区二区日韩一区二区 | 国产精品丝袜久久久久久久不卡 | 日韩在线一二三区 | 91久久精品一区 | 一区二区影院 | aaa亚洲精品一二三区 | 97视频免费观看 | 九七视频在线 | 中文字幕无吗 | 国产精品女主播一区二区三区 | 婷婷丁香视频 | 日韩黄在线观看 | 精品视频123区在线观看 | 久久综合久色欧美综合狠狠 | 久久日韩精品 | 97超级碰碰碰视频在线观看 | 日本三级不卡视频 | 一区二区三区高清 | 国产美女视频免费 | 国产成人高清在线 | 日韩电影中文,亚洲精品乱码 | 色婷婷88av视频一二三区 | 久久国产精品成人免费浪潮 | 在线视频一区观看 | 夜夜夜夜爽 | 在线成人欧美 | 丁香花在线观看免费完整版视频 | 亚洲国产精品va在线看黑人 | 亚洲精品美女久久17c | 一性一交视频 | 亚洲草视频 | 天天天操天天天干 | 一区二区精品视频 | 国产欧美最新羞羞视频在线观看 | av电影中文字幕在线观看 | 精品久久久久久久久久久久久久久久久久 | 精品国产一区二区三区av性色 | 久草视频在线资源站 | 久草免费电影 | 五月天网站在线 | 九九久久久| 日韩欧美aaa | 玖玖综合网 | 正在播放国产一区二区 | 欧美日韩大片在线观看 | 国产中文字幕亚洲 | 激情小说网站亚洲综合网 | 久久久久久黄色 | 九九久久国产精品 | 中文字幕av在线电影 | 日韩理论片中文字幕 | 九九免费在线视频 | 日韩在线观看a | 久久久久免费观看 | 久久久亚洲国产精品麻豆综合天堂 | 日韩电影久久 | 91精品视频在线 | 日韩在线电影一区二区 | 97免费中文视频在线观看 | 亚洲精品高清视频 | 久久人人添人人爽添人人88v | 天天操网址| 亚洲久草在线视频 | 亚洲精品免费在线播放 | 亚洲国产丝袜在线观看 | 久久中文网 | 欧美电影在线观看 | 日韩三级久久 | 国产福利专区 | 99精品国产aⅴ | 欧美一区中文字幕 | 国产区 在线 | 久久久久久久久亚洲精品 | 日本久久影视 | 91麻豆国产福利在线观看 | 亚洲免费激情 | 中文字幕国内精品 | 久草网站在线观看 | 日本黄色免费看 | 成人在线播放av | 丰满少妇在线观看 | 免费色av | 中文不卡视频 | 亚洲精品小视频 | 国产欧美最新羞羞视频在线观看 | 日韩精品中文字幕一区二区 | 成人免费网站在线观看 | 人人爽人人爽人人爽人人爽 | 日韩成人精品 | 中文在线中文a | av片中文| 69性欧美 | 视频成人永久免费视频 | 国产另类xxxxhd高清 | 黄色小网站免费看 | 日韩久久影院 | 久久精品这里热有精品 | 国产精品私人影院 | 国产福利av在线 | 亚洲国产精品影院 | 日日干天天爽 | 99热这里只有精品久久 | 天天色综合三 | 国产精品亚洲视频 | www..com毛片| 免费观看视频的网站 | www.夜夜草| 久久国产美女视频 | 亚洲专区路线二 | 日韩超碰 | 亚洲天天看 | 国产精品九色 | 在线黄av| 麻豆国产精品一区二区三区 | 超碰人在线 | 狠狠狠色丁香婷婷综合激情 | 国产夫妻性生活自拍 | 国产一区二区中文字幕 | 玖玖视频网 | 成人a级黄色片 | av网址aaa | 最新午夜 | 日批在线观看 | 美女黄网站视频免费 | 中文字幕高清视频 | 久久久五月婷婷 | 2018好看的中文在线观看 | 国产精品日韩在线播放 | 亚洲国产精品成人女人久久 | 伊人久久国产精品 | 久久久精品一区二区 | 欧美福利片在线观看 | 久久久999精品视频 国产美女免费观看 | 国产精品一区二区无线 | 亚洲美女视频网 | 狠狠色丁香婷婷综合久小说久 | 奇米网网址 | 欧美激情精品一区 | 99热在| 欧美日韩国产一区二区三区在线观看 | 夜夜夜夜操 | 91爱爱视频 | 国产999精品久久久久久绿帽 | 成人va天堂 | 久久电影日韩 | 欧美一级性生活片 | 91精品一区二区三区蜜臀 | a视频在线观看免费 | 久久99在线视频 | 亚洲日本激情 | 日韩欧美精品在线观看 | 91cn国产在线 | 99成人免费视频 | 成人av片在线观看 | 国产精品一区电影 | 亚洲综合国产精品 | 二区三区在线 | 一级黄色片在线播放 | 91在线视频免费91 | 久久精品中文视频 | 五月婷婷激情五月 | 日韩免费视频观看 | 亚洲第一av在线播放 | 黄色国产精品 | 亚洲人成精品久久久久 | 在线电影91| 91免费试看| 四虎视频 | 国内精品久久久久久久久久久久 | 久久99亚洲热视 | 精品久久1 | 在线小视频你懂得 | 亚洲精品久久久久中文字幕m男 | 中文字幕黄色 | v片在线播放 | 激情影音先锋 | 欧美激情另类文学 | 午夜色性片 | 美女久久 | 一本色道久久综合亚洲二区三区 | 欧美精品中文字幕亚洲专区 | 国产精品久久久久久久午夜片 | 免费合欢视频成人app | 国产五月色婷婷六月丁香视频 | 超级碰视频 | 极品国产91在线网站 | 亚洲精品美女久久久久 | 日韩va在线观看 | 97超在线 | 国产精品自产拍在线观看中文 | 网站你懂的 | 日韩一区视频在线 | 婷婷在线精品视频 | 日韩美精品视频 | 日日夜夜狠狠 | 91av视频免费在线观看 | 日韩高清成人在线 | 日韩av一区在线观看 | 精品久久久国产 | 天天操天天操天天操天天操天天操天天操 | 日韩中文久久 | 一区免费在线 | aⅴ精品av导航 | 亚洲午夜不卡 | 综合久久五月天 | 碰超在线 | 激情综合啪啪 | 天天做天天爱天天爽综合网 | 国产中文字幕大全 | 福利视频入口 | 人人爱夜夜操 | 女女av在线 | 日日干干夜夜 | 黄网在线免费观看 | 国产午夜麻豆影院在线观看 | 久久www免费人成看片高清 | 久久精品4 | 国产一区二区精品 | 国产91成人 | 伊人中文网 | 视频二区在线视频 | 国产欧美精品xxxx另类 | 在线观看黄网站 | 亚洲精品国产综合久久 | 又黄又爽又色无遮挡免费 | 久久久国产一区二区 | av亚洲产国偷v产偷v自拍小说 | 精品久久综合 | 激情丁香综合五月 | 久久综合久久久 | 中文av影院 | 国产精品免费观看久久 | 99热精品久久 | 亚洲成aⅴ人片久久青草影院 | 狠狠精品 | 久久久噜噜噜久久久 | 国内精品久久久久久久影视简单 | 国产精品久久久999 国产91九色视频 | 深爱婷婷激情 |