Karkinos is a light-weight 'Swiss Army Knife' for penetration testing and/or hacking CTF's. Currently, Karkinos offers the following:
This tool should be used on applications/networks that you have permission to attack only. Any misuse or damage caused will be solely the users’ responsibility.
More: https://github.com/helich0pper/Karkinos
python
python3
includes/pid.php
This installation guide assumes you have all the dependencies. A Wiki page with troubleshooting steps can be found here.
git clone https://github.com/helich0pper/Karkinos.git
cd Karkinos
pip3 install -r requirements.txt
cd wordlists && unzip passlist.zip
You can also unzip it manually using file explorer. Just make sure passlist.txt is in wordlists directory.Make sure you have write privileges for db/main.db
extension=mysqli
in your php.ini file.php -S 127.0.0.1:8888
in the Karkinos directory.Important: using port 5555, 5556, or 5557 will conflict with the ModulesPORT
value in:/bin/Server/app.py Line 87
/bin/Busting/app.py Line 155
/bin/PortScan/app.py Line 128
git clone https://github.com/helich0pper/Karkinos.git
cd Karkinos
pip3 install -r requirements.txt
cd wordlists && unzip passlist.zip
Make sure you have write privileges for db/main.db
extension=mysqli.dll
in your php.ini file.php -S 127.0.0.1:8888
in the Karkinos directory.Important: using port 5555, 5556, or 5557 will conflict with the ModulesPORT
value in:/bin/Server/app.py Line 87
/bin/Busting/app.py Line 155
/bin/PortScan/app.py Line 128
Landing page and quick access menu.
User stats are displayed here. Currently, the stats recorded are only the total hashes and hash types cracked successfully.
This page allows you to encode/decode in common formats (more may be added soon)
Encrypting and decrypting text or files is made easy and is fully trusted since it is done locally.
Reverse shells can be captured and interacted with on this page.
Karkinos can generate commonly used hashes such as:
Karkinos offers the option to simultaneously crack hashes using a built-in wordlist consisting of over 15 million common and breached passwords. This list can easily be modified and/or completely replaced.
Pull requests and bug reports are always appreciated.
Below are features to be added/fixed: