offseckit/osk
GitHub: offseckit/osk
一款面向终端的免费进攻性安全工具集,提供反向Shell生成、编码解码、哈希处理、漏洞载荷生成、安全头分析、CVSS计算等十余种渗透测试常用功能。
Stars: 0 | Forks: 0
# >_ osk
**面向终端的免费进攻性安全工具集——包含反向Shell、编码、哈希、JWT分析、nmap命令构建、XSS载荷、SQLi载荷、头部安全分析、CVSS评分、子网计算、终端输出格式化、字典生成、chmod权限计算等工具。**
作为 [OffSecKit](https://offseckit.com) 的一部分——所有工具也可作为 [浏览器工具](https://offseckit.com/tools) 使用。
## 安装
```
pip install offseckit
```
或克隆并本地安装:
```
git clone https://github.com/offseckit/osk.git
cd osk
pip install .
```
## 快速开始
```
# Generate a reverse shell
osk revshell -i 10.10.10.10 -l python
# Encode text to Base64
osk encode -o base64-encode "Hello World"
# Identify a hash
osk hash id 5d41402abc4b2a76b9719d911017c592
# Decode a JWT token
osk jwt decode eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
# Build an nmap command
osk nmap build -t 10.10.10.0/24 --syn --top-ports 1000
# Generate XSS payloads
osk xss gen --context html-attr --action alert
# Generate SQLi payloads
osk sqli gen -d mysql -t union -c 3
# Analyze security headers
curl -sI https://example.com | osk headers analyze
# Calculate a CVSS score
osk cvss calc CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
# Calculate subnet details
osk subnet calc 192.168.1.0/24
# Generate a wordlist with mutations
osk wordlist gen password admin --leet --numbers
# Convert and explain a chmod mode
osk chmod 4755 --explain
# Format terminal output with a styled frame
nmap -sV 10.10.10.10 | osk format render
```
## 工具
| 命令 | 描述 |
|---------|-------------|
| `osk revshell` | 生成12种以上语言的反向Shell单行命令 |
| `osk encode` | 编码/解码文本(Base64、URL、Hex、HTML、Unicode、Binary、ROT13等) |
| `osk hash` | 识别哈希类型并生成哈希(MD5、SHA1、SHA256、NTLM等) |
| `osk jwt` | 解码并分析JWT令牌的安全问题 |
| `osk nmap` | 构建nmap命令,支持扫描类型、脚本、Timing和规避选项 |
| `osk xss` | 生成上下文感知的XSS载荷,支持WAF绕过和编码 |
| `osk sqli` | 为MySQL、MSSQL、PostgreSQL、Oracle、SQLite生成SQL注入载荷 |
| `osk headers` | 分析HTTP响应头部的安全配置错误 |
| `osk cvss` | 计算CVSS 3.1和4.0漏洞评分 |
| `osk subnet` | 计算子网详情、分割网络、检查IP归属 |
| `osk format` | 使用样式化窗口框架格式化和美化终端输出 |
| `osk wordlist` | 生成自定义字典,支持leet speak、大小写变换和密码模式 |
| `osk chmod` | 转换并解释Linux文件权限,列出常见预设,查找setuid二进制文件 |
## 反向Shell
```
# Bash reverse shell
osk revshell -i 10.10.10.10 -p 4444
# Python reverse shell with Base64 encoding
osk revshell -i 10.10.10.10 -l python -e base64
# PowerShell reverse shell
osk revshell -i 10.10.10.10 -l powershell
# Show all netcat variants
osk revshell -i 10.10.10.10 -l netcat --all
# List all supported languages
osk revshell list
```
### 选项
| 标志 | 描述 | 默认值 |
|------|-------------|---------|
| `-i, --ip` | 攻击者IP地址 | (必填) |
| `-p, --port` | 攻击者端口 | `4444` |
| `-l, --lang` | 语言 | `bash` |
| `-v, --variant` | 具体变体 | 第一个可用 |
| `-e, --encoding` | `raw`、`base64`、`url`、`double-url` | `raw` |
| `--all` | 显示所有变体 | — |
| `--no-listener` | 隐藏监听命令 | — |
## 编码与解码
```
# Base64 encode
osk encode -o base64-encode "Hello World"
# URL decode
osk encode -o url-decode "%48%65%6C%6C%6F"
# Chain: Base64 then URL encode
osk encode -o base64-encode -o url-encode "test payload"
# Double URL encode for WAF bypass
osk encode -o url-encode -o url-encode ""
# Show intermediate steps
osk encode -o base64-encode -o url-encode -o hex-encode "test" --steps
# Pipe from stdin
echo "secret" | osk encode -o hex-encode
# List all operations
osk encode list
```
## 哈希识别与生成
```
# Identify a hash
osk hash id 5d41402abc4b2a76b9719d911017c592
# Generate MD5 + SHA-256 + NTLM
osk hash generate -a md5 -a sha256 -a ntlm "password"
# Generate all default hashes
osk hash generate "hello"
# List supported algorithms
osk hash list
```
## JWT 解码器与分析器
```
# Decode a JWT token
osk jwt decode eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIn0.dozjgNryP4J3jVmNHl0w5N_XgL0n3I9PlFUP0THsR8U
# Analyze for security issues
osk jwt analyze eyJhbGciOiJIUzI1NiIs...
# List supported algorithms
osk jwt algorithms
```
## Nmap 命令构建器
```
# Quick recon scan
osk nmap preset quick-recon -t 10.10.10.0/24
# Full port SYN scan with service detection
osk nmap build -t 10.10.10.10 --syn --all-ports --service-version
# Stealth scan with evasion
osk nmap build -t 10.10.10.10 --syn --timing T2 --fragment
# List presets
osk nmap presets
# List scan types
osk nmap scans
```
## XSS 载荷生成器
```
# Generate payloads for HTML attribute context
osk xss gen --context html-attr --action alert
# Generate with WAF bypass encoding
osk xss gen --context js-string --waf cloudflare
# Generate with blocked characters
osk xss gen --context html-tag --block "<" --block ">"
# Show polyglot payloads
osk xss polyglots
# List all contexts
osk xss contexts
```
## SQL 注入载荷生成器
```
# Generate UNION-based payloads for MySQL
osk sqli gen -d mysql -t union -c 3
# Generate error-based payloads for MSSQL
osk sqli gen -d mssql -t error-based
# Generate time-blind payloads for PostgreSQL
osk sqli gen -d postgresql -t time-blind
# Generate with WAF bypass (case swap)
osk sqli gen -d mysql -t union --waf case-swap
# Show authentication bypass payloads
osk sqli auth
# List supported databases
osk sqli dbs
```
## HTTP 头部安全分析器
```
# Fetch headers directly from a URL
osk headers analyze -u https://example.com
# Pipe headers from curl
curl -sI https://example.com | osk headers analyze
# Read from a file
osk headers analyze -f response-headers.txt
# Output as JSON for CI/CD
osk headers analyze -u https://example.com --json
# List all security headers checked
osk headers list
```
## CVSS 计算器
```
# Calculate CVSS 3.1 score from a vector
osk cvss calc CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
# Calculate CVSS 4.0 score
osk cvss calc CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
# Output as JSON for CI/CD
osk cvss calc CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H --json
# Show common vulnerability presets
osk cvss presets
# Compare two vectors
osk cvss compare CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
```
## 子网计算器
```
# Calculate subnet details from CIDR
osk subnet calc 192.168.1.0/24
# Calculate with JSON output for scripting
osk subnet calc 10.10.10.0/26 --json
# Split a network into equal subnets
osk subnet split 10.0.0.0/16 --into 4
# Check if an IP is within a CIDR range
osk subnet contains 192.168.1.0/24 192.168.1.100
# List all usable hosts in a subnet
osk subnet list 192.168.1.0/28
```
## CLI 输出格式化工具
```
# Render terminal output with a styled window frame
nmap -sV 10.10.10.10 | osk format render
# Render from a file with a custom title
osk format render -f output.txt --title "Nmap Scan Results"
# Add line numbers
cat output.log | osk format render -n --title "Server Logs"
# Strip all ANSI escape codes
cat colored-output.log | osk format strip
# Get output statistics
cat output.log | osk format stats --json
```
## 字典生成器
```
# Generate wordlist from base words with case variations
osk wordlist gen password admin
# Enable leet speak mutations
osk wordlist gen password --leet
# Append numbers (0-9) and symbols
osk wordlist gen company --numbers --symbols
# Full mutation suite and save to file
osk wordlist gen company admin john -o wordlist.txt --case --leet --numbers --symbols --suffixes
# Read base words from a file
osk wordlist gen -f base_words.txt --leet --numbers
# Append years instead of single digits
osk wordlist gen company --numbers --number-range years --year-start 2020 --year-end 2026
# Show leet speak mappings
osk wordlist leet
```
## Chmod / 权限计算器
```
# Convert octal to symbolic and back
osk chmod 755
osk chmod rwxr-xr-x
# Explain a setuid binary's mode bit-by-bit
osk chmod 4755 --explain
# Apply POSIX symbolic notation against a base mode
osk chmod 644 --apply u+x
osk chmod 755 --apply go-w
# Detect risky permissions only
osk chmod 777 --warnings
# Output JSON for scripting
osk chmod 4755 --json
# List common permission presets (755, 644, 600, 1777, 4755, ...)
osk chmod presets
# Print find(1) recipes for privesc hunting
osk chmod hunt
```
## 依赖
- Python 3.8+
## 相关工具
- [OffSecKit](https://offseckit.com) — 免费基于浏览器的安全工具集
- [Reverse Shell Generator](https://offseckit.com/tools/revshell) — 浏览器版本
- [Encoding Multi-Tool](https://offseckit.com/tools/encode) — 浏览器版本
- [Hash Identifier](https://offseckit.com/tools/hash) — 浏览器版本
- [JWT Decoder](https://offseckit.com/tools/jwt) — 浏览器版本
- [Nmap Builder](https://offseckit.com/tools/nmap) — 浏览器版本
- [XSS Generator](https://offseckit.com/tools/xss) — 浏览器版本
- [Header Security Analyzer](https://offseckit.com/tools/headers) — 浏览器版本
- [CVSS Calculator](https://offseckit.com/tools/cvss) — 浏览器版本
- [Subnet Calculator](https://offseckit.com/tools/subnet) — 浏览器版本
- [SQLi Payload Generator](https://offseckit.com/tools/sqli) — 浏览器版本
- [CLI Output Formatter](https://offseckit.com/tools/cli-format) — 浏览器版本
- [Wordlist Generator](https://offseckit.com/tools/wordlist) — 浏览器版本
- [Chmod Calculator](https://offseckit.com/tools/chmod) — 浏览器版本
## 许可证
MIT
标签:CISA项目, CVSS, DNS 反向解析, JWT, Python, wordlist, XSS, XXE攻击, 代码生成, 反取证, 反向shell, 哈希, 嗅探欺骗, 子网计算, 安全头分析, 安全评估, 密码攻击, 密码管理, 数据展示, 文档结构分析, 无后门, 无线安全, 本体建模, 权限维持, 渗透测试工具, 漏洞情报, 红队, 编码解码, 网络安全, 隐私保护