The Wayback Machine - https://web.archive.org/web/20201112032802/https://github.com/cr0hn/enteletaor
Skip to content
master
Go to file
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
doc
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

README.rst

Enteletaor

https://raw.githubusercontent.com/cr0hn/enteletaor/master/doc/images/enteletaor-logo-300px.png

Enteletaor: Message Queue & Broker Injection tool

Version:1.0
Code:https://github.com/cr0hn/enteletaor
Issues:https://github.com/cr0hn/enteletaor/issues/
Documentation:http://enteletaor.readthedocs.org
Python version:Python 2.7.x & 3
Author:Daniel Garcia (cr0hn) - @ggdaniel

Support this project

Support this project (to solve issues, new features...) by applying the Github "Sponsor" button.

What's Enteletaor

Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ.

Some of the actions you can do:

  • Listing remote tasks.
  • Read remote task content.
  • Disconnect remote clients from Redis server (even the admin!)
  • Inject tasks into remote processes.
  • Make a scan to discover open brokers.
  • Try to discover user/passwords in auth protected brokers

Currently supported brokers are:

  • RabbitMQ (or AMQP compatible).
  • ZeroMQ.
  • Redis.

See documentation for more information.

What's new?

This Enteletaor version, add a lot of new features and fixes, like:

Note

You can read entire list in CHANGELOG file.

Version 1.1.x

  • Many improvements and fixes
  • Added new module: password bruteforcer.

Version 1.0.0

  • First version released
You can’t perform that action at this time.