Odin is an all in one pentesting suite intended to automate the pentesting stages. Created with the Mitre Attack framework in mind. This entails from Reconnaissance to impact. To start of, I built the recon stage(working on adding shodan and IOT Capabilities) and a C2 that will help manage compromised networks/forests. Odin is also made with Detection in mind in that it will provide detection capabilities. This is to GIVE guys getting into cyber security an all in one suite to introduce them to the tasks performed all round. In the long run it comes in handy as a purple teaming toolkit and suitable for small organizations/SME's with a zero budget on cyber security. Hope you get to enjoy it or tweak it as per your needs and it helps you out. All sessions,connectors are stored into the db, runtime data is called through api calls to your currently running c2(default at 55677,55678) At the very least, Odin is meant for an organization to run it by themselves single handedly.
go to installation https://github.com/alphamystic/odin/setup
k
Odin by itself is a stand alone enumeration tooolkit that takes in a target does basic recon and store the data into a mysql/maria db for you. On start up, run the cli with ./odin while at thie root direcctory Type help or:
- cli ask for target
- cli ask for multiple targets file
Enumerate target: Handlers If .com find ip and multiple Ips, Scan Ip,multiple IPs for services running Enumerate the services
- Scan with shodan api key's
- Return the potential vulnerabilities or An AD domain
- Can also take in a vulnerability and compromise a target
skip this if ypu're interested only in running it out, check out setup
- Kowalski We should have a manage engine that injests logs per second and determines what step the agent should take.
Automated Recon Add your own vulnerability scanners and load them as per your need or use the default minimal version CVE Checker (Still working on how to implement a CVE Database that will act as a reference point) IT Asset Management Keep track of APT's,threats and various viruses
Generation of bot c2 and implant Session Management for both c2 and implant (locally and db persistence) Multiple C2 administration Shellcode generation Run shellcode Generate a library (.dll or .so) as both minion and admin fro persistence Process injection Taking screenshots of multiple screens Encrypted commmunication over grpc's protobuf Add your Own dropper or C2 in form of a plugin Tunnelling over http,https/tcp or DNS Generate your own DNS server binary and run it anywhere then have your implant communicate to it. Generate a DNS implant or run a DNS Client by the default implant Personallly I would use a minimal implant that runs a shellcode of the DNS client Staged and Stageless payload
- .brain Stores all "brains" rather sessions connections and configurations
- lib A library of all functions helping to run odin
- payloads List of payloads to be used for brute-forcing or enumerations.
So I want to automate my hacking/pen-testing process. I have for some reason convinced myself that I can do it.
I'm using penguins of madagascar to sought of co-ordinate the attack
- Skiper: Get's a shell and pivots or escalate privs and so on.
- Kowalski: Create exploits from vulnerabilities
- Rico: Brute-force for vulnerabilities
- Private: Scans for vulnerabilities
Private and Rico generate Vulnerabilities and feed them into Kowalski to create exploits. They are created in plugin form exporting a function Scan(reconData) taking recon data to return vulnerabilities
- Add a command line for all plugins
- Loot and persistence
- Pivoting
- AD Pentesting
- Syscall unhooking and EDR Detection and evasion techniques