Use this tool to make penetration tests or any hacking CTF's more efficient. This tool should be used on applications that you have permission to attack only. Any misuse or damage caused will be solely the users’ responsibility.
Please check the known bugs and issues at the bottom before installation.
A Wiki page for troubleshooting is coming very soon...
Karkinos is a light-weight 'Swiss Army Knife' for penetration testing and/or hacking CTF's. Currently, Karkinos offers the following:
- Encoding/Decoding characters
- Encrypting/Decrypting text or files
- Reverse shell handling
- Cracking and generating hashes
- Any server capable of hosting PHP; tested with Apache Server
- Tested with PHP 7.4.9
- Python3
Make sure it is in your path as:
Windows:python
Linux:python3
If it is not, please change the commands inincludes/pid.php
- pip3
- Raspberry Pi Zero friendly :) (crack hashes at your own risk)
This installation guide assumes you have all the dependencies.
git clone https://github.com/helich0pper/Karkinos.git
cd Karkinos
pip3 install -r requirements.txt
cd wordlists && tar -xf passlist.zip
You can also unzip it manually using file explorer if tar is not installed. Just make sure passlist.txt is in wordlists directory.- Add
extension=php_sqlite3.dll
to your php.ini file.
If you don't know where to find this, refer to the PHP docs. - Thats it! Now just host it using your preferred web server or run:
php -S 127.0.0.1:8888
in the Karkinos directory.
Important: using port 5555 will conflict with the reverse shell handler server
If you insist on using port 5555, change the reverse shell handler serverPORT
value in/bin/Server/app.py Line 88
Important: using port 5556 will conflict with the directory and file busting server
If you insist on using port 5556, change the directory and file busting serverPORT
value in/bin/Busting/app.py Line 111
git clone https://github.com/helich0pper/Karkinos.git
cd Karkinos
pip3 install -r requirements.txt
cd wordlists && tar -xf passlist.zip
You can also unzip it manually using file explorer if tar is not installed. Just make sure passlist.txt is in wordlists directory.- Add
extension=php_sqlite3.dll
to your php.ini file.
If you don't know where to find this, refer to the PHP docs. - Thats it! Now just host it using your preferred web server or run:
php -S 127.0.0.1:8888
in the Karkinos directory.
Important: using port 5555 will conflict with the reverse shell handler server
If you insist on using port 5555, change the reverse shell handler serverPORT
value in/bin/Server/app.py Line 88
Important: using port 5556 will conflict with the directory and file busting server
If you insist on using port 5556, change the directory and file busting serverPORT
value in/bin/Busting/app.py Line 111
Open screenshots in full screen for a better view
Landing page and quick access menu.
User stats are displayed here. Currently, the stats recorded are only the total hashes and hash types cracked successfully.
This page allows you to encode/decode in common formats (more may be added soon)
Encrypting and decrypting text or files is made easy and is fully trusted since it is done locally.
Reverse shells can be captured and interacted with on this page.
Karkinos can generate commonly used hashes such as:
Karkinos offers the option to simultaneously crack hashes using a built-in wordlist consisting of over 15 million common and breached passwords. This list can easily be modified and/or completely replaced.
Pull requests and bug reports are always appreciated.
Below are features to be added/fixed:
- Creating a Wiki page to help customize Karkinos or troubleshoot common issues