Home

Awesome

<!-- ![alt text](https://github.com/CoolHandSquid/TireFire/blob/TireFire_V3/Images/TireFireLogo1.png) --> <p align="center"><a href="https://github.com/coolhandsquid/TireFire#tirefire"><img src="https://github.com/CoolHandSquid/TireFire/blob/TireFire_V3/Images/circle-cropped.png" height="60"/></a></p> <h1 align="center">TireFire</h1> <p align="center">TireFire is cool. <a href="https://github.com/CoolHandSquid/HackTricks-Automatic-Commands">HackTricks-Automatic-Commands</a> is better. Check it out!</p> <p align="center">Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortable GUI-ish platform. Great for OSCP/HTB type Machines as well as penetration testing. </p> <p align="center">"The Metasploit of External Enumeration"</p> <p align="center"> <a><img src="https://img.shields.io/badge/price-FREE-0098f7.svg" height="20"/></a> <a><img src="https://img.shields.io/github/license/mashape/apistatus.svg" height="20"/></a> <a><img src="https://img.shields.io/badge/OS-Kali-yellow.svg" height="20"/></a> <a><img src="https://img.shields.io/badge/python-3.7%2B-blue.svg" height="20"/></a> <a><img src="https://img.shields.io/badge/version-4.0.1-lightgrey.svg" height="20"/></a> <a href="https://twitter.com/intent/tweet?text=Tool%20to%20automate%20the%20scanning%20and%20enumeration%20of%20machines%20remotely.%20Comfortable%20GUI-ish%20platform%21&url=https://github.com/CoolHandSquid/TireFire&via=CoolHandSquid&hashtags=infosec,oscp,HackTheBox,kalilinux,pentesting"><img src="https://img.shields.io/twitter/url/http/shields.io.svg?style=social" alt="tweet" height="20"></a> </p> <p align="center"><img src="https://github.com/CoolHandSquid/TireFire/blob/TireFire_V3/Images/3_TireFire-Horizontal-2.png" height="500"/></p> <!-- # TireFire ![Price](https://img.shields.io/badge/price-FREE-0098f7.svg) ![license](https://img.shields.io/github/license/mashape/apistatus.svg) ![os](https://img.shields.io/badge/OS-Kali-yellow.svg) ![pythonver](https://img.shields.io/badge/python-3.7%2B-blue.svg) ![tirefirever](https://img.shields.io/badge/version-3.2.0-lightgrey.svg) [![Tweet](https://img.shields.io/twitter/url/http/shields.io.svg?style=social)](https://twitter.com/intent/tweet?text=If%20you%20want%20to%20automate%20scanning%20and%20enumeration%20machines%20externally%20while%20still%20maintaining%20full%20control%20over%20the%20commands%20sent%20to%20the%20target%2C%20TireFire%20is%20your%20tool%20of%20choice%21%20Great%20for%20OSCP%2FHTB%20type%20Machines%21&url=https://github.com/CoolHandSquid/TireFire&via=CoolHandSquid&hashtags=infosec,oscp,hacking) -->

Contents

About

Demo

Tire Fire

Kickoff

sudo TireFire 10.10.10.5
<!-- ## HowTo * TireFire will not function well if not run as root. * Once Build.sh has been run, TireFire will have been added to your path. * From the "Main Table," type the corresponding number of a protocol for which you would like to run a scan. * From the "Protocol Table," click the corresponding number of a scan you would like to run. The scan will be kicked off in another tab. * Hit enter to return to the "Main Table." * You can change the variables by going to the "Variables Table." * If there is a scan or series of scans for a protocol, you would like to add, edit Main.csv following the guidelines in this README (it's pretty straight forward). * Tables and commands can be added while TireFire is running, and it will be populated once Main.csv is saved. -->

Methodology

  1. Kickoff TireFire (TireFire 10.10.10.5).
  2. When prompted, type "Y" to kickoff a Quick, Banner, All-Port, and UDP nmap scan.
  3. Depending upon the ports returned, run scans for those ports.
  4. Choose lower numbered scans for the corresponding port and then higher ones as you need to get more specific.
  5. Change variables as you need to suit your target (Example: HTTP running on port 8500).

ProTips

Build

git clone https://github.com/CoolHandSquid/TireFire.git
cd TireFire
sudo ./Build.sh

Adding Modules

Special Characters and Syntax

&&&&

# and ##

?

?What is the location of the wp-login.php? Example: /Yeet/cannon/wp-login.php
?What is a known password you would like to brute force?
wpscan --url {Web_Proto}://{IP}{1} --enumerate u,tt,t,vp --password {2} -e 

{}

Supporters

Stargazers repo roster for @coolhandsquid/TireFire Forkers repo roster for coolhandsquid/TireFire

Contact

Please contact me at CoolHandSquid32@gmail.com for contribution, suggestions, and ideas!

<p align="center"> <img src="https://github.com/CoolHandSquid/TireFire/blob/TireFire_V3/Images/TireFireLogo1.png" width="200" /> </p> <p align="center"> <img src="https://github.com/CoolHandSquid/TireFire/blob/TireFire_V3/Images/CoolHandSquid.jpg" width="200" /> </p> <p align="center"><a href="https://github.com/coolhandsquid/TireFire#tirefire"><img src="https://github.com/CoolHandSquid/TireFire/blob/TireFire_V3/Images/backToTopButton.png" alt="Back to top" height="29"/></a></p>