Skip to content

nao1215/morrigan

Repository files navigation

LinuxUnitTest Build reviewdog Go Report Card

morrigan - Penetration Tool Set

morrigan command is a tool-set to verify the vulnerability of services developed by you. Like busybox in the embedded platform, morrigan provides multiple functions in a single binary to complete the task. morrigan is not a tool to attack services on the network. We will be adding subcommands regarding penetration as part of the developer's (it's me) study of security.

morrigan sub-command list

Each subcommand is explained on other pages. We plan to add more subcommands. We will be reimplementing existing commands used in penetration in golang. However, we will also implement morrigan's own subcommands.

sub-command description forked from or inspired by
license Print the license of the package (or subcommand) used in the morrigan -
log-collect Collect the logs that exist in the system -
netcat listen TCP/UDP ports and send data to remote ports over TCP/UDP forked from go-netcat
ping send ICMP ECHO_REQUEST to network hosts forked from u-root project
pwcrack crack local user password inspired by John the ripper
pwlist generate password list files that be used in morrigan -
pwscore [WIP] check password strength inspired by libpwquality
unshadow combine password fields in /etc/passwd and /etc/shadow inspired by John the ripper
whris Displays management information for IPs associated with the domain forked from whris
zip-pwcrack crack zip password inspired by ICHINOSE Shogo

The subcommands we plan to add to morrigan are as follows:

  • shbin: Obfuscate shell scripts.
  • nmap: Network exploration tool and security / port scanner
  • tcpdump: dump traffic on a network
  • crunch: Generate a dictionary file containing words using the given characters (e.g. 0123456789abcdef)
  • scp: secure copy
  • ftp: File Transfer Protocol
  • cve: Search CVE

Legal Warning

With great power comes great responsibility.

morrign command is under development. There are no features that compromise security in any way. However,I will be adding subcommands for penetration in stages.

Please use the morrigan command only on PCs and servers that you control. Do not use morrigan command in military or secret service organizations, or for illegal purposes. You may be held legally liable for your actions.

How to install

Use "go install"

If you does not have the golang development environment installed on your system, please install golang from the golang official website.

go install github.com/nao1215/morrigan@latest

Use homebrew

brew install nao1215/tap/morrigan

Install from Package or Binary

The release page contains packages in .deb, .rpm, and .apk formats.

Contributing

First off, thanks for taking the time to contribute! ❤️ See CONTRIBUTING.md for more information. Contributions are not only related to development. For example, GitHub Star motivates me to develop!!
Star History Chart

Contact

If you would like to send comments such as "find a bug" or "request for additional features" to the developer, please use one of the following contacts.

LICENSE

The morrigan project is licensed under the terms of MIT LICENSE.