Repository with small scripts for specific hacking tasks.
- alternateBruteForce
- bannerGrabber
- CVSSCalculator
- dnsResolver
- DRAFMe
- EasyAndroidStaticAnalysis
- fromNmapsVtoCSV
- LinuxAlias
- manageProject
- multiCommand
- nmapScans
- randomCommands
- testsslExtractor
- WindowsAlias
Note. Major projects have been moved to its own repository.
Simple Python script that allows to generate a dictionary to avoid bruteforce username blocks when a web server checks the number of consecutive tries.
python3 -u <USER_TO_BRUTEFORCE> -r <NUMBER OF REPETITIONS> -t <LENGTH OF DICTIONARY> [-o <OUTPUT>]Bash script to automatically perform banner grabbing and highlight which assets and ports responds to any command injected.
It does not perform any further checks, they must be done manually later.
#Optional in case you have used fromNmapsVtoCSV.py
cat nmapParser.txt| cut -f 1,2 > nmapParser_ip-port.txt
#file.txt must be in IP PORT format
./bannerGrabber.sh file_ip-port.txtAutomatic DNS resolution tool for several domains and different ouputs.
python3 DNSResolver.py --file <FILE>
python3 DNSResolver.py --file <FILE> --ipPython 3 script that takes a gnmap file and output a table/CSV in the format given by the user. Works with several IPs scans.
# Option 1
python3 fromNapsVtoCSV.py nmap_sV_127.0.0.1.gnmap
# Option 2
python3 fromNapsVtoCSV.py nmap_sV_127.0.0.1.gnmap --print
# Change Order
python3 fromNapsVtoCSV.py nmap_sV_127.0.0.1.gnmap --order=ip,port,service,version
# Multiple files
for file in $(ls nmap_sV_*.gnmap); do python3 fromNmapsVtoCSV.py $file --print; done > nmapParser.txtOrder output options. ip,port,protocol,state,service,version
Small bash script that automatically add some alias to you bash or zsh shell.
- Add checks before adding any alias.
Python script to execute the same command passed as argument to several IPs at once. It output each IP/port into a separate file for further manual analysis. Supported commands (for now): openssl, ssh_audit, sslscan, terrapin, testssl.
# Execute testssl to all the IP:port located in ips.txt. 7 threads.
python3 multiCommand.py testssl -f ips.txt -t 7 --sep ":"Bash script that executes a full ports scan, parse the results and performs a second scan with version option only to the open ports.
chmod +x nmapScans.sh
# Option 1
./nmapScans.sh 127.0.0.1
# Option 2
./nmapScans.sh ips.txt
# Scan options
./nmapScans.sh 127.0.0.1 "-sS -T4 -Pn"
# Resume a previous session scan (must be execute in the same directory)
./nmapScans.sh ips.txt --resume- Add optional discovery scan option
- Check nmap installation
Group of bash commands used in audits that might be necessary in the future.
Small bash script that takes all testssl files from a file and output the results grouped by protocol, cipher and vulnerability to have a clean overview of the network.
# Parse current directory
./testsslExtractor.sh
# Parse /home/not4u/Audit/ directory
./testsslExtractor.sh /home/not4u/Audit/ directory
# Get only SWEET32 vulnerability
./testsslExtractor.sh --filter SWEET32 - Create an alias.bat file (C:\Users\n0t4u\Documents\alias.bat)
- Access to Register Editor (Windows+r -> regedit).
- Go to folder: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Command Processor
- If this folder does not exist execute the following command.
reg add "HKCU\Software\Microsoft\Command Processor"
REM Alternative for step 5. Not tested
reg add "HKCU\Software\Microsoft\Command Processor" /v AutoRun /d "<PATH_TO_FILE>"- In the Command Processor folder, add a new "String Value" with name AutoRun and Data the path to alias.bat file.
- Open Windows Terminal and execute the commands
Note. It is important to add $* in commands that need arguments.
Note. Add cls at the end of the script to clear the terminal after the alias execution.
- fromFuriousToNmapsV