Repository with small scripts for specific hacking tasks.
- alternateBruteForce
- bannerGrabber
- CVSSCalculator
- dnsResolver
- DRAFMe
- EasyAndroidStaticAnalysis
- fromNmapsVtoCSV
- LinuxAlias
- manageProject
- nmapScans
- WindowsAlias
Note. Major projects have been moved to its own repository.
Simple Python script that allows to generate a dictionary to avoid bruteforce username blocks when a web server checks the number of consecutive tries.
python3 -u <USER_TO_BRUTEFORCE> -r <NUMBER OF REPETITIONS> -t <LENGTH OF DICTIONARY> [-o <OUTPUT>]
Bash script to automatically perform banner grabbing and highlight which assets and ports responds to any command injected.
It does not perform any further checks, they must be done manually later.
#Optional in case you have used fromNmapsVtoCSV.py
cat nmapParser.txt| cut -f 1,2 > nmapParser_ip-port.txt
#file.txt must be in IP PORT format
./bannerGrabber.sh file_ip-port.txt
Automatic DNS resolution tool for several domains and different ouputs.
python3 DNSResolver.py --file <FILE>
python3 DNSResolver.py --file <FILE> --ip
Python 3 script that takes a gnmap file and output a table/CSV in the format given by the user. Works with several IPs scans.
# Option 1
python3 fromNapsVtoCSV.py nmap_sV_127.0.0.1.gnmap
# Option 2
python3 fromNapsVtoCSV.py nmap_sV_127.0.0.1.gnmap --print
# Change Order
python3 fromNapsVtoCSV.py nmap_sV_127.0.0.1.gnmap --order=ip,port,service,version
# Multiple files
for file in $(ls nmap_sV_*.gnmap); do python3 fromNmapsVtoCSV.py $file --print; done > nmapParser.txt
Order output options. ip,port,protocol,state,service,version
Small bash script that automatically add some alias to you bash or zsh shell.
- Add checks before adding any alias.
Bash script that executes a full ports scan, parse the results and performs a second scan with version option only to the open ports.
chmod +x nmapScans.sh
# Option 1
./nmapScans.sh 127.0.0.1
# Option 2
./nmapScans.sh ips.txt
# Scan options
./nmapScans.sh 127.0.0.1 "-sS -T4 -Pn"
# Resume a previous session scan (must be execute in the same directory)
./nmapScans.sh ips.txt --resume
- Add optional discovery scan option
- Add optional UDP scan option
- Check nmap installation
- Create an alias.bat file (C:\Users\n0t4u\Documents\alias.bat)
- Access to Register Editor (Windows+r -> regedit).
- Go to folder: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Command Processor
- If this folder does not exist execute the following command.
reg add "HKCU\Software\Microsoft\Command Processor"
REM Alternative for step 5. Not tested
reg add "HKCU\Software\Microsoft\Command Processor" /v AutoRun /d "<PATH_TO_FILE>"
- In the Command Processor folder, add a new "String Value" with name AutoRun and Data the path to alias.bat file.
- Open Windows Terminal and execute the commands
Note. It is important to add $* in commands that need arguments.
Note. Add cls at the end of the script to clear the terminal after the alias execution.
- fromFuriousToNmapsV