Skip to content

Repository with different tools to speed up repetitive tasks in hacking audits

License

Notifications You must be signed in to change notification settings

n0t4u/randomHacks

Repository files navigation

randomHacks

Repository with small scripts for specific hacking tasks.

Note. Major projects have been moved to its own repository.

alternateBruteForce

Simple Python script that allows to generate a dictionary to avoid bruteforce username blocks when a web server checks the number of consecutive tries.

Usage

python3 -u <USER_TO_BRUTEFORCE> -r <NUMBER OF REPETITIONS> -t <LENGTH OF DICTIONARY> [-o <OUTPUT>]

bannerGrabber

Bash script to automatically perform banner grabbing and highlight which assets and ports responds to any command injected.

It does not perform any further checks, they must be done manually later.

Usage

#Optional in case you have used fromNmapsVtoCSV.py
cat nmapParser.txt| cut -f 1,2 > nmapParser_ip-port.txt
#file.txt must be in IP PORT format
./bannerGrabber.sh file_ip-port.txt

DNSResolver

Automatic DNS resolution tool for several domains and different ouputs.

Usage

python3 DNSResolver.py --file <FILE>
python3 DNSResolver.py --file <FILE> --ip

fromNmapsVtoCSV

Python 3 script that takes a gnmap file and output a table/CSV in the format given by the user. Works with several IPs scans.

Usage

# Option 1
python3 fromNapsVtoCSV.py nmap_sV_127.0.0.1.gnmap
# Option 2
python3 fromNapsVtoCSV.py nmap_sV_127.0.0.1.gnmap --print
# Change Order
python3 fromNapsVtoCSV.py nmap_sV_127.0.0.1.gnmap --order=ip,port,service,version
# Multiple files
for file in $(ls nmap_sV_*.gnmap); do python3 fromNmapsVtoCSV.py $file --print; done > nmapParser.txt

Order output options. ip,port,protocol,state,service,version

LinuxAlias

Small bash script that automatically add some alias to you bash or zsh shell.

TO DO

  • Add checks before adding any alias.

nmapScans

Bash script that executes a full ports scan, parse the results and performs a second scan with version option only to the open ports.

Usage

chmod +x nmapScans.sh
# Option 1
./nmapScans.sh 127.0.0.1
# Option 2
./nmapScans.sh ips.txt
# Scan options
./nmapScans.sh 127.0.0.1 "-sS -T4 -Pn"
# Resume a previous session scan (must be execute in the same directory)
./nmapScans.sh ips.txt --resume

TO DO

  • Add optional discovery scan option
  • Add optional UDP scan option
  • Check nmap installation

WindowsAlias

  1. Create an alias.bat file (C:\Users\n0t4u\Documents\alias.bat)
  2. Access to Register Editor (Windows+r -> regedit).
  3. Go to folder: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Command Processor
  4. If this folder does not exist execute the following command.
reg add "HKCU\Software\Microsoft\Command Processor"
REM Alternative for step 5. Not tested
reg add "HKCU\Software\Microsoft\Command Processor" /v AutoRun /d "<PATH_TO_FILE>"
  1. In the Command Processor folder, add a new "String Value" with name AutoRun and Data the path to alias.bat file.
  2. Open Windows Terminal and execute the commands

Note. It is important to add $* in commands that need arguments.

Note. Add cls at the end of the script to clear the terminal after the alias execution.

Deprecated

  • fromFuriousToNmapsV

About

Repository with different tools to speed up repetitive tasks in hacking audits

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published