- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
| #!/bin/bash | |
| #author : Raul Calvo Laorden ([email protected]) | |
| #description : Script to get WPA-EAP Identities, EAP certs, HTTP passwords, Handshakes, DNS queries, NBTNS queries and LLMNR queries | |
| #date : 2021-06-24 | |
| #usage : bash pcapFilter.sh -f <pcap/folder> [options] | |
| #----------------------------------------------------------------------------------------------------------- | |
| red=`tput setaf 1` | |
| green=`tput setaf 2` |
| function Invoke-AESEncryptDirectory | |
| { | |
| param( | |
| [string]$directory, | |
| [string]$extension | |
| ) | |
| $csharp = @" | |
| //https://stackoverflow.com/questions/27645527/aes-encryption-on-large-files | |
| using System; |
| #!/bin/sh | |
| # Simple tshark WiFi EAP certificate extractor | |
| # By [email protected] | |
| # All rights reserved 2018 | |
| if [ ! -x $(which tshark) ]; then | |
| echo "tshark not installed" | |
| exit 0 | |
| fi |
| ## AWS | |
| # from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
| http://169.254.169.254/latest/user-data | |
| http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/ami-id | |
| http://169.254.169.254/latest/meta-data/reservation-id | |
| http://169.254.169.254/latest/meta-data/hostname | |
| http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
| #include <algorithm> | |
| #include <cassert> | |
| #include <chrono> | |
| #include <cmath> | |
| #include <complex> | |
| #include <cstdint> | |
| #include <cstdlib> | |
| #include <iostream> | |
| #include <numeric> | |
| #include <string> |
| /* | |
| ******************************************************************************************************************************** | |
| Credits: @Jeremy | |
| Posted: http://stackoverflow.com/questions/7048839/sql-server-query-to-find-all-permissions-access-for-all-users-in-a-database | |
| ******************************************************************************************************************************** | |
| Security Audit Report | |
| 1) List all access provisioned to a sql user or windows user/group directly | |
| 2) List all access provisioned to a sql user or windows user/group through a database or application role | |
| 3) List all access provisioned to the public role |
| { | |
| {I have|I've} been {surfing|browsing} online more than {three|3|2|4} hours today, yet I never found any interesting article like yours. {It's|It | |
| is} pretty worth enough for me. {In my opinion|Personally|In my view}, if all {webmasters|site owners|website owners|web owners} and bloggers made good content as | |
| you did, the {internet|net|web} will be {much more|a lot more} | |
| useful than ever before.| | |
| I {couldn't|could not} {resist|refrain from} commenting. {Very well|Perfectly|Well|Exceptionally well} written!| | |
| {I will|I'll} {right away|immediately} {take hold of|grab|clutch|grasp|seize|snatch} | |
| your {rss|rss feed} as I {can not|can't} {in finding|find|to find} your {email|e-mail} subscription {link|hyperlink} or {newsletter|e-newsletter} service. Do {you have|you've} any? | |
| {Please|Kindly} {allow|permit|let} me {realize|recognize|understand|recognise|know} {so that|in order that} I {may just|may|could} subscribe. | |
| Thanks.| |
| #!/usr/bin/env python | |
| from scapy.all import * | |
| ap_list = [] | |
| def PacketHandler(pkt) : | |
| if pkt.haslayer(Dot11) : | |
| if pkt.type == 0 and pkt.subtype == 8 : |
| #!/usr/bin/env python | |
| """Simple HTTP Server With Upload. | |
| This module builds on BaseHTTPServer by implementing the standard GET | |
| and HEAD requests in a fairly straightforward manner. | |
| """ |