- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
#!/bin/bash | |
#author : Raul Calvo Laorden ([email protected]) | |
#description : Script to get WPA-EAP Identities, EAP certs, HTTP passwords, Handshakes, DNS queries, NBTNS queries and LLMNR queries | |
#date : 2021-06-24 | |
#usage : bash pcapFilter.sh -f <pcap/folder> [options] | |
#----------------------------------------------------------------------------------------------------------- | |
red=`tput setaf 1` | |
green=`tput setaf 2` |
function Invoke-AESEncryptDirectory | |
{ | |
param( | |
[string]$directory, | |
[string]$extension | |
) | |
$csharp = @" | |
//https://stackoverflow.com/questions/27645527/aes-encryption-on-large-files | |
using System; |
#!/bin/sh | |
# Simple tshark WiFi EAP certificate extractor | |
# By [email protected] | |
# All rights reserved 2018 | |
if [ ! -x $(which tshark) ]; then | |
echo "tshark not installed" | |
exit 0 | |
fi |
## AWS | |
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
http://169.254.169.254/latest/user-data | |
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/ami-id | |
http://169.254.169.254/latest/meta-data/reservation-id | |
http://169.254.169.254/latest/meta-data/hostname | |
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
#include <algorithm> | |
#include <cassert> | |
#include <chrono> | |
#include <cmath> | |
#include <complex> | |
#include <cstdint> | |
#include <cstdlib> | |
#include <iostream> | |
#include <numeric> | |
#include <string> |
/* | |
******************************************************************************************************************************** | |
Credits: @Jeremy | |
Posted: http://stackoverflow.com/questions/7048839/sql-server-query-to-find-all-permissions-access-for-all-users-in-a-database | |
******************************************************************************************************************************** | |
Security Audit Report | |
1) List all access provisioned to a sql user or windows user/group directly | |
2) List all access provisioned to a sql user or windows user/group through a database or application role | |
3) List all access provisioned to the public role |
{ | |
{I have|I've} been {surfing|browsing} online more than {three|3|2|4} hours today, yet I never found any interesting article like yours. {It's|It | |
is} pretty worth enough for me. {In my opinion|Personally|In my view}, if all {webmasters|site owners|website owners|web owners} and bloggers made good content as | |
you did, the {internet|net|web} will be {much more|a lot more} | |
useful than ever before.| | |
I {couldn't|could not} {resist|refrain from} commenting. {Very well|Perfectly|Well|Exceptionally well} written!| | |
{I will|I'll} {right away|immediately} {take hold of|grab|clutch|grasp|seize|snatch} | |
your {rss|rss feed} as I {can not|can't} {in finding|find|to find} your {email|e-mail} subscription {link|hyperlink} or {newsletter|e-newsletter} service. Do {you have|you've} any? | |
{Please|Kindly} {allow|permit|let} me {realize|recognize|understand|recognise|know} {so that|in order that} I {may just|may|could} subscribe. | |
Thanks.| |
#!/usr/bin/env python | |
from scapy.all import * | |
ap_list = [] | |
def PacketHandler(pkt) : | |
if pkt.haslayer(Dot11) : | |
if pkt.type == 0 and pkt.subtype == 8 : |
#!/usr/bin/env python | |
"""Simple HTTP Server With Upload. | |
This module builds on BaseHTTPServer by implementing the standard GET | |
and HEAD requests in a fairly straightforward manner. | |
""" |