Skip to content

Instantly share code, notes, and snippets.

View Diaa-Hassan's full-sized avatar
🧙

Diaa Hassan Diaa-Hassan

🧙
View GitHub Profile
@nullenc0de
nullenc0de / breach.sh
Created January 27, 2021 15:06
Script will look up company assets and search them on greynoise.
cat cust.txt |assetfinder -subs-only | filter-resolved -c 100 | while read resolved; do host -t A "$resolved" | awk '{print $NF}' | grep -E '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'; done |sort -u |while read ip; do greynoise quick $ip ; done |grep -v "NOT" |cut -d ' ' -f1 |greynoise ip |sed -e '/malicious/,/rDNS/!d'
@MathiasBaumgartinger
MathiasBaumgartinger / open.py
Last active September 8, 2022 05:28
WSL python script for easy opening of files and directories
#!/usr/bin/env python3
"""
Add this script to a global directory (e.g. /usr/local/bin) in your WSL
without the ``.py`` extension.
This script will automatically open any file/directory with it's default
Windows Application. Directories will be opened with Windows' file
explorer.
Usage: open <(dir/file)>
❌❌ :RECON CHECKLIST:❌❌
1. Subdomain Enumeration: subfinder-amass-altdns-sublister-assetfinder-findomain
2.Resolving Subdomains: HTTPX/HTTPROBE
3. Screenshotting: HTTPX/AQUATONE/EYEWITNESS/GOWITNESS
4. Port Scan: Nmap/Zenmap/Aquatone/Amass
5. Directory Bruteforce: FFUF/Dirsearch/Dirbuster
6. Crawling: waybackurls/gau
7. Finding endpoints from JS: relative-url-extracter
8. Manual Recon: Burp Suite
#!/bin/bash
RED=$(tput setaf 1)
GREEN=$(tput setaf 2)
BLUE=$(tput setaf 4)
RESET=$(tput sgr0)
AMASS_VERSION=3.8.2
@0x240x23elu
0x240x23elu / SAPwordlists.txt
Created November 22, 2020 05:47
SAP Wordlist - SAP fuzz
/admin/admin.js
/admin/appinfo.jsp
/admin/cache_stats.jsp
/admin/catalogcache.jsp
/admin/ccms/customizing.jsp
/admin/ccms/result.jsp
/admin/ccms/sendFailure.jsp
/ecall/jsp/customer/login/login.jsp
/ecall/jsp/customer/upload/upload.jsp
/user/admin/index.jsp
@TvMpt
TvMpt / googledork1
Last active January 16, 2025 10:10
"example.com" site:bitpaste.app | site:codebeautify.org | site:codepad.org | site:codepen.io | site:codeshare.io | site:dartpad.dartlang.org | site:dotnetfiddle.net | site:dpaste.com | site:dpaste.org | site:dumpz.org | site:gitlab.com | site:hastebin.com | site:heypasteit.com | site:ide.codingblocks.com | site:ide.geeksforgeeks.org | site:ideone.com | site:jsbin.com | site:jsfiddle.net | site:jsitor.com | site:justpaste.it | site:paste.debian.net | site:paste.fedoraproject.org | site:paste.frubar.net | site:paste.lisp.org | site:paste.opensuse.org | site:paste.org | site:paste.org.ru | site:paste.pound-python.org | site:paste.ubuntu.com | site:paste.xinu.at | site:paste2.org | site:pastebin.com | site:pastebin.fr | site:pastehtml.com | site:phpfiddle.org | site:play.golang.org | site:repl.it | site:rextester.com | site:slexy.org | site:snipplr.com | site:snipt.net | site:stackoverflow.com | site:textsnip.com | site:trello.com | site:trello.com | site:try.ceylon-lang.org
site:optus.com.au "Internal Use On
uploads/affwp-debug.log
certs/server.key
server.key
.CSV
.PDF
.README.md.bud
.action
.actionScriptProperties
.angular-cli.json
.apport-ignore.xml
This file has been truncated, but you can view the full file.
!CREDITS.TXT
!INSTALL.TXT
!LICENSE.TXT
!ReadMe.txt
# directory-list-1.0.txt
# directory-list-2.3-big.txt
# directory-list-2.3-medium.txt
# directory-list-2.3-small.txt
# directory-list-lowercase-2.3-big.txt
# directory-list-lowercase-2.3-medium.txt
{
"targets": [],
"libraries": [
{
"folders": [
{
"id": "c43bd29e-8ebb-4a72-8cd4-be26d4b96087",
"title": "Reconnaissance",
"checklist": [
{
scan target for pentest
nmap -PN -n -A -sS -p- -oN output.nmap <IP>
-Pn : no ping check (host is up),
-n no dns resolution
-A : detect systeme info
-sT : tcp connect [laisse des traces dans les logs serveurs] (moins impactant que -sS Syn, ne laisse pas de trace dans les logs par defaut)
-p- : port de 0-65535
-oN output.nmap : write utput to file
ajouter un scan udp en parallèle -sU (dns, ipsec ...)