This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
000000 | |
000001 | |
000002 | |
000003 | |
000004 | |
000005 | |
000006 | |
000007 | |
000008 | |
000009 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#Performs port scan using nmap | |
print_usage() { | |
cat << _EOF_ | |
Utility to scan open ports. Can be used to scan ports for a domain or a list of domains specified in a file. | |
Example Usage: | |
-h, --help Show brief help | |
-d, --domain Domain name or ip to scan | |
-f, --file Spefify a file containing domains/IPs to scan |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
def queueRequests(target, wordlists): | |
engine = RequestEngine(endpoint=target.endpoint, | |
concurrentConnections=5, | |
requestsPerConnection=1, # if you increase this from 1, you may get false positives | |
resumeSSL=False, | |
timeout=10, | |
pipeline=False, | |
maxRetriesPerRequest=0, | |
engine=Engine.THREADED, | |
) |
OlderNewer