Skip to content

Instantly share code, notes, and snippets.

View bandrel's full-sized avatar

Justin Bollinger bandrel

View GitHub Profile
@bandrel
bandrel / gist:ba8251f1956f332b9356c218122845ba
Created February 23, 2026 14:43
ICMP Timestamp Request Check
#!/usr/bin/env python3
"""
ICMP Timestamp Request/Reply Checker
Sends ICMP Timestamp Request (Type 13) packets to target hosts and checks
for Timestamp Reply (Type 14) responses. Useful for reconnaissance and
verifying host ICMP timestamp behavior.
Uses raw sockets — requires root/sudo privileges.
Zero external dependencies.
#!/bin/bash
#
blob=$(cat <<EOF
aHR0cHM6Ly9kb3dubG9hZC53ZWFrcGFzcy5jb20vd29yZGxpc3RzLzEvNTAwLXdvcnN0LXBhc3N3b3Jkcy50eHQuZ3oudG9ycmVudApodHRwczovL2Rvd25sb2FkLndlYWtwYXNzLmNvbS93b3JkbGlzdHMvMTAvZmFjZWJvb2stbmFtZXMtdW5pcXVlLnR4dC5nei50b3JyZW50Cmh0dHBzOi8vZG93bmxvYWQud2Vha3Bhc3MuY29tL3dvcmRsaXN0cy8xMDAwL05vcndlZ2lhbi51ZGljLmd6LnRvcnJlbnQKaHR0cHM6Ly9kb3dubG9hZC53ZWFrcGFzcy5jb20vd29yZGxpc3RzLzEwMDEvU29tYWxpLnVkaWMuZ3oudG9ycmVudApodHRwczovL2Rvd25sb2FkLndlYWtwYXNzLmNvbS93b3JkbGlzdHMvMTAwMi9Sb21hbmlhbi51ZGljLmd6LnRvcnJlbnQKaHR0cHM6Ly9kb3dubG9hZC53ZWFrcGFzcy5jb20vd29yZGxpc3RzLzEwMDMvT3NzZXRpYW4udWRpYy5nei50b3JyZW50Cmh0dHBzOi8vZG93bmxvYWQud2Vha3Bhc3MuY29tL3dvcmRsaXN0cy8xMDA0L1Nsb3ZlbmUudWRpYy5nei50b3JyZW50Cmh0dHBzOi8vZG93bmxvYWQud2Vha3Bhc3MuY29tL3dvcmRsaXN0cy8xMDA1L1N3YXRpLnVkaWMuZ3oudG9ycmVudApodHRwczovL2Rvd25sb2FkLndlYWtwYXNzLmNvbS93b3JkbGlzdHMvMTAwNi9VemJlay51ZGljLmd6LnRvcnJlbnQKaHR0cHM6Ly9kb3dubG9hZC53ZWFrcGFzcy5jb20vd29yZGxpc3RzLzEwMDcvVmlldG5hbWVzZS51ZGljLmd6LnRvcnJlbnQKaHR0cHM6Ly9kb3dubG9hZC53ZWFrcGFzcy5jb20vd29y
#!/usr/local/bin/env python3
# /// script
# dependencies = [
# "flask",
# "requests",
# ]
# ///
#Signup for https://trigger.esp8266-server.de/ to enable webhooks within Alexa using the webhooks skill.
#!/bin/bash
#Find Jenkins generates a target list from the metasploit database.
#gowitness
sqlite3 gowitness.sqlite3 "SELECT url FROM results WHERE title LIKE '%Jenkins%';" > /tmp/urls.txt
#msf
#msfconsole -q -x 'services -s http -p 8090,9090,8080,443 -o /tmp/http_services.csv;exit'
cat /tmp/http_services.csv | grep ssl | cut -d ',' -f 1,2 | tr -d '"' | tr ',' ':' | sed 's/^/https:\/\//' >> /tmp/urls.txt
Param(
)
$VerbosePreference = "Continue"
# Ensure the script is running with elevated privileges
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) {
Write-Error "This script must be run as an Administrator"
exit
}
#!/bin/env python3
import openpyxl
import os
import sys
# Load the Excel file
file_path = sys.argv[1]
wb = openpyxl.load_workbook(file_path)
# Create a directory to save the text files
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
@bandrel
bandrel / gist:2289f6bcc19ba4027ba7d297811330e0
Created August 16, 2024 14:39
Download all of the wordlists from weakpass.com
#!/bin/bash
# Needs transmission-cli, parallel and wget
# brew install transmission-cli
# brew install parallel
# apt get install transmission-cli parallel wget -y
blob=$(cat <<EOF
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
#!/usr/bin/env python3
import re
import sys
def convert_hex_base64(input):
from base64 import b64encode, b64decode
# hex -> base64
b64 = b64encode(bytes.fromhex(input)).decode()
# base64 -> hex
s2 = b64decode(b64.encode()).hex()
#!/usr/bin/env python3
import os
import caracara
import sys
hosts = caracara.HostsToolbox(key=os.environ["FALCON_CLIENT_ID"],secret=os.environ["FALCON_CLIENT_SECRET"],verbose=True)
with open(sys.argv[1]) as doc:
for _hostname in doc.readlines():
target_aid = hosts.host.find_host_aid(hostname=_hostname.strip())