Skip to content

Instantly share code, notes, and snippets.

View bandrel's full-sized avatar

Justin Bollinger bandrel

View GitHub Profile
#!/usr/local/bin/env python3
# /// script
# dependencies = [
# "flask",
# "requests",
# ]
# ///
#Signup for https://trigger.esp8266-server.de/ to enable webhooks within Alexa using the webhooks skill.
#!/bin/bash
#Find Jenkins generates a target list from the metasploit database.
#gowitness
sqlite3 gowitness.sqlite3 "SELECT url FROM results WHERE title LIKE '%Jenkins%';" > /tmp/urls.txt
#msf
#msfconsole -q -x 'services -s http -p 8090,9090,8080,443 -o /tmp/http_services.csv;exit'
cat /tmp/http_services.csv | grep ssl | cut -d ',' -f 1,2 | tr -d '"' | tr ',' ':' | sed 's/^/https:\/\//' >> /tmp/urls.txt
Param(
)
$VerbosePreference = "Continue"
# Ensure the script is running with elevated privileges
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) {
Write-Error "This script must be run as an Administrator"
exit
}
#!/bin/env python3
import openpyxl
import os
import sys
# Load the Excel file
file_path = sys.argv[1]
wb = openpyxl.load_workbook(file_path)
# Create a directory to save the text files
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
@bandrel
bandrel / gist:2289f6bcc19ba4027ba7d297811330e0
Created August 16, 2024 14:39
Download all of the wordlists from weakpass.com
#!/bin/bash
# Needs transmission-cli, parallel and wget
# brew install transmission-cli
# brew install parallel
# apt get install transmission-cli parallel wget -y
blob=$(cat <<EOF
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
#!/usr/bin/env python3
import re
import sys
def convert_hex_base64(input):
from base64 import b64encode, b64decode
# hex -> base64
b64 = b64encode(bytes.fromhex(input)).decode()
# base64 -> hex
s2 = b64decode(b64.encode()).hex()
#!/usr/bin/env python3
import os
import caracara
import sys
hosts = caracara.HostsToolbox(key=os.environ["FALCON_CLIENT_ID"],secret=os.environ["FALCON_CLIENT_SECRET"],verbose=True)
with open(sys.argv[1]) as doc:
for _hostname in doc.readlines():
target_aid = hosts.host.find_host_aid(hostname=_hostname.strip())
#!/usr/bin/env python3
import argparse
import binascii
parser = argparse.ArgumentParser(description='Encoding and Decoding F5 URL Rewrites')
parser.add_argument('mode', type=str, help='text to encode or decode')
parser.add_argument('input_text', type=str, help='text to encode or decode')
parser.add_argument('--host', type=str, help='original F5 baseurl')
#!/usr/bin/env python3
'''
Script to expand CIDR notation to a list of IP addresses.
'''
import ipaddress
import sys
hosts = set()
subnets = str(sys.argv[1]).split(',')