Skip to content

Instantly share code, notes, and snippets.

View emadshanab's full-sized avatar
🏠
Working from home

Emad Shanab emadshanab

🏠
Working from home
View GitHub Profile
#!/bin/bash
strip=$(echo $1|sed 's/https\?:\/\///')
echo ""
echo "######################################"
echo $strip
echo "######################################"
echo ""
massscan -p1-65535 $(dig +short $strip|grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b"|head -1) --max-rate 1000 |& tee $strip_scan
@emadshanab
emadshanab / lazyrecon.sh
Created May 28, 2020 11:03 — forked from random-robbie/lazyrecon.sh
Lazy recon with email support
#!/bin/bash
discovery(){
hostalive $1
screenshot $1
cleanup $1
cat ./$1/$foldername/responsive-$(date +"%Y-%m-%d").txt | sort -u | while read line; do
sleep 1
dirsearcher $line
report $1 $line
#!/bin/bash
echo "[*]Basic Aquatone Scan Started [*]"
aquatone-discover -d $1 --threads 10
aquatone-scan -d $1 --ports huge --threads 10
DEBUG=nightmare xvfb-run -a aquatone-gather -d $1 --threads 10
aquatone-takeover -d $1 --threads 10
echo "[*]sublistr scan for subdomains[*]"
python /root/Sublist3r/sublist3r.py -v -b -d $1 -o $1-subdomains.txt
dos2unix $1-subdomains.txt
echo "Merging found subdomains"
#!/bin/bash
#Script by OliverK
#Downloads _every_ wordlist in the packet storm security site.
#April 18th, 2011
# Updated Oct , 2th, 2012
mkdir common
cd common
wget --no-check-certificate http://dl.packetstormsecurity.net/Crackers/wordlists/common-4
wget --no-check-certificate http://dl.packetstormsecurity.net/Crackers/wordlists/common-3
wget --no-check-certificate http://dl.packetstormsecurity.net/Crackers/wordlists/common-2
@emadshanab
emadshanab / pigzc.sh
Last active December 21, 2020 17:09 — forked from olivierpierre/pigzc.sh
Compress a directory tree into a tarball using pigz
Compress a directory tree into a tarball using pigz
#!/bin/sh
if [ "$1" == "" ]; then
echo "Usage: $0 <folder to compress>"
exit
fi
NAME=`basename $1`
@emadshanab
emadshanab / pigzu.sh
Created April 4, 2021 12:16 — forked from olivierpierre/pigzu.sh
Uncompress a directory tree contained in a tarball with pigz
#!/bin/sh
if [ "$1" == "" ]; then
echo "Usage: $0 <file to uncompress>"
exit
fi
pigz -dc $1 | tar xf -
#!/bin/bash
# + -- --=[ReverseAPK v1.2 by @xer0dayz
# + -- --=[https://xerosecurity.com
#
# ABOUT:
# Quickly analyze and reverse engineer Android applications. SHAMELESSLY STOLEN FROM XER0DAYZ.
# apt-get install unzip smali apktool dex2jar jadx
#
# INSTALL:
# ./install
id: apk-recon
info:
name: APK Recon
author: nullenc0de
severity: info
tags: android,file
file:
- extensions:
#!/bin/bash
# + -- --=[ReverseAPK v1.2 by @xer0dayz
# + -- --=[https://xerosecurity.com
#
# ABOUT:
# Quickly analyze and reverse engineer Android applications. SHAMELESSLY STOLEN FROM XER0DAYZ.
# apt-get install unzip smali apktool dex2jar jadx
#
# INSTALL:
# ./install