Skip to content

Instantly share code, notes, and snippets.

#!/bin/bash
# Kali Linux ISO recipe for : Evil Access Point
#########################################################################################
# Desktop : None
# Metapackages : None
# ISO size : 1.36 GB
# Special notes : Boots into an Access Point.
# : ppp0 and wlan0 hardcoded.
# Background : http://www.offensive-security.com/kali-linux/kali-linux-recipes/
@iGh0st
iGh0st / wpsnitchwordpress.sh
Last active August 29, 2015 14:02
wpsnitch Wordpress scraper
#!/bin/bash
# Usage = ./wpsnitch -t 192.168.1.1-255 -s mysession
# Thanks TAPE for letting me use your colors, Thanks n1tr0 for testing the script in Kali!
STD=$(echo -e "\e[0;0;0m") #Revert fonts to standard colour/format
RED=$(echo -e "\e[1;31m") #Alter fonts to red bold
REDN=$(echo -e "\e[0;31m") #Alter fonts to red normal
GRN=$(echo -e "\e[1;32m") #Alter fonts to green bold
GRNN=$(echo -e "\e[0;32m") #Alter fonts to green normal
BLU=$(echo -e "\e[1;36m") #Alter fonts to blue bold
#!/usr/bin/python
# Joomla Administrator Login BruteForcer for v1.0 and v1.5
# Feel free to do whatever you want with this code!
# Share the c0de!
# Darkc0de Team
# www.darkc0de.com
# rsauron[at]gmail[dot]com
#!/usr/bin/perl
use HTTP::Request;
use LWP::UserAgent;
system('cls');
system('title Admin CP Finder ');
system "color 0a";
print"\n";
print "\t>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>\n";
@iGh0st
iGh0st / shadow.sh
Created June 25, 2014 16:36
k this program does something pretty cool and simple but I haven’t seen this kind of script in the wild yet. Let’s say there are multiple clients on a local subnet; the Gateway identifies these clients by their unique MAC-address; once identified they are assigned an IP-address. Of course this assumes there is a DHCP-Server that hands out IP-add…
#!/bin/bash
echo "°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°"
echo "° Sh@d0w v1.0 - b33f °"
echo "° ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ °"
echo "° -Don't panic, i'm only a shadow- °"
echo "°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°"
echo -n "° Select the Interface to use: "
read -e iface
echo "°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°"
@iGh0st
iGh0st / wmic_info.bat
Created June 25, 2014 16:38
script which can be dropped on the target machine and which will use WMIC to extract the following information: processes, services, user accounts, user groups, network interfaces, Hard Drive information, Network Share information, installed Windows patches, programs that run at startup, list of installed software, information about the operatin…
for /f "delims=" %%A in ('dir /s /b %WINDIR%\system32\*htable.xsl') do set "var=%%A"
wmic process get CSName,Description,ExecutablePath,ProcessId /format:"%var%" >> out.html
wmic service get Caption,Name,PathName,ServiceType,Started,StartMode,StartName /format:"%var%" >> out.html
wmic USERACCOUNT list full /format:"%var%" >> out.html
wmic group list full /format:"%var%" >> out.html
wmic nicconfig where IPEnabled='true' get Caption,DefaultIPGateway,Description,DHCPEnabled,DHCPServer,IPAddress,IPSubnet,MACAddress /format:"%var%" >> out.html
wmic volume get Label,DeviceID,DriveLetter,FileSystem,Capacity,FreeSpace /format:"%var%" >> out.html
wmic netuse list full /format:"%var%" >> out.html
wmic qfe get Caption,Description,HotFixID,InstalledOn /format:"%var%" >> out.html
@iGh0st
iGh0st / GlueGun.py
Created June 25, 2014 16:39
This is a prototype encryption and decryption program based on the stenography challenge in HackFu 2012. The program also creates two intermittent files "BinBits.txt" and "HexBits.txt" just for debugging sake so I could compare these files when testing the program
#!/usr/bin/python
import binascii
import random
import optparse
# Help Menu
##############################################################################
if __name__=="__main__":
@iGh0st
iGh0st / bin.sh
Created June 25, 2014 16:40
his is a script to write shellcode to a binary file. When creating exploits it is common occurrence to create a copy of the shellcode in a binary file. This process is tedious and time consuming so I thought to myself “There should be an app for that!” hehe. The script has some error tolerance for sloppy-copy use. It should filter out junk chara…
#!/bin/bash
INPUT=
OUTPUT=
TYPE=
while getopts ":i:o:t:" OPTIONS
do
case $OPTIONS in
i) INPUT=$OPTARG;;
@iGh0st
iGh0st / macmon.sh
Created June 25, 2014 16:43
(1) Set wireless devices to monitor mode, (2) destroy/revert monitor interfaces and (3) use macchanger to fake the mac addresses of these various devices. In practice typing all these commands over and over is very tedious (especially if you want to use macchanger each time). This little script does all of that: (a) Monitor Mode + Random MAC, (…
#!/bin/bash
#Save all monitor interfaces in a list
################################################################################
xterm -geometry 0x0 -e "iwconfig |grep "Mode:Monitor" >> /tmp/mon.txt" & wait
#Menu
################################################################################
echo "-----------------------------------------------"
echo "* MacMon v1.5 -- b33f *"
@iGh0st
iGh0st / flash.sh
Created June 25, 2014 16:45
We all know port scanning is the bread and butter of the enumeration faze. There is no denying that nmap sets the standard for port scanning on both windows and UNIX systems. However full range UDP and TCP port scans (65k ports) take a long time to finish. There is another scanner which excels at speed; unicornscan is an asynchronous stateless p…
#!/bin/bash
SPEED=
ENUM=
PORTS=
XPLOIT=
TARGET=
while getopts ":s:e:p:x:t:" OPTIONS
do