This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # Kali Linux ISO recipe for : Evil Access Point | |
| ######################################################################################### | |
| # Desktop : None | |
| # Metapackages : None | |
| # ISO size : 1.36 GB | |
| # Special notes : Boots into an Access Point. | |
| # : ppp0 and wlan0 hardcoded. | |
| # Background : http://www.offensive-security.com/kali-linux/kali-linux-recipes/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # Usage = ./wpsnitch -t 192.168.1.1-255 -s mysession | |
| # Thanks TAPE for letting me use your colors, Thanks n1tr0 for testing the script in Kali! | |
| STD=$(echo -e "\e[0;0;0m") #Revert fonts to standard colour/format | |
| RED=$(echo -e "\e[1;31m") #Alter fonts to red bold | |
| REDN=$(echo -e "\e[0;31m") #Alter fonts to red normal | |
| GRN=$(echo -e "\e[1;32m") #Alter fonts to green bold | |
| GRNN=$(echo -e "\e[0;32m") #Alter fonts to green normal | |
| BLU=$(echo -e "\e[1;36m") #Alter fonts to blue bold |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| # Joomla Administrator Login BruteForcer for v1.0 and v1.5 | |
| # Feel free to do whatever you want with this code! | |
| # Share the c0de! | |
| # Darkc0de Team | |
| # www.darkc0de.com | |
| # rsauron[at]gmail[dot]com |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/perl | |
| use HTTP::Request; | |
| use LWP::UserAgent; | |
| system('cls'); | |
| system('title Admin CP Finder '); | |
| system "color 0a"; | |
| print"\n"; | |
| print "\t>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>\n"; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| echo "°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°" | |
| echo "° Sh@d0w v1.0 - b33f °" | |
| echo "° ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ °" | |
| echo "° -Don't panic, i'm only a shadow- °" | |
| echo "°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°" | |
| echo -n "° Select the Interface to use: " | |
| read -e iface | |
| echo "°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| for /f "delims=" %%A in ('dir /s /b %WINDIR%\system32\*htable.xsl') do set "var=%%A" | |
| wmic process get CSName,Description,ExecutablePath,ProcessId /format:"%var%" >> out.html | |
| wmic service get Caption,Name,PathName,ServiceType,Started,StartMode,StartName /format:"%var%" >> out.html | |
| wmic USERACCOUNT list full /format:"%var%" >> out.html | |
| wmic group list full /format:"%var%" >> out.html | |
| wmic nicconfig where IPEnabled='true' get Caption,DefaultIPGateway,Description,DHCPEnabled,DHCPServer,IPAddress,IPSubnet,MACAddress /format:"%var%" >> out.html | |
| wmic volume get Label,DeviceID,DriveLetter,FileSystem,Capacity,FreeSpace /format:"%var%" >> out.html | |
| wmic netuse list full /format:"%var%" >> out.html | |
| wmic qfe get Caption,Description,HotFixID,InstalledOn /format:"%var%" >> out.html |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| import binascii | |
| import random | |
| import optparse | |
| # Help Menu | |
| ############################################################################## | |
| if __name__=="__main__": |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| INPUT= | |
| OUTPUT= | |
| TYPE= | |
| while getopts ":i:o:t:" OPTIONS | |
| do | |
| case $OPTIONS in | |
| i) INPUT=$OPTARG;; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| #Save all monitor interfaces in a list | |
| ################################################################################ | |
| xterm -geometry 0x0 -e "iwconfig |grep "Mode:Monitor" >> /tmp/mon.txt" & wait | |
| #Menu | |
| ################################################################################ | |
| echo "-----------------------------------------------" | |
| echo "* MacMon v1.5 -- b33f *" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| SPEED= | |
| ENUM= | |
| PORTS= | |
| XPLOIT= | |
| TARGET= | |
| while getopts ":s:e:p:x:t:" OPTIONS | |
| do |