This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Colors for output | |
RED='\033[0;31m' | |
GREEN='\033[0;32m' | |
YELLOW='\033[1;33m' | |
BLUE='\033[0;34m' | |
NC='\033[0m' | |
# Function to discover networks |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Filename: kali_nids_evasion.sh | |
# Focus: Host behavior obfuscation without MAC modification | |
# Requires root privileges | |
# Check for root privileges | |
if [[ $EUID -ne 0 ]]; then | |
echo "This script must be run as root" | |
exit 1 | |
fi |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# External Penetration Testing Cheatsheet | |
## 1. Reconnaissance | |
### Cloud Enumeration | |
# Cloud Infrastructure Discovery | |
./cloud_enum.py -k somecompany | |
# Third Party Misconfigurations |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Function to display usage/help information | |
show_help() { | |
cat << EOF | |
Usage: $(basename "$0") [-h] [-i INPUT] | |
Reconnaissance automation script that combines multiple tools for thorough target scanning. | |
Options: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: exposed-pki-infrastructure | |
info: | |
name: Exposed Internal PKI Infrastructure Detection | |
author: nullenc0de | |
severity: critical | |
description: Detects exposed internal PKI infrastructure including CRL distribution points and OCSP responders | |
tags: pki,exposure,misconfig | |
requests: | |
- method: GET |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from typing import List, Dict, Optional | |
import os | |
import json | |
from datetime import datetime | |
import threading | |
from queue import Queue | |
from nxc.helpers.logger import highlight | |
import re | |
class ServiceInfo: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from datetime import datetime | |
import xml.etree.ElementTree as ET | |
from typing import List, Dict, Optional | |
import os | |
import re | |
from impacket.dcerpc.v5.dcom.wmi import WBEMSTATUS | |
from nxc.helpers.logger import highlight | |
class TaskVulnerability: | |
def __init__(self, name: str, path: str, command: str, author: str, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from datetime import datetime | |
from typing import List, Dict | |
import re | |
from nxc.helpers.logger import highlight | |
from concurrent.futures import ThreadPoolExecutor, as_completed | |
import json | |
class NXCModule: | |
name = "sensitive_search" | |
description = "Search for files containing sensitive data patterns in shares with custom regex support" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# NetExec Runbook | |
## No Authentication (Anonymous) | |
### NFS Enumeration | |
```bash | |
netexec nfs TARGET_HOST -u "" -p "" --shares | |
netexec nfs TARGET_HOST -u "" -p "" --enum-shares | |
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: prototype-pollution-gadget-detector | |
info: | |
name: Prototype Pollution Gadget Detector | |
author: nullenc0de | |
severity: high | |
description: | | |
Detects potential prototype pollution gadgets in web applications that could lead to SSRF, RCE or information disclosure. | |
# References for the issue | |
reference: |
NewerOlder