This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Function to display usage/help information | |
show_help() { | |
cat << EOF | |
Usage: $(basename "$0") [-h] [-i INPUT] | |
Reconnaissance automation script that combines multiple tools for thorough target scanning. | |
Options: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: exposed-pki-infrastructure | |
info: | |
name: Exposed Internal PKI Infrastructure Detection | |
author: nullenc0de | |
severity: critical | |
description: Detects exposed internal PKI infrastructure including CRL distribution points and OCSP responders | |
tags: pki,exposure,misconfig | |
requests: | |
- method: GET |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from typing import List, Dict, Optional | |
import os | |
import json | |
from datetime import datetime | |
import threading | |
from queue import Queue | |
from nxc.helpers.logger import highlight | |
import re | |
class ServiceInfo: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from datetime import datetime | |
import xml.etree.ElementTree as ET | |
from typing import List, Dict, Optional | |
import os | |
import re | |
from impacket.dcerpc.v5.dcom.wmi import WBEMSTATUS | |
from nxc.helpers.logger import highlight | |
class TaskVulnerability: | |
def __init__(self, name: str, path: str, command: str, author: str, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from datetime import datetime | |
from typing import List, Dict | |
import re | |
from nxc.helpers.logger import highlight | |
from concurrent.futures import ThreadPoolExecutor, as_completed | |
import json | |
class NXCModule: | |
name = "sensitive_search" | |
description = "Search for files containing sensitive data patterns in shares with custom regex support" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# NetExec Runbook | |
## No Authentication (Anonymous) | |
### NFS Enumeration | |
```bash | |
netexec nfs TARGET_HOST -u "" -p "" --shares | |
netexec nfs TARGET_HOST -u "" -p "" --enum-shares | |
``` |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: prototype-pollution-gadget-detector | |
info: | |
name: Prototype Pollution Gadget Detector | |
author: nullenc0de | |
severity: high | |
description: | | |
Detects potential prototype pollution gadgets in web applications that could lead to SSRF, RCE or information disclosure. | |
# References for the issue | |
reference: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ | |
"id": 0, | |
"request": { | |
"method": "GET", | |
"baseURL": "https://{TARGET}.atlassian.net", | |
"path": [ | |
"/secure/Signup!default.jspa" | |
], | |
"body": null |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import json | |
import sys | |
from collections import Counter | |
def analyze_openapi_spec(spec): | |
endpoint_count = 0 | |
request_count = 0 | |
endpoints = [] | |
method_counts = Counter() | |
parameter_counts = Counter() |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
class IPv6Packet: | |
def __init__(self, main_header_length, extension_headers): | |
self.main_header_length = main_header_length | |
self.extension_headers = extension_headers | |
def process_packet(packet): | |
total_length = packet.main_header_length | |
# Vulnerable loop: doesn't check for integer underflow | |
for header_length in packet.extension_headers: |