Skip to content

Instantly share code, notes, and snippets.

View kalisearch.sh
#!/bin/bash
# requirements: curl, html2text, sed
#########
#
# Author: BBK
# Date: 25 Feb 2016
# Title: Kali Tools Search Engine
#
View nsesearch.sh
#!/bin/bash
script=$1
YEL='\033[1;33m'
NC='\033[0m' # No Color
if [ -z $script ]; then
echo "Usage: `basename $0` [KEYWORD]"
exit 1
fi
View catsploit.sh
#!/bin/bash
#######
#
# Opens searchsploit results in Sublime
#
#######
script=$1
YEL='\033[1;33m'
View update.sh
#!/bin/bash
echo "-------------------------------"
echo " Current Version Info Follows: "
echo "-------------------------------"
lsb_release -i
lsb_release -r
lsb_release -d
lsb_release -c
printf "Kernal Version: ";uname -r
View nslookup.bat
REM Performs nslookup on a list of IP's
for /F %i in (iplist.txt) do @nslookup %i 8.8.8.8 2>nul | find "Name" && echo %i
View lmNTLM.rule
## BBK 13 Mar 2016
## Takes a LM hash (which is 14 characters max, and has no lowercase), and toggles cases to generate possible NTLM hashes.
## Lets try to get lucky: Do nothing, lowercase all, uppercase all, capitalise first lowercase rest, lowercase first capital rest.
## These possibilites will also be contained below. As I said, trying to get lucky. Also, sanity check.
:
l
u
c
View hexchars.py
import sys
for x in range(1,256):
sys.stdout.write("\\x" + '{:02x}'.format(x))
View mapDrive.ps1
# This was, ideally, a way to map SharePoint drives as network drives in Windows. I don't believe I ever got it working, but maybe
# it will come in handy for someone.
# http://community.office365.com/en-us/f/173/t/286802.aspx
# Reference the above for "steps"
# Adds sharepoint.com to the list of trusted sites
# AKA Step 1
View detectFolder.ps1
# For servers in list, check if the folder exists
# Useful for detecting user folders, installed programs, etc.
Get-Content C:\Users\UserName\Desktop\DetectFolder\servers.txt | `
Select-Object @{Name='ComputerName';Expression={$_}},@{Name='FolderExist';Expression={ Test-Path "\\$_\c$\program files"}}
View scripts_update.sh
#!/bin/bash
#######
# Creates a flat text file list of NSE scripts suitable for searching via command line
# Used in conjunction with nsesearch.sh
# Replaces nmap_scripts.list gist
# Dependencies: html2text
#######
YEL='\033[1;33m'