This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
Name : Ip Checker | |
Created By : Lucifer | |
""" | |
import subprocess | |
print '\n\tLookup domain IP - By : Lucifer \n' | |
print """ | |
_____ _ _ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/* | |
Demo Video : https://www.youtube.com/watch?feature=player_detailpage&v=exO_7uXU2Ys | |
Script name : Whoislook BY Alexcerus-HR | |
Version : 1.0 | |
*/ | |
@set_time_limit(0); | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#sb-e Venom tool | |
#By :Alexcerus-HR | |
#Simple script cooded in bash scripting can give a help for crawling the files web and collecting email & #domains .... | |
#Available output types : | |
# doc = document files | |
# Pdf = files extracted from the Url targeted | |
# The harvester = tool can be found in our system for pentesting (search in the web & install it ).. | |
# Golismero = the web tool knife | |
# |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
import argparse | |
import os | |
import time | |
def checkkey(kee): | |
try: | |
if len(kee) == 64: | |
return kee | |
else: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
#Wrtn By Kyxrec0n | |
#This module submits a user-defined URL to the VirusTotal scanning engine, and displays the results | |
import sys | |
import simplejson | |
import urllib | |
import urllib2 | |
import re | |
from time import sleep |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# SSH Brute Force | |
# python | |
# Demo : https://www.youtube.com/watch?v=nyUhMQjslaY&t=75s | |
import pxssh | |
import argparse | |
import time | |
def connect(host, user, password): | |
global Found |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#Don't edit my script lamer ! | |
#This simple dns crawler Script Using Dig command to | |
#grab much results as well | |
# creat0r : Kyxrecon | |
# Cod3d 1n : Bash script | |
# Dig command search In multi add ns $2 | awk " | |
dig ns $1 | awk " | |
found == 1 && match(\$1,\"$1\"){ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# knockport.sh v0.1 | |
# This small tool created for knock suquance ports , this # properly Work on all Linux machines | |
# Creat0r : Kyxrec0n | |
# Tools required : netdiscover - netcat | |
# | |
VERS=$(sed -n 2p $0 | awk '{print $3}' | sed 's/v//') | |
TMPFILE=/root/ports_knocker.tmp | |
rm -rf $TMPFILE | |
PERMUTE=0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
#Webadmin finder v2.0 | |
# Creat0r : Kyxrec0n | |
# Site : www.kyxhack.blogspot.com | |
use HTTP::Request; | |
use LWP::UserAgent; | |
system('cls'); | |
system('title Webadmin_finder'); | |
system "color 0a"; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Version 1.0 | |
# creat0r : Kyxrec0n | |
# site : www.kyxhack.blospot.mx | |
# query2googlev10.py is a tool working on google with a user defined query then writes results on text.txt | |
#Import? | |
import sys, re, string, httplib, urllib2 | |
def StripTags(text): |
OlderNewer