Skip to content

Instantly share code, notes, and snippets.

View LuD1161's full-sized avatar
👋
Hey ! Wassup 😃 Lets talk security 😎

Aseem Shrey LuD1161

👋
Hey ! Wassup 😃 Lets talk security 😎
View GitHub Profile
@LuD1161
LuD1161 / setup_bbty.sh
Last active February 15, 2024 21:30
Setup Bug Bounty Tools on AWS instance / any VPS for that matter
#!/bin/bash
#
# Execute as wget -O - https://gist.github.com/LuD1161/66f30da6d8b6c1c05b9f6708525ea885/raw | bash
# # Thanks JeffreyShran for the gist url thing
#
#
# It's debian based, so for centos and likewise you have to change apt to yum and similarly
#
InstallationStartTime=$(date +%s)
@LuD1161
LuD1161 / master_script.sh
Last active December 18, 2023 06:24
Master Script to automate all the recon
#!/bin/bash
if [ -z "$2" ]
then
echo "2nd Argument not supplied"
echo "2nd argument can be basic or advanced,it used for nmap"
echo "Usage : ./master_script.sh domain basic|advanced"
echo "Also do set your expo token export expToken=xxxx to receive push notification when this gets completed"
echo "Get your expo token here : https://play.google.com/store/apps/details?id=com.hackingsimplified.notifyme"
exit 1
@LuD1161
LuD1161 / API-Minimal.policy
Created November 21, 2022 08:03
OWASP ZAP API-Minimal.policy
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<configuration>
<policy>API Minimal</policy>
<scanner>
<level>MEDIUM</level>
<strength>MEDIUM</strength>
</scanner>
<plugins>
<p6>
<enabled>false</enabled>
@LuD1161
LuD1161 / pegasus-project.txt
Created September 2, 2021 14:12
Pegasus Project
Reference links from the video : https://youtu.be/NtNkv5GFzEU
VirusTotal Link : https://www.virustotal.com/gui/file/ade8bef0ac29fa363fc9afd958af0074478aef650adeb0318517b48bd996d5d5/detection
Malware Download Link : https://malshare.com/sample.php?action=detail&hash=7c3ad8fec33465fed6563bbfabb5b13d
@LuD1161
LuD1161 / main.go
Created June 22, 2022 05:32
HTTP Request with Custom DNS Resolver & Transport
package main
import (
"context"
"crypto/tls"
"io/ioutil"
"log"
"net"
"net/http"
"net/url"
@LuD1161
LuD1161 / nmap-input-file-creator.py
Last active June 11, 2022 14:10
nmap-input-file-creator.py
# -*- coding: utf-8 -*-
import sys
import csv
from itertools import groupby
#
# Layout of initial file that is sent
# 104.16.199.134,8080
# 104.16.199.134,8443
# 104.16.199.134,8880
# 162.159.0.102,53
@LuD1161
LuD1161 / amass.sh
Last active June 11, 2022 14:02
Scripts for different tools are here, run setup_bbty.sh to copy these in the scripts folder
#!/bin/bash
domain=$1
resultDir=$2
resultfile=$resultDir/$domain.amass.txt
touch $resultfile
echo "" >> $resultDir/log.txt
echo "AMASS Logs Now" >> $resultDir/log.txt
echo "" >> $resultDir/log.txt
@LuD1161
LuD1161 / test_secret.txt
Last active May 30, 2022 13:13
Test Secret
We couldn’t find that file to show.
@LuD1161
LuD1161 / gcp_enum.sh
Last active March 30, 2022 10:56 — forked from carnal0wnage/gcp_enum.sh
use the gcloud utilities to enumerate as much access as possible from a GCP service account json file. see blog post: <to insert>
# gcloud auth activate-service-account --key-file=85.json
# gcloud projects list
project="my-project"
space=""
echo "gcloud auth list"
gcloud auth list
echo -e "$space"
@LuD1161
LuD1161 / clean_ips.py
Last active March 23, 2022 07:10
Remove IPs which belong to cloudflare
import sys
import requests
from ipaddress import ip_network, ip_address
def output_valid_ips(ips):
ipvs4 = "https://www.cloudflare.com/ips-v4"
ipvs6 = "https://www.cloudflare.com/ips-v6"
ipranges = requests.get(ipvs4).text.split("\n")[:-1] # removing last trailing space
ipranges += requests.get(ipvs6).text.split("\n")[