I hereby claim:
- I am nodatafound on github.
- I am corykennedy (https://keybase.io/corykennedy) on keybase.
- I have a public key ASDzMlvBnMpajZAqxPuiBi0fohTyesLSd9D3lIUGXnkhyAo
To claim this, I am signing this object:
# /dev/alias Pentest Environment Setup | |
# Version: 0.2 (20131211) | |
# Created By: Glenn 'devalias' Grant (http://devalias.net) | |
# License: The MIT License (MIT) - Copyright (c) 2013 Glenn 'devalias' Grant (see http://choosealicense.com/licenses/mit/ for full license text) | |
# TODO: | |
# * Option to check if tools (from this script and external) exist/are already installed and what versions | |
# * Eg nmap , metasploit, etc | |
# * Lair: https://github.com/fishnetsecurity/Lair | |
# * apt-get install python-pip |
#!/usr/bin/env python | |
# dump-images.py | |
# | |
# Extract all the image data from the banners and store them as separate images | |
# in a provided output directory. | |
# | |
# Example: | |
# shodan download --limit -1 screenshots.json.gz has_screenshot:true | |
# ./dump-images.py screenshots.json.gz images/ |
I hereby claim:
To claim this, I am signing this object:
,____ | |
|IoT.\ | |
___ | ` | |
/ .-\ ./=) | |
| |"|_/\/| | |
; |-;| /_| | |
/ \_| |/ \ | | |
/ \/\( | | |
| / |` ) | | |
/ \ _/ | |
I hereby claim:
To claim this, I am signing this object:
#Documentation https://api.riskiq.net/api/articles/#!/default/get_pt_v2_articles_indicators | |
#THREAT INTEL INDICATORS for #Ryuk | |
#Just replace the $USERNAME:$KEY below with values from your riskiq account. | |
#API values for your account live here: https://community.riskiq.com/settings | |
curl -u $USERNAME:$KEY 'https://api.riskiq.net/pt/v2/articles/indicators?articleGuid=0bcefe76' | jq '.indicators[] .value' |
#API Documentation: https://api.riskiq.net/api/articles/ | |
#Command to pull IoC's for "Magecart Group 12: End of Life Magento Sites Infested with Ants and Cockroaches" | |
curl -u <RiskIQ_Email>:<APIKey> 'https://api.riskiq.net/pt/v2/articles/indicators?articleGuid=fda1f967' | jq '.indicators[] .value' |
import pytest | |
import time | |
import json | |
from selenium import webdriver | |
from selenium.webdriver.common.by import By | |
from selenium.webdriver.common.action_chains import ActionChains | |
from selenium.webdriver.support import expected_conditions | |
from selenium.webdriver.support.wait import WebDriverWait | |
from selenium.webdriver.common.keys import Keys | |
from selenium.webdriver.common.desired_capabilities import DesiredCapabilities |
# `SSC Portfolio` + `response['entries']['domain']` + `Google Dorks` | |
#filetype:pdf confidential site:portfolio_id+Domains | |
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
import json | |
import requests | |
from dotenv import load_dotenv | |
import os | |
from prettytable import PrettyTable | |
import bs4 |
import os | |
import json | |
# define progress file | |
progress_file = 'progress.json' | |
# read progress file to find place | |
if os.path.isfile(progress_file): | |
with open(progress_file, 'r') as progress_file: | |
progress = json.load(progress_file) |