Skip to content

Instantly share code, notes, and snippets.

View andreas-31's full-sized avatar

Andreas Gaupmann andreas-31

View GitHub Profile
@andreas-31
andreas-31 / vulnscan.sh
Created July 22, 2020 19:27
Commands related to scanning hosts on a network
# https://github.com/vulnersCom/nmap-vulners
# https://github.com/scipag/vulscan
nmap --script vulscan,nmap-vulners -sV 192.168.0.33
# https://www.youtube.com/watch?v=3U1pJ-eJrAU&t=192s
@andreas-31
andreas-31 / pip_modules.txt
Last active July 22, 2020 11:52
Collection of python3 pip modules
scapy
pycryptodomex
dnspython
@andreas-31
andreas-31 / linux_tools_apt.txt
Created July 22, 2020 08:43
Collection of Linux tools
masscan
hping3
mz
nmap
di
htop
vnstat
vnstati
iperf
iptraf-ng
@andreas-31
andreas-31 / bashrc.sh
Created July 22, 2020 08:30
Tidbits for a .bashrc file
# https://www.heise.de/ratgeber/Linux-Shell-Bash-Clever-einrichten-und-einfaerben-4844232.html?seite=all
cdl() {
cd "$@"
if [ "$?" == 0 ]; then
ls
fi
}
backup() {
cp "$@" "$@".backup-`date +%Y%m%d`; }
@andreas-31
andreas-31 / portscan.sh
Last active July 22, 2020 13:46
How to scan network for open ports with Netcat | Simple port scanner
# How to scan network for open ports with Netcat | Simple port scanner
# https://www.youtube.com/watch?v=CKiw0JYHrwQ
# Thanks Daniel Lowrie from ITpro.TV!
for i in $(seq 1 65535); do nc -nvz -w 1 127.0.0.1 $i 2>&1; done | grep -v "refused"
# Display raw bytes in hex (bytes separated by colons)
hexdump IKE_SA_INIT.raw -v -e '/1 "%02X:"' | sed 's/:$//'