Skip to content

Instantly share code, notes, and snippets.

@balook
Last active January 3, 2020 17:43
Show Gist options
  • Save balook/35ac02866e4e6d53c98218e9874cd6cf to your computer and use it in GitHub Desktop.
Save balook/35ac02866e4e6d53c98218e9874cd6cf to your computer and use it in GitHub Desktop.
Command Line tool pattern notes notes (rough)
subfinder
findomain
findomain -t google.com -o -> this outputs the file contents to file with given file name (--help for more)
findomain -t google.com -u customized-filename.txt
aron - parameter bruteforcing
ffuf
-r follow redirects
-v verbose mode
-s silent
-t threads
-m - match
-f - filter
wfuzz
wfuzz -u http://35.227.24.107/4d8b8489b0/login -w usernames.dic -d "username=susanna&password=FUZZ" -H "session:eyJjYXJ0IjpbXX0.EOn1Cg.tIpF5DNMUHff-AXK9ZTBl77bB5g" --hs "Invalid password" -t 200
sublert - 0 */12 * * * cd /home/balu/tools/sublert && /usr/bin/python3 sublert.py -r -l >> /home/balu/tools/sublert/sublert.log 2>&1
````eyewitness --web -f domains -d ./results.txt````
gowitness file --source=urls.txt --threads=4 --resolution="1200,750" --log-format=json --log-level=warn --timeout=60 --destination="Desktop/Screenshots/"
sqlmap -u http://35.196.135.216:5001/bfcaf3cbda/login --data "username=a&password=b" -p username --dump => -p testing param
masscan
sudo masscan -p0-55555 10.10.140.202 -e tun0 --max-rate 1000
subfinder -d domainname -silent
subfinder -dL domains.txt -silent
findomain -t seek.com -q -> outputs only subs
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment