Skip to content

Instantly share code, notes, and snippets.

View balook's full-sized avatar

bala manohar surya sai balook

View GitHub Profile
@balook
balook / python-bash.md
Last active March 30, 2020 03:49
executing commands

code

#! /usr/bin/env python3

import sys 
import os

# print(os.system('ls'))

@balook
balook / data-taking
Created March 9, 2020 17:24
Taking data into stdin from using python
#! /usr/bin/env python3
import sys
import os
for line in sys.stdin.readlines():
data = line.strip()
print(data)
@balook
balook / urld
Last active May 29, 2020 08:30
this was used to decode encoded urls short script
#! /usr/bin/env python3
import os
import urllib.parse as ul
import sys
for line in sys.stdin.readlines():
decode = ul.unquote(str(line))
#! /bin/bash
# findomain, subfinder, crtsh, massdns,
# must include amass, bruteforcing domains , port scanning
# massdns, findomain binaries must be in /usr/local/bin
# my .bash_profile must be present
# Author oyenom
@balook
balook / command line tool patterns (rough)
Last active January 3, 2020 17:43
Command Line tool pattern notes notes (rough)
subfinder
findomain
findomain -t google.com -o -> this outputs the file contents to file with given file name (--help for more)
findomain -t google.com -u customized-filename.txt
aron - parameter bruteforcing
@balook
balook / one liners
Last active January 3, 2020 18:36
One Liners Mostly i use
cat asset-domains.txt | while read line; do echo $line; done
cat asset-domains.txt | while read x; do nmap -Pn $(dig +short $x | head -n1); done
cat asset-domains.txt | while read x; do <perform any function like nmap OR directory brutE OR recursive subdomains , sub bruteforc>; done
#echo xyz.google.com | rev | awk -F'.' '{print $1\.$2\.$3}' | rev