Skip to content

Instantly share code, notes, and snippets.

View bluesku's full-sized avatar
💭
Shell Bomber

bluesku bluesku

💭
Shell Bomber
View GitHub Profile
@bluesku
bluesku / whois-tool-script.sh
Last active May 17, 2021 23:37
Get Info From DNS Servers and Active Hosts
#! /bin/sh
mkdir /WHOIS-DB
mkdir Whois-$(date +'%F') || echo 'Folder Already Exist!' ;
cd /WHOIS-DB ; echo "WorkingDir.: $(pwd)"
apt install pv whois -y
echo -e 'inetnum:\ninetname:\ne-mail:\nnetname:\ndescr:\nrole:\nroute:\nnserver:\ndomain:' > matchfile
read -p 'Set Host List.: ' in_path
@bluesku
bluesku / Wordlist-Gen.sh
Last active April 18, 2021 20:12
Crunch Password List Generator
#! /bin/bash
# Varibles: password lenght incrementation
n1=1
n2=2
n3=3
# End Var
echo "Set Password Wordlist Generator: " ; read var1
echo "Eg: Names, PhoneNumbers or whateve you like!"
@bluesku
bluesku / local.ru
Last active May 15, 2022 21:18
Snort # LOCAL RULES
# ' $Id: local.rules,v 1.11 2004/07/23 20:15:44 bmc Exp
# ' ----------------
# ' LOCAL RULES
# ' ----------------
# ' Copyright 2001-2013 Sourcefire, Inc. All Rights Reserved.
# '
# ' This file contains (i) proprietary rules that were created, tested and certified by
# ' Sourcefire, Inc. (the "VRT Certified Rules") that are distributed under the VRT
# ' Certified Rules License Agreement (v 2.0), and (ii) rules that were created by
# ' Sourcefire and other third parties (the "GPL Rules") that are distributed under the
@bluesku
bluesku / WAF-Config.sh
Last active February 26, 2021 12:02
WAF-Firewall-install - Ubuntu 18.04
#!/bin/bash
# https://scriptxone.blogspot.com
# reference script adapted from https://kifarunix.com/install-and-configure-naxsi-nginx-waf-on-ubuntu-18-04-lts/
#Now that the rules are in place, you need to enable these rules to act on per location basis.
#You can also define different types of attacks that can be blocked by Naxsi.
sed -i 'SecRulesEnabled;\n DeniedUrl "/RequestDenied";\n ## Check Naxsi rules\n CheckRule "$SQL >= 8" BLOCK;\n\n\n CheckRule "$RFI >= 8" BLOCK;\n CheckRule "$TRAVERSAL >= 4" BLOCK;\n CheckRule "$EVADE >= 4" BLOCK;\n CheckRule "$XSS >= 8" BLOCK;' > /etc/nginx/naxsi.rules
# SecRulesEnabled enables the Naxsi rules in a specific web location. SecRulesEnabled directive disables this.
# Note that you can set Naxsi in learning mode using the directive, LearningMode, where it automatically generates whitelisting rules based on website’s behavior. In this mode, Naxsi doesn’t block any attack.
@bluesku
bluesku / OpenAppID-snort.sh
Created February 24, 2021 16:21
OpenAppID-snort Install - Application Detector Package
#! /bin/sh
#OpenAppId is an open, application-focused detection language and processing module for Snort that
#enables users to create, share, and implement application and service detection.
#
# Reference guides:
# https://kifarunix.com/install-and-configure-snort-3-nids-on-ubuntu-20-04/
# https://www.cisco.com/c/en/us/products/collateral/security/router-security/guide-c07-736629.html
# https://blog.snort.org/2014/03/firing-up-openappid.html
apt-get install libluajit-5.1-2 libluajit-5.1-common libluajit-5.1-dev luajit
@bluesku
bluesku / kodi-install-ubuntu-ppa.sh
Last active February 23, 2021 16:18
kodi-install-ubuntu repo
#! /bin/sh
add-apt-repository ppa:team-xbmc/ppa
apt update ; apt install kodi -y
#keep reading https://launchpad.net/~team-xbmc/+archive/ubuntu/ppa
@bluesku
bluesku / hashcat-passwd.sh
Last active February 8, 2021 23:16
Brute Force Password With HashCat
#! /bin/bash
printf "HASH WPA HARDERNS NEAR BY\n\n"
read -p "Informe Diretório do .hccapx: " hccapx
read -p "Informe Diretório da Wordlist: " wdlist
read -p "Nome da Sessão: " sessao
function hash_list {
hashcat -a 0 -m 2500 $hccapx $wdlist --session=$sessao --gpu-temp-disable --status -o cracked.txt
@bluesku
bluesku / nmap-scan.sh
Last active March 2, 2021 22:18
Nmap Scan Home Network.sh
#! /bin/sh
echo '# https://scriptxone.blogspot.com/'
apt install -y nmap zenmap
mkdir -p ~/scriptx/nmap-reports/HOME_NET
read -p '# Set Hosts.: ' host
nmap -sA --script=default $host -oA ~/scriptx/nmap-reports/HOME_NET/$host
# -oA means that nmap is going to generate report in all Output formarts
@bluesku
bluesku / Backup-OS-linux.sh
Last active April 18, 2021 21:26
Backup-OS-linux.sh
#! /bin/sh
mkdir -p '/backup' ; mpath='/backup'
rsync -nav --progress /var/log/ $mpath
rsync -nav --progress /home $mpath
rsync -nav --progress /root $mpath
rsync -nav --progress /etc $mpath
rsync -nav --progress /opt $mpath
@bluesku
bluesku / Megasync x64 - x32.sh
Last active February 8, 2021 22:23
INSTALATION Megasync
#! /bin/sh
wget https://mega.nz/linux/MEGAsync/xUbuntu_$(lsb_release -rs)/i386/megasync-xUbuntu_$(lsb_release -rs)_i386.deb -O megasync.deb
#wget https://mega.nz/linux/MEGAsync/xUbuntu_$(lsb_release -rs)/i386/nautilus-megasync-xUbuntu_$(lsb_release -rs)_i386.deb -O nautilus-megasync.deb
#Se seu sistema é um Ubuntu de 64 bits, use os comandos abaixo para baixar os pacotes:
#wget https://mega.nz/linux/MEGAsync/xUbuntu_$(lsb_release -rs)/amd64/megasync-xUbuntu_$(lsb_release -rs)_amd64.deb -O megasync.deb
# INSTALATION