Skip to content

Instantly share code, notes, and snippets.

@lrckt
lrckt / bloodhoundce_import.py
Created October 20, 2023 04:07 — forked from aconite33/bloodhoundce_import.py
Import large files into BloodHound CE Edition
import requests
import json
import time
import argparse
import getpass
import os
import sys
def main():
import dns.resolver
f = open("subdomains.txt","r").readlines()
for i in f:
tmp = i.replace("\n","")
try:
result = dns.resolver.resolve(tmp, 'CNAME')
print("%s,%s" % ( tmp , result[0]))
except:
pass
@lrckt
lrckt / web_ports.py
Created January 16, 2022 06:01
get host and ports from nessus csv report
import pandas as pd
import argparse
from argparse import RawTextHelpFormatter
"""
Author: Lenk Ratchakrit
This naive pandas script is to get only web host IP addresses and its ports
Hence you can pass it to some tools like httprobe then feroxbuster through STDIN and then aquatone or gowitness
"""
def nessus_converter(filename,output):
@lrckt
lrckt / obfuscar.xml
Created August 3, 2021 03:26
obfuscar configuration file for .net application
<?xml version='1.0'?>
<Obfuscator>
<Var name="InPath" value=".\bin\x64\\Release" />
<Var name="OutPath" value=".\Release_Obfuscated" />
<Var name="HidePrivateApi" value="true" />
<Var name="RenameProperties" value="true" />
<Var name="RenameFields" value="true" />
<Module file="$(InPath)\test.exe" />
</Obfuscator>