Skip to content

Instantly share code, notes, and snippets.

import re
import csv
import time
import urllib.request
# Enter the URL you want to start from
url = input("Enter the starting URL: ")
# This is where we store the links we've already visited
visited = set()
Find Missing Scanner Plugins
curl https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json |jq -r '.vulnerabilities[].cveID' |while read cve; do echo "https://www.tenable.com/plugins/search?q=cves%3A%28%22$cve%22%29&sort=&page=1" |httpx -silent -match-string "No results found" ; done
Find Active Exploits
cat /tmp/cve.txt |cut -d "%" -f4 | cut -c 3- |while read cve; sleep 5s; do echo "https://github.com/trickest/cve/search?q=$cve" |httpx -silent -match-string "code result" ; done
@nullenc0de
nullenc0de / live_emails.sh
Created August 15, 2022 18:58
sanitized a list of emails.
wget https://raw.githubusercontent.com/papyrussolution/OpenPapyrus/master/Src/PPTEST/DATA/email-list.txt
wget https://gist.githubusercontent.com/ammarshah/f5c2624d767f91a7cbdc4e54db8dd0bf/raw/660fd949eba09c0b86574d9d3aa0f2137161fc7c/all_email_provider_domains.txt
wget https://gist.githubusercontent.com/nullenc0de/ff70efbb787ff534b661c809ed3c7f4e/raw/3fa93551c016e8cf8b0b9f51ff21c1c4af5a82e1/validate.py
wget https://github.com/reacherhq/check-if-email-exists/releases/download/v0.9.0/check_if_email_exists-x86_64-unknown-linux-gnu.tar.gz
tar -xf check_if_email_exists-x86_64-unknown-linux-gnu.tar.gz
cat email-list.txt |grep -vif all_email_provider_domains.txt | while read email; do ./check_if_email_exists $email | python3 /tmp/valid.py ;done |tee live_campaign.txt
@nullenc0de
nullenc0de / validate.py
Last active August 15, 2022 18:57
check if email exists
import json
import sys
data = json.load(sys.stdin)
if data['is_reachable'] == 'safe':
sys.stdout.write(data['input'] + '\n')
<html>
<head>
<script>
document.addEventListener("DOMContentLoaded", function() {
var workouts = [
'Pushups',
'Situps',
curl https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json |jq -r '.vulnerabilities[].cveID' > cves.txt
subfinder -d tesla.com -silent |dnsx -silent -a -resp-only |sort -u |xargs -n1 -P 1500 -I% curl -s http://networktools.nl/whois/$url% |grep "CIDR" |cut -d : -f2 |tr , "\n"| awk '{$1=$1};1' |sort -u |egrep -v "/8|/9|/10|/11|/12|/13|/14|/15|/16" |while read ip ;do whois -h whois.cymru.com " -v $ip" ;done |grep -v "BGP Prefix" |cut -d '|' -f3 |awk '{$1=$1};1' |sort -u |cidr2ip |sort -u |nrich - |grep -B4 -f cves.txt | tee shodan.txt; slackcat --channel bugbounty --filename shodan.txt
package main
import (
"encoding/json"
"fmt"
"os"
"os/exec"
)
func main() {
package main
import (
"encoding/json"
"fmt"
"os"
"os/exec"
)
func main() {
package main
import (
"encoding/json"
"fmt"
"os"
"os/exec"
)
func main() {
package main
import (
"encoding/json"
"fmt"
"os"
"os/exec"
)
func main() {