Skip to content

Instantly share code, notes, and snippets.

View powerexploit's full-sized avatar
🏠
Working from home

powerexploit powerexploit

🏠
Working from home
View GitHub Profile
@powerexploit
powerexploit / techanalyzer.py
Created December 26, 2021 10:53
Automated script to discover tech stack
#!/usr/bin/python3
import json
from Wappalyzer import Wappalyzer, WebPage
from os import system
import warnings
import time,sys
import argparse
def techno(url):
start = time.time()
try:
@powerexploit
powerexploit / cve-2021-38314.php
Created November 17, 2021 17:25
Php Exploit script CVE-2021-38314
<?php
print "
_______ ________ ___ ___ ___ __ ____ ___ ____ __ _ _
/ ____\ \ / / ____| |__ \ / _ \__ \/_ | |___ \ / _ \___ \/_ | || |
| | \ \ / /| |__ ______ ) | | | | ) || |______ __) | (_) |__) || | || |_
| | \ \/ / | __|______/ /| | | |/ / | |______|__ < > _ <|__ < | |__ _|
| |____ \ / | |____ / /_| |_| / /_ | | ___) | (_) |__) || | | |
\_____| \/ |______| |____|\___/____||_| |____/ \___/____/ |_| |_|
Author: @powerexploit
@powerexploit
powerexploit / UPIGen.py
Created October 23, 2021 17:15
UPI_ID Extractor
#!/usr/bin/python
import re
import requests
import argparse
import sys
def upi_grabber(url):
response= requests.get('%s' %(url)).text
UPI_ID = re.findall(r'[a-zA-Z0-9.\-_]{2,256}@[a-zA-Z]{2,64}',response)
print(UPI_ID)
@powerexploit
powerexploit / Oniono.py
Last active March 11, 2021 05:35
Onion address routing script
import requests
import argparse
from colorama import Fore
def oni(address):
proxies = {
'http': 'socks5h://127.0.0.1:9050',
'https': 'socks5h://127.0.0.1:9050'
}
r = requests.get("http://%s" %(address), proxies=proxies).text
with open('Onion_site.html', 'w') as f:
@powerexploit
powerexploit / HTBHACK
Created May 3, 2020 15:16
Hackthebox invite generator
#!/usr/bin/python
# Hackthebox invite code generator
import requests
import base64
import json
from os import system
system('tput setaf 9')
print("""
@powerexploit
powerexploit / TTLOs.psm1
Created January 17, 2020 06:59
Os Detection With TTL
#TTlOs.psm1
#<
# Ping scanner with os detection according with ttl value.
# Test-connection is a type of function in powershell uses as a ping command.
#>
#
function PsPing
{
param($ip)
Process
#!/usr/bin/python3
import smtplib
import getpass
smtpobj = smtplib.SMTP('smtp.gmail.com',587)
my_email = input("What is your gmail?:")
my_passw = getpass.getpass("Enter the password:")
smtpobj.starttls() 
#This step enables encryption(TLS Encryption) for your connection.
smtpobj.login(my_email,my_passw)
#this will help user to logged in gmail account
@powerexploit
powerexploit / robot.py
Created October 19, 2019 15:09
Stealth Syn Scanner to check open ports
#!/usr/bin/python
#Robot.py
from scapy.all import *
from pyfiglet import Figlet
logo = Figlet(font='graffiti')
print(logo.renderText('%R%\nfs0c131y..%'))
ip = input("Enter the ip address or url:\n")
port = int(input("Enter the port number:\n"))
def checkhost():
ping = IP(dst=ip)/ICMP()
@powerexploit
powerexploit / pingscanner.py
Created October 9, 2019 17:19
pingscanner using python
#!/usr/bin/python3
#pingscanner.py
import sys
from scapy.all import *
ip = sys.argv[1] # command line argument
icmp = IP(dst=ip)/ICMP()
#icmp = IP(dst=ip)/TCP()
#IP defines the protocol for IP addresses
#dst is the destination IP address
#TCP defines the protocol for the ports
@powerexploit
powerexploit / MailBomber.py
Last active October 8, 2019 14:24
This is a mass mailer script which helps to send multiple mails at one time
#!/usr/bin/python3
#mass_mailer.py -> mass mailing script
import smtplib
def mass():
smtpobj = smtplib.SMTP('smtp.gmail.com',587)
#smtpobj is a SMTP object that represents a connection to an SMTP mail server and has methods for sending emails.
my_email = input("What is your gmail?:")
my_passw = input("Enter the password:")
recip_mail = input("What is the recipient gmail?:")
message = input("Enter the message that you want to mail:\n")