Skip to content

Instantly share code, notes, and snippets.

View pry0cc's full-sized avatar
💭
Hacking the Planet

pry0cc pry0cc

💭
Hacking the Planet
  • Amazon Web Services
  • Austin, TX
  • X @pry0cc
View GitHub Profile
@pry0cc
pry0cc / typosmash.sh
Last active April 5, 2022 19:16
A script that uses interlace and urlcrazy to multi-threadedly check if domains are available for TypoSquats
#!/bin/bash
echo "" > $1.txt
urlcrazy $1 -f csv | cut -d "," -f 2 | grep -v "Typo" > domains.txt 2>&1 | grep -v "warn"
interlace -tL domains.txt -threads 100 -c "curl -s \"https://api.scaleway.com/domain/v2alpha2/available-domains?search=_target_\" | jq -r '.[][] | select(.a
vailable==true) | .domain' >> $1.txt" >> /dev/null 2>&1
rm -f domains.txt
/usr/bin/cat $1.txt
rm $1.txt
for ip in $(cat 1000.txt); do echo "Scanning $ip..."; cn=$(timeout 2 python3 dumpCN.py "$ip"); echo "{\"ip\":\"$ip\", \"cn\":\"$cn\"}" | tee -a results.txt | jq; done
@pry0cc
pry0cc / do-ranges.txt
Created June 24, 2020 19:40
A list of DigitalOcean US ranges.
103.253.144.0/22
104.131.0.0/18
104.131.128.0/20
104.131.144.0/20
104.131.160.0/20
104.131.176.0/20
104.131.192.0/19
104.131.224.0/19
104.131.64.0/18
104.236.0.0/18
@pry0cc
pry0cc / enum.sh
Created June 16, 2020 00:18
Axiom enum.sh to start and delete instances for each enum
#!/bin/bash
base="bb-enum"
machines=$(axiom-ls | awk '{ print $1 }' | grep -v "Name")
domains=($@)
counter=1
log="/tmp/enum_log.txt"
init_scan() {
name="$1"
@pry0cc
pry0cc / asn.rb
Created June 14, 2020 21:18
A VERY quick and dirty ruby script to pull ASN ranges from a query.
#!/usr/bin/env ruby
require 'json'
require 'mechanize'
require 'nokogiri'
@agent = Mechanize.new
country = "us"
#!/bin/bash
#
# https://github.com/Nyr/openvpn-install
#
# Copyright (c) 2013 Nyr. Released under the MIT License.
# Detect Debian users running the script with "sh" instead of bash
if readlink /proc/$$/exe | grep -q "dash"; then
echo "This script needs to be run with bash, not sh"
#!/bin/bash
host="$1"
remote_url="https://$host"
exe_url="$remote_url/epa/scripts/win/nsepa_setup.exe"
decom_dir="/tmp/extract/$RANDOM"
mkdir -p "$decom_dir"
#!/usr/bin/env ruby
names = File.open("names.txt").read.split("\n")
emails_who_fell = []
names[1..-1].each do |firstlast|
first = firstlast.split(" ")[0]
last = firstlast.split(" ")[1]
email = "#{first.downcase}.#{last.downcase}@gmail.com"
emails_who_fell.push(email)
end
using System;
using System.Text;
using System.IO;
using System.Diagnostics;
using System.ComponentModel;
using System.Linq;
using System.Net;
using System.Net.Sockets;
@pry0cc
pry0cc / deploy.sh
Last active January 16, 2020 17:59
Deployment script for mission
apt-get update
apt-get -y upgrade
apt-get -y install openvpn mkisofs
mkdir -p /home/op/.ssh
echo "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCbix5Qn5zjtJubC+6wJSxve1h3P2NENY7G8/AakpPdXe0GYU9uewCmYBOaLN9ialJS/AidDbd8BnxZEpfYgI++nj9k7F/dd59/kEVX5ZzjFgsgpSgHToiSYhXSLDps/szRxtUSSEJ2RFnQia/A8/WarMEYy/PIlwsCrYjMMeffG9KxzbbjcvUQ83VXocD2U7N5oXVxrg0gSfMVMy4N28fdPRU4qfNcyc6ka5QIira3hTn+jv5ZvDNoSPDrHraq8dWKTEwTF0EofYkykhGk6wO9MnMVPkRAKZqkCRyudv/u1j4DwisfuYL3Z4VK9zlowFf6BSUp8YMi4QllCCeDdyyT pry@Ghost3" >> /home/op/.ssh/authorized_keys
echo "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6iJbV57PHnk+kPfoBEnUWtUXfxft3oPUU75q/eraT4bMi4Xj4ScQcjqRIUHL5XTesB+mG6yzmlrp14+ZPslFqsi+2zcU/UdibErcwcCOcq+t+EOUDnCYsvAqm9VUUcdaHHGdkqPkm8NJaEYx/Wk6FmztHfD/RG99vWrHohzZicCCSfjZBjWkSQypklHBqrnVp6TjQUFCzOkdgb64a2c0AscBBi0Rw/iv+xsXi2nHJe7ZpiuktkIhmeH0zxW5/cSFtBY14AX0+jRYqTMPVsmtx5NkyMSbYJ66rp4IWbULHJOXhfEeEzQLIerNYQc88ECv5mmEutBhIuFxPn/zdlEA5 op@mission" >> /home/op/.ssh/authorized_keys
git clone https://github.com/Tomas-M/linux-live