Skip to content

Instantly share code, notes, and snippets.

View sathwikv143's full-sized avatar
🖥️
Working my ass off

Sathwik Mohan sathwikv143

🖥️
Working my ass off
View GitHub Profile
@sathwikv143
sathwikv143 / sec_news.opml
Last active December 20, 2023 00:50
Cyber Sec News Feeds
<?xml version="1.0" encoding="UTF-8"?>
<opml version="2.0">
<head>
<title>MyFeed</title>
</head>
<body>
<outline title="Blogs" text="Blogs">
<outline title="The Cloudflare Blog" type="rss" xmlUrl="https://blog.cloudflare.com/rss/" text="The Cloudflare Blog" htmlUrl="https://blog.cloudflare.com/" />
<outline xmlUrl="https://www.rossmanngroup.com/feed/" title="Rossmann Repair Group" text="Rossmann Repair Group" type="rss" htmlUrl="https://rossmanngroup.com" />
<outline text="Google Online Security Blog" type="rss" htmlUrl="http://security.googleblog.com/" xmlUrl="https://security.googleblog.com/feeds/posts/default?alt=rss" title="Google Online Security Blog" />
https://raw.githubusercontent.com/EnergizedProtection/block/master/unified/formats/hosts.txt
https://raw.githubusercontent.com/hectorm/hmirror/master/data/adaway.org/list.txt
https://raw.githubusercontent.com/hectorm/hmirror/master/data/adblock-nocoin-list/list.txt
https://raw.githubusercontent.com/hectorm/hmirror/master/data/adguard-simplified/list.txt
https://raw.githubusercontent.com/hectorm/hmirror/master/data/anudeepnd-adservers/list.txt
https://raw.githubusercontent.com/hectorm/hmirror/master/data/anudeepnd-coinminer/list.txt
https://raw.githubusercontent.com/hectorm/hmirror/master/data/anudeepnd-facebook/list.txt
https://raw.githubusercontent.com/hectorm/hmirror/master/data/anudeepnd-facebook/list.txt
https://raw.githubusercontent.com/hectorm/hmirror/master/data/blocklist.kowabit.de/list.txt
https://raw.githubusercontent.com/hectorm/hmirror/master/data/disconnect.me-ad/list.txt
@sathwikv143
sathwikv143 / pyAes.py
Last active April 5, 2019 09:16
File Encryption and Decryption with python
#!/usr/bin/python3
# pyAesCrypt script
import argparse
import getpass
from sys import exit
from os.path import isfile
import pyAesCrypt
maxPassLen = 1024 # maximum password length (number of chars)
WEP Protocol
>> iwconfig -> to see the wifi interface
>> airmon-ng -> to see the wifi drivers/drivers
>> airmon-ng start <wifi interface>
-> to make the airmon-ng monitor the wifi
-> it also shows the disturbances: kill it with >>kill (pid)
>> airodump-ng <MM IFace>
-> check for the victim wifi
-> after getting victim ctrl+c
# Banner grabbing with NETCAT
nc <ip> <OpenPort> ⏎ HTTP/1.1 200 --> basic grab
nc <ip> <OpenPort> ⏎ auto grab other then web port
# port scanning
nc -v -w 1 <ip> -z <port range>
"-w 1" ---> netcat to wait for 1sec for each port
@sathwikv143
sathwikv143 / PMKID
Created September 17, 2018 01:35
New Wifi Attack
1.wifi to mon mode
2.select target BSSID
>> write into <filterFileName>
3.hcxdumptool -o <CaptureHashFileName> -i wlan0mon --filterlist=<filterFileName> --filtermode=2 --enable_status
>> capture till you see PMKID packet
>> once found, PMKID stop the process
4.hcxpcaptool -z <HashToCrackFileName> <CaptureHashFileName>