Skip to content

Instantly share code, notes, and snippets.

View scumdestroy's full-sized avatar
⛓️
Blood of heroes is closer to the Lord than ink of scholars or prayers of pious.

Jann Moon scumdestroy

⛓️
Blood of heroes is closer to the Lord than ink of scholars or prayers of pious.
View GitHub Profile
# 🌙 MADE WITH ❤️️ BY SCUMDESTROY 🌙 #
above
access
accessCount
accessDate
account
acked
action
@scumdestroy
scumdestroy / update-all-go-repos.sh
Created October 21, 2020 03:14
update all Go repos in one command
#!/bin/sh
#save this line as "gitpullall" and you can use it in any folder to update all repos within it
alias gitpullall="find . -maxdepth 1 -type d -print -execdir git --git-dir={}/.git --work-tree=$PWD/{} pull origin master \;"
#or here ya go
#echo "alias gitpullall='find . -maxdepth 1 -type d -print -execdir git --git-dir={}/.git --work-tree=$PWD/{} pull origin master \;' >> ~/.bash_aliases"
#then make sure you run this in '~/go/src/github.com'
cd ~/go/src/github.com
find ./ -type d | cut -d '/' -f 1,2,3 | sort -u > repolist.txt
encrypted = "encrypted-string-here"
for i in range(0,255):
print("".join([chr(ord(e) ^ i) for e in encrypted]))
@scumdestroy
scumdestroy / api-spending-loud-night-wordlist.txt
Created October 30, 2020 10:21
My API wordlist made from the trampled carapaces of all api wordlists that have had the misfortune of crossing my path.
!
!=
#
&&
..;/
..;/..;/
;
;/
;/..;/
=
@scumdestroy
scumdestroy / ruby-on-rails-overdose.txt
Created November 4, 2020 04:58
Fairly large Ruby On Rails directory fuzzing wordlist I made 17 rails wordlists I found online, using Python's NLP modules to pull words from OWASP Rails guide, the official Rails Security guide and using cewl on multiple rails attack pages.
This file has been truncated, but you can view the full file.
0.3.0
0mq
0mq-0.5.3
0xdm5
0xffffff
0xffffff-0.1.0
--1
10io-jekyll
10to1-crack
_-1.2
@scumdestroy
scumdestroy / SPN-most-common.txt
Created November 5, 2020 20:42
Quick enumeration/recon list for bad daddy red teamers and flag-grabbers that like to use impacket or maybe even the Powershell standard AD module.
a
access
account
accounts
AcronisAgent
ACS
Active
ActiveDirectory
ADAM
added
@scumdestroy
scumdestroy / httprobex.sh
Last active February 11, 2021 14:02
httprobex
#!/bin/sh
httprobe -p http:81 -p https:8443 -p http:8000 -p http:8001 -p http:8080 -p http:8181 -p http:50070 -p http:9200 -p http:2181 -p http:8083 -p http:9090 -p http:8081 -p http:8090 -t 40000
#!/bin/sh
httpx -vhost -sc -td -ip -cname -asn -cdn -t 169 -rl 250 -tls-probe -csp-probe -tls-grab -pipeline -http2 -vhost -websocket -web-server -title -location -follow-host-redirects -cl -ct -cdn -ports 80,8080,443,8443,8008,9200,9300,8090,8081,8180 -http2 -r /root/resolvers/resolvers.txt -random-agent -fr | tee httpx-heavy
cat httpx-heavy | awk '{print $NF}' | sed 's/\[//g' | sed 's/\]//g'| sort -u > httpx-ips
cat httpx-heavy | grep 200 | awk '{print $1}' > httpx-200s
cat httpx-heavy | grep 403 | awk '{print $1}' > httpx-403s
cat httpx-heavy | grep 401 | awk '{print $1}' | tee -a httpx-403s
grep -E -o '(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)' httpx-heavy > httpx-ips-new
#!/bin/sh
echo $1 | waybackurls > wayback-results
cat wayback-results | grep "\.conf" | tee $1-poorGF
cat wayback-results | grep "\.xml" | tee -a $1-poorGF
cat wayback-results | grep "\.db" | tee -a $1-poorGF
cat wayback-results | grep "\.log" | tee -a $1-poorGF
cat wayback-results | grep "config" | tee -a $1-poorGF
cat wayback-results | grep "env" | tee -a $1-poorGF
#!/bin/sh
curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/bugcrowd_data.json | jq -r '.[].targets.in_scope[] | [.target, .type] | @tsv' | grep '^*' | awk '{print $1}' | sed 's/^\*\.//g'| tee bugcrowd-wildcards
curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/federacy_data.json | jq -r '.[].targets.in_scope[] | [.target, .type] | @tsv'| grep '^*' | awk '{print $1}' | sed 's/^\*\.//g'| tee federacy-wildcards
curl -sL https://github.com/arkadiyt/bounty-targets-data/blob/master/data/hackerone_data.json?raw=true | jq -r '.[].targets.in_scope[] | [.asset_identifier, .asset_type] | @tsv' | grep '^*' | awk '{print $1}' | sed 's/^\*\.//g'| tee h1-wildcards
curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/intigriti_data.json | jq -r '.[].targets.in_scope[] | [.endpoint, .type] | @tsv' grep '^*' | awk '{print $1}' | sed 's/^\*\.//g'| tee intigriti-wildcards