Skip to content

Instantly share code, notes, and snippets.

@vijay922
vijay922 / domain2ip.py
Last active January 24, 2019 09:26
Domain 2 IP in Python
#!/bin/python
import os
import sys
import datetime
import os.path
if len(sys.argv)!=3:
print "This script takes two file \n 1. InputFile with hostnames \n 2. OutputFilename \n\n Example: python domain_2_ip.py [INPUT_FILE_NAME] [OUTPUT_FILE_NAME]"
else:
if os.path.exists(sys.argv[1]):
@vijay922
vijay922 / domain2ip.sh
Created January 24, 2019 09:29
Domain 2 IP in Bash
#!/bin/bash
# Usage: ./domain2ip.sh [domain-list-file] [output-file]
echo -e "[+] domain2ip.sh by @vijay922\n"
if [ -z "$1" ] || [ -z "$2" ]; then
echo "[!] Usage: ./domain2ip.sh [domain-list-file] [output-file]"
exit 1
fi
echo "[+] Resolving domains to IPs..."
while read d || [[ -n $d ]]; do
#!/bin/bash
# knocker.sh v0.1
# last edit 11-03-2016 13:30
#
#
# VARIABLES
########################################################################
VERS=$(sed -n 2p $0 | awk '{print $3}' | sed 's/v//')
TMPFILE=/root/ports_knocker.tmp
rm -rf $TMPFILE
@vijay922
vijay922 / install_go.sh
Created May 6, 2019 12:40 — forked from haccer/install_go.sh
Bash script to install the latest version of Go (For linux)
#!/bin/bash
# Bash script to install the latest version of Go (For linux)
# Get current version of Go for 64-bit Linux
CUR=$(curl -s https://golang.org/dl/ | grep linux-amd64 | grep 'download downloadBox' | cut -d'"' -f4)
# Download Go
wget $CUR
# Get filename
@vijay922
vijay922 / scanio.sh
Created May 6, 2019 12:40 — forked from haccer/scanio.sh
PoC script to mass-locate vulnerable subdomains using results from Rapid7's Project Sonar
#!/bin/bash
# Usage : ./scanio.sh <save file>
# Example: ./scanio.sh cname_list.txt
# Premium
function ech() {
spinner=( "|" "/" "-" "\\" )
while true; do
for i in ${spinner[@]}; do
echo -ne "\r[$i] $1"
@vijay922
vijay922 / LFI.pl
Created May 22, 2019 05:11 — forked from Kaizen1337/LFI.pl
LocalFile
#!/usr/bin/perl
use HTTP::Request;
use LWP::UserAgent;
system("title The JavaHaxor Group");
system("color 1e");
system ("cls");
print " |=======================================================|\n";
print " |= _ ______ _____ =|\n";
print " |= | | | ____|_ _| =|\n";
_
..;/
@
0
00
01
02
03
04
05
#!/usr/bin/python
# -*- coding: UTF-8 -*-
import sys
version = sys.version_info
if version < (3, 0):
print('The current version is not supported, you need to use python3')
sys.exit()
import requests
import json,ast
from requests.packages.urllib3.exceptions import InsecureRequestWarning
[awvs_url_key]#Basic settings
awvs_url=https://192.168.73.128:13443/
api_key=1986ad8c0a5b3df4d7028d5f3c06e936c5d7211fb0ba444de82ed618e96251b54
#URL file to be scanned
domain_file=url.txt
[scan_seting]#Scan configuration
##Scan speed, from slow to fast: sequential slow moderate fast, the faster the speed, the more omissions, the opposite is true.
# m4ll0k - github.com/m4ll0k
import requests
import urllib3
import sys
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
injectable_headers = [
"Proxy-Host","Request-Uri","X-Forwarded","X-Forwarded-By","X-Forwarded-For",