Skip to content

Instantly share code, notes, and snippets.

View yosignals's full-sized avatar

John Carroll yosignals

View GitHub Profile
@yosignals
yosignals / FileFolding2.py
Created May 7, 2024 11:25
File Folding with folders and files and extension preferences
import os
import argparse
import hashlib
import json
from itertools import islice
def file_to_hex(filename):
"""Convert file content to a hex string."""
with open(filename, 'rb') as file:
content = file.read()
@yosignals
yosignals / Recruiter.sh
Created May 5, 2024 11:48
DataBouncing.io - Example 1 - The Recruiter.sh
#!/bin/bash
# A hunter script from John & Dave's Data- Bouncing project https://thecontractor.io/data-bouncing/
# This script will find candidates for smuggling data / coms / whatever starting as HTTP/S requests to domains, ending up in your DNS reciever to be rebuilt/read whatever
# dont forget to add your own OOB server, that could be interactsh or collaborator, or something esle, if you dont know what you're doing, go read the posts :)
# have fun, dont be a dick.
# Pre-flight check to verify and install necessary utilities
for utility in curl parallel bc; do
if ! command -v $utility &> /dev/null; then
@yosignals
yosignals / Folding.py
Created April 15, 2024 14:09
Hiding Files in Folders ... names
import os
import argparse
import hashlib
def file_to_hex(filename):
"""Convert file content to a hex string."""
with open(filename, 'rb') as file:
content = file.read()
return content.hex(), content
@yosignals
yosignals / Surgeon.sh
Last active March 31, 2024 14:44
Surgeon | DataBouncing Script for specific web requests, POST, GET, PUT, Whatever, where ever the hostname exists that get's processed
#!/bin/bash
# Function to check if a command exists
command_exists() {
type "$1" &> /dev/null
}
# Preflight check for necessary commands (curl and sed)
if ! command_exists curl; then
echo "Error: curl is not installed. Please install curl and try again."
@yosignals
yosignals / Recruiter.http3.sh
Created October 16, 2023 08:32
Recruiter.http3.sh
#!/bin/bash
# Pain in the ass to set up, need rust, cargo for quiche-client
# Define the path to the text file containing the list of target domains
domain_list_file="domains.txt"
# Define an array of headers
headers=(
"X-Forwarded-For: xff.OOB_LISTENER.com"
"X-Wap-Profile: wafp.OOB_LISTENER.com"
"CF-Connecting_IP: cfcon.OOB_LISTENER.com"
@yosignals
yosignals / Dentist.sh
Last active October 12, 2023 20:53
Dentist.sh - This script extracts what you want from your Nucleish json save, use this after you've ran Recruiter against your target domain.txt - https://thecontractor.io/data-bouncing/
#!/bin/bash
# Dependency check
if ! command -v jq &> /dev/null; then
echo "jq is not installed. Would you like to install it? (y/n)"
read -r answer
if [[ $answer == "y" || $answer == "Y" ]]; then
sudo apt-get install jq
else
echo "jq is required for this script to run."
@yosignals
yosignals / HeadHunterv2.sh
Last active October 14, 2023 17:21
HeadHunterv2.sh
#!/bin/bash
# A hunter script from John & Dave's Data- Bouncing project https://thecontractor.io/data-bouncing/
# This script will find candidates for smuggling data / coms / whatever starting as HTTP/S requests to domains, ending up in your DNS reciever to be rebuilt/read whatever
# dont forget to add your own OOB server, that could be interactsh or collaborator, or something esle, if you dont know what you're doing, go read the posts :)
# have fun, dont be a dick.
# Pre-flight check to verify and install necessary utilities
for utility in curl parallel bc; do
if ! command -v $utility &> /dev/null; then
import argparse
import hashlib
import os
import base64
import random
import requests
import uuid
from cryptography.fernet import Fernet
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
@yosignals
yosignals / HeadHunter.sh
Created September 20, 2023 08:47
Head(er) Hunter script - part of the Data-Bouncing post
#!/bin/bash
# Pre-flight check to verify and install necessary utilities
for utility in curl parallel bc; do
if ! command -v $utility &> /dev/null; then
read -p "$utility is not installed. Would you like to install it? (y/N) " yn
case $yn in
[Yy]* )
if [[ $EUID -ne 0 ]]; then
echo "Please run this script as root or use sudo to install $utility."
@yosignals
yosignals / grabby.py
Created September 9, 2023 15:28
feed IPs to DeHashed API
import requests
import csv
api_endpoint = 'https://api.dehashed.com/search?query={}'
credentials = ('you@address.com', 'APIKEY')
headers = {'Accept': 'application/json'}
# Step 1: Read the IP addresses from a text file
with open('ip_addresses.txt', 'r') as file:
ip_addresses = [line.strip() for line in file]