Thanks to visit codestin.com
Credit goes to github.com

Skip to content

kroko23/Scripts

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Scripts

firebird-bruteforce.sh

# Usage:
firebird-bruteforce.sh <IP> <username> <wordlist.txt>

# Example:
firebird-bruteforce.sh 10.1.10.101 SYSDBA pwdlist.txt

More information here: https://www.infosecmatter.com/firebird-database-exploitation/


yanp.sh

Yet Another Nessus Parser.

It will take every Nessus CSV report found in the current working directory and it will parse out the following information from each CSV report:

  • List of found IP addresses
  • List of resolved hostnames and corresponding IP addresses
  • List of open TCP and UDP ports
  • List of URLs (http and https)
  • List of vulnerabilities and for every vulnerability:
    • List of affected IP addresses
    • List of CVEs

In the end it will also consolidate everything and produce results from all the Nessus reports.

# Usage:
cd /directory/with/nessus/results
yanp.sh

More information here: https://www.infosecmatter.com/nessus-csv-parser-and-extractor/


portsweep.ps1

A simple port sweeper, which scans list of hosts for an open port.

It retains results in a file in the current working directory, so it can be interrupted and resumed (it will not scan already scanned hosts again).

Import-Module .\portsweep.ps1

# Usage:
portsweep <list.txt> <port>

# Example:
portsweep ips.txt 445

# Check results (find open ports):
gc portsweep.*.txt | select-string True

adlogin.ps1

A simple Active Directory login attack tool. It takes list of usernames and a password and tries to login with it against specified AD domain using LDAP (directoryservices).

It retains results in a file in the current working directory, so it can be interrupted and resumed (it will not try to login again if the given user has already been compromised or tried with the given password).

Import-Module .\adlogin.ps1

# Usage:
adlogin <userlist.txt> <domain> <password>

# Example:
adlogin users.txt domain.com P@ssw0rd

# Check results (find valid credentials):
gc adlogin.*.txt | sls True

About

Various scripts and codes

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 83.9%
  • PowerShell 16.1%