- nmap2excel.py - nmap to excel converter (gnmap to .xls). Currently supports gnmap format. Takes the output of a Greppable NMAP scan results, filtered on OPEN ports per IP/Node, and then populates an excel spreadsheet with the findings. Incorporating Styles Headings and Sheets where required.
- SimpleServer.py/SimpleClient.py - simple TCP Server and associated TCP Client.
- server2shell.py/client2shell.py - native server/client python reverse shell implementation
- ip2binary.py - ip address to binary notation converter.
- port2scan.py - quick and dirty tcp active port scanner
- url2scraper.py - urlscraper. Simple scraper to listout all HREF's within a choosen domain.
- ftp2brute.py - ftp brute forcer. Simple ftp brute force utility.
- ascii2hex.py - ascii string to hex converter.
- csrf2html.py - csrf to html generator. This allows input of a poc http GET/POST request as input with the resulting output being a poc html payload.
- atbash2decrypt - This script takes an 'atbash cipher' encrypted base64 string, whose output is original clear text
- weather.py - Pulls stats from Open Weather Map
- text2convert.py - Converts plaintext input to Dec, Octal, Binary, Hex output
- ping2sweep.py - Performs a PING sweep given an IP Range
- crackitycrack.sh - Bash Shell MD5 cracker
- hexBytes - Produces a list of all hex characters, in hex format
- raw2hex - Takes raw hex e.g. aabbcc and outputs in curated format e.g. \xaa\xbb\xcc
Download available at the following location: nmap2excel
nmap2excel.py -i file -o file -t [output input file contents to terminal]
-i .gnmap format file
-o filename of your chosen output file (appends .xls)
-t terminal output
Download available at the following location: SimpleServer
SimpleServer.py <host> <port>
host - chosen server IP address
port - chosen listening port
Download available at the following location: SimpleClient
SimpleClient.py <host> <port>
host - server IP address to connect to
port - server port to connect to
Download available at the following location: Server2Shell
server2shell.py -t <bind address> -p <bind port>
<bind address> - server IP address to bind to, in order to allow a client to connect
<bind port> - server port to bind to, in order to allow a client to connect
Download available at the following location: Client2Shell
client2shell.py -t <target host> -p <target port>
<target address> - server IP address to connect to
<target port> - server port to connect to
Download available at the following location: ip2binary
ip2binary.py <ip_address to be converted>
ip2binary.exe <ip_address to be converted>
<ip_address to be converted> - Requires a valid IP address in dot notation e.g. 1.1.1.1
Download available at the following location: port2scan
port2scan.py <host> [<ports seperated by spaces>]
port2scan.py www.google.com 21 22 80
Download available at the following location: url2scraper
url2scraper.py -i <host file> -o <output file> -t <pipes output to terminal>
NOTE: -o and -t: Optional
url2scraper.py -i hosts.txt -o somefile.txt -t
Download available at the following location: ftp2brute
pip install -r requirements.txt
ftp2brute.py <host> <user> <wordlist>
Default port in use 'tcp/21'
ftp2brute.py 192.168.1.1 root wordlist.txt
Download available at the following location: ascii2hex
ascii2hex.py -x '<string>'
ascii2hex.py -a "Glyph"
Download available at the following location: csrf2html
csrf2html.py '<POC Request Filename>'
csrf2html.py poc.txt
Download available at the following location: atbash2decrypt
atbash2decrypt.py '<base64 encrypted text>'
atbash2decrypt.py "FTV1MCxdxnJ="
Download available at the following location: weather
weather.py
weather.py
Download available at the following location: text2convert
text2convert.py -[dobx] "<string to convert>"
Example 1: [+] text2convert.py -d "string to convert"
Example 2: [+] text2convert.py -do "string to convert"
Example 3: [+] text2convert.py -dob "string to convert"
Example 4: [+] text2convert.py -dobx "string to convert"
Download available at the following location: ping2sweep
ping2sweep <IPAddress Range> [-o] <optional output file>
ping2sweep 192.168.1.0/24 -o sweep.txt
+-------------------+
| 'ping2sweep.py' |
| Author: ⅁lyph |
+-------------------+
[+] Sweeping host(s) 192.168.1.0/24 ...
[-] Host: 192.168.1.0 unreachable
[+] Host: 192.168.1.1 reachable
Download shell script and run accordingly
crackitycrack.sh <hash> <wordlist>
./crackitycrack.sh 26323c16d5f4dabff3bb136f2460a943 wordlist.txt
Trying: qazwsx
+
| Cracked Hash: 26323c16d5f4dabff3bb136f2460a943
| Cleartext : onceuponatime
+
Just run the script
./hexBytes.py
badchars=
("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f")
("\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f")
("\x20\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f")
("\x30\x31\x32\x33\x34\x35\x36\x37\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f")
("\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f")
("\x50\x51\x52\x53\x54\x55\x56\x57\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f")
("\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f")
("\x70\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f")
("\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f")
("\x90\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f")
("\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8\xa9\xaa\xab\xac\xad\xae\xaf")
("\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf")
("\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf")
("\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf")
("\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8\xe9\xea\xeb\xec\xed\xee\xef")
("\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff")
Download available at the following location: raw2hex
./raw2hex.py aabbcc
[+] Converted: \xaa\xbb\xcc