Skip to content

Latest commit

 

History

History
273 lines (169 loc) · 8.78 KB

README.md

File metadata and controls

273 lines (169 loc) · 8.78 KB

This repo contains various scripts including:

  • nmap2excel.py - nmap to excel converter (gnmap to .xls). Currently supports gnmap format. Takes the output of a Greppable NMAP scan results, filtered on OPEN ports per IP/Node, and then populates an excel spreadsheet with the findings. Incorporating Styles Headings and Sheets where required.
  • SimpleServer.py/SimpleClient.py - simple TCP Server and associated TCP Client.
  • server2shell.py/client2shell.py - native server/client python reverse shell implementation
  • ip2binary.py - ip address to binary notation converter.
  • port2scan.py - quick and dirty tcp active port scanner
  • url2scraper.py - urlscraper. Simple scraper to listout all HREF's within a choosen domain.
  • ftp2brute.py - ftp brute forcer. Simple ftp brute force utility.
  • ascii2hex.py - ascii string to hex converter.
  • csrf2html.py - csrf to html generator. This allows input of a poc http GET/POST request as input with the resulting output being a poc html payload.
  • atbash2decrypt - This script takes an 'atbash cipher' encrypted base64 string, whose output is original clear text
  • weather.py - Pulls stats from Open Weather Map
  • text2convert.py - Converts plaintext input to Dec, Octal, Binary, Hex output
  • ping2sweep.py - Performs a PING sweep given an IP Range
  • crackitycrack.sh - Bash Shell MD5 cracker
  • hexBytes - Produces a list of all hex characters, in hex format
  • raw2hex - Takes raw hex e.g. aabbcc and outputs in curated format e.g. \xaa\xbb\xcc

Installation - nmap2excel.py

Download available at the following location: nmap2excel

Usage

nmap2excel.py -i file -o file -t [output input file contents to terminal]
-i .gnmap format file
-o filename of your chosen output file (appends .xls)
-t terminal output

Installation - SimpleServer.py

Download available at the following location: SimpleServer

Usage

SimpleServer.py <host> <port>
host - chosen server IP address
port - chosen listening port

Installation - SimpleClient.py

Download available at the following location: SimpleClient

Usage

SimpleClient.py <host> <port>
host - server IP address to connect to
port - server port to connect to

Installation - server2shell.py

Download available at the following location: Server2Shell

Usage

server2shell.py -t <bind address> -p <bind port>
<bind address> - server IP address to bind to, in order to allow a client to connect
<bind port> - server port to bind to, in order to allow a client to connect

Installation - client2shell.py

Download available at the following location: Client2Shell

Usage

client2shell.py -t <target host> -p <target port>
<target address> - server IP address to connect to
<target port> - server port to connect to

Installation - ip2binary.py

Download available at the following location: ip2binary

Usage

ip2binary.py <ip_address to be converted>
ip2binary.exe <ip_address to be converted>
<ip_address to be converted> - Requires a valid IP address in dot notation e.g. 1.1.1.1

Installation - port2scan.py

Download available at the following location: port2scan

Usage

port2scan.py <host> [<ports seperated by spaces>]

Example

port2scan.py www.google.com 21 22 80

Installation - url2scraper.py

Download available at the following location: url2scraper

Usage

url2scraper.py -i <host file> -o <output file> -t <pipes output to terminal>
NOTE: -o and -t: Optional

Example

url2scraper.py -i hosts.txt -o somefile.txt -t

Installation - ftp2brute.py

Download available at the following location: ftp2brute

pip install -r requirements.txt

Usage

ftp2brute.py <host> <user> <wordlist>
Default port in use 'tcp/21'

Example

ftp2brute.py 192.168.1.1 root wordlist.txt

Installation - ascii2hex.py

Download available at the following location: ascii2hex

Usage

ascii2hex.py -x '<string>'

Example

ascii2hex.py -a "Glyph"

Installation - csrf2html.py

Download available at the following location: csrf2html

Usage

csrf2html.py '<POC Request Filename>'

Example

csrf2html.py poc.txt

Installation - atbash2decrypt.py

Download available at the following location: atbash2decrypt

Usage

atbash2decrypt.py '<base64 encrypted text>'

Example

atbash2decrypt.py "FTV1MCxdxnJ="

Installation - weather.py

Download available at the following location: weather

Usage

weather.py

Example

weather.py

Installation - text2convert.py

Download available at the following location: text2convert

Usage

text2convert.py -[dobx] "<string to convert>"

Example

Example 1: [+] text2convert.py -d "string to convert"
Example 2: [+] text2convert.py -do "string to convert"
Example 3: [+] text2convert.py -dob "string to convert"
Example 4: [+] text2convert.py -dobx "string to convert"

Installation - ping2sweep.py

Download available at the following location: ping2sweep

Usage

ping2sweep <IPAddress Range> [-o] <optional output file> 

Example

ping2sweep 192.168.1.0/24 -o sweep.txt

Output Format

    +-------------------+
    | 'ping2sweep.py'   |
    | Author: ⅁lyph     |
    +-------------------+
    [+] Sweeping host(s) 192.168.1.0/24 ...
    [-] Host: 192.168.1.0 unreachable
    [+] Host: 192.168.1.1 reachable

Installation - crackitycrack.sh

Download shell script and run accordingly

Usage

crackitycrack.sh <hash> <wordlist>

Example

./crackitycrack.sh 26323c16d5f4dabff3bb136f2460a943 wordlist.txt

Output Format

Trying:  qazwsx
+
| Cracked Hash:  26323c16d5f4dabff3bb136f2460a943
| Cleartext   :  onceuponatime
+

Installation - hexBytes.py

Just run the script

Example

./hexBytes.py

Output Format

badchars=
("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f")
("\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f")
("\x20\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f")
("\x30\x31\x32\x33\x34\x35\x36\x37\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f")
("\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f")
("\x50\x51\x52\x53\x54\x55\x56\x57\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f")
("\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f")
("\x70\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f")
("\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f")
("\x90\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f")
("\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8\xa9\xaa\xab\xac\xad\xae\xaf")
("\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf")
("\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf")
("\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf")
("\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8\xe9\xea\xeb\xec\xed\xee\xef")
("\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff")

Installation - raw2hex.py

Download available at the following location: raw2hex

Usage

./raw2hex.py aabbcc

Output Format

[+] Converted: \xaa\xbb\xcc

Follow me on

Mastodon Linkedin Youtube