Some scripts used to solve ctf challenges.
Useful against subdomain wild card. You just need to exclude the status code (-x) or the content length (-xL) to avoid seeing default page.
Usage: ./subbrute.sh -d DOMAIN -D DICTIONARY -o OUTFILE -xL 1234
Extract a regex matching group with sed.
The default is the first matching group:
$ echo test123abc | ./msed test(.*)abc
123
For multiple matching group use:
$ echo test123abc456def | ./msed "test(.*)abc(.*)def" 2
456
Generate payload to exploit EternalBlue in x86 by default. Add the option -x64
to have the 64 bits version.
Usage: ./autoblue.sh -lhost YOUR_IP -lport LISTENING_PORT
Run a full tcp ports scan with nmap and then a detailed scan on all the open ports.
Usage: ./nmap-ng TARGET_IP
Convert a web shell into an interactive shell (almost).
First, edit the function send_payload and build_payload.
Usage: ./web2shell.sh -u TARGET_URL [-i | --interactive]
JWT cli tool to encode or decode JSON Web Tokens.
Usage: ./simple_jwt.py [encode --secret SECRET --alg ALG [--headers HEADERS] DATA | decode [--secret SECRET] TOKEN]