The following content is generated using a preview release of Swimlane's pyattck.
This snippet of data is scoped to the following actor groups:
- APT33
 - APT34
 - APT39
 - Charming Kitten
 
| #!/bin/bash | |
| ##### | |
| # | |
| # St8out - Extra one-liner for reconnaissance | |
| # | |
| # Usage: ./st8out.sh target.com | |
| # | |
| # Resources: | |
| # - https://github.com/j3ssie/metabigor | 
The following content is generated using a preview release of Swimlane's pyattck.
This snippet of data is scoped to the following actor groups:
| import webbrowser | |
| areaCode = input("What is the area code of the phone number? ") | |
| middle3 = input("What are the middle 3 digits? ") | |
| last4 = input("What are the last 4 digits? ") | |
| phoneNumber = str(areaCode) + str(middle3) + str(last4) | |
| fourOneOne = "https://www.411.com/phone/" + "1-" + str(areaCode) + "-" + str(middle3) + "-" + str(last4) | |
| webbrowser.open(fourOneOne) | 
| site:*.Google.com inurl:'&' | |
| site:*.Youtube.com inurl:'&' | |
| site:*.Facebook.com inurl:'&' | |
| site:*.Baidu.com inurl:'&' | |
| site:*.Wikipedia.org inurl:'&' | |
| site:*.Yahoo.com inurl:'&' | |
| site:*.Google.co.in inurl:'&' | |
| site:*.Amazon.com inurl:'&' | |
| site:*.Qq.com inurl:'&' | |
| site:*.Google.co.jp inurl:'&' | 
This is "CTF" is more of a vulnerability sandbox than a true Capture the Flag challenge. However, it is a great way to explore some WebApp Upload vulnerabilities.
The VulnHub description says:
| #!/bin/bash | |
| aquatone-discover -d $1 --threads 10 | |
| aquatone-scan -d $1 --ports huge --threads 10 | |
| DEBUG=nightmare xvfb-run -a aquatone-gather -d $1 --threads 10 | |
| aquatone-takeover -d $1 --threads 10 | 
| echo "[*] Now Checking for Open S3 Buckets for listing dirs....[*]" | |
| aws s3 ls s3://$1 --acl public-read >/dev/null 2>/dev/null | |
| RESULT=$? | |
| if [ $RESULT -eq 0 ]; then | |
| echo "[*] Bucket has Dirlistings Enabled [*]" | |
| echo "[*] Bucket has Dirlistings Enabled https://$1.s3.amazonaws.com [*]" >> /home/tools/mass-bounty/s3-results/$1-dirlistings.txt | 
| echo "[*] Now Checking for Open S3 Buckets to upload POC to....[*]" | |
| aws s3 cp poc.txt s3://$1 --acl public-read >/dev/null 2>/dev/null | |
| RESULT=$? | |
| if [ $RESULT -eq 0 ]; then | |
| echo "[*] POC Uploaded to https://$1.s3.amazonaws.com/poc.txt [*]" | |
| echo "[*] POC Uploaded to https://$l.s3.amazonaws.com/poc.txt [*]" >> /home/tools/mass-bounty/s3-results/$1-uploads.txt | |
| else | 
| #!/bin/bash | |
| aws s3api create-bucket --bucket $1 --acl public-read --region us-east-1 | |
| aws s3api put-bucket-website --bucket $1 --website-configuration file://redirect.json |