Resolve domains into IP address:
while read l; do ip=$(dig +short $l | grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b"|head -1);echo "[+] '$l' => $ip";echo $ip >> ips.txt;done < domains.txt
#cybersecuritytips #bugbounty
while read l; do ip=$(dig +short $l | grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b"|head -1);echo "[+] '$l' => $ip";echo $ip >> ips.txt;done < domains.txt
#cybersecuritytips #bugbounty
PowerShell cmdlets for ProxyShell
Here is a list of PowerShell cmdlets you can use with ProxyShell.
Don't focus exclusively on "New-ManagementRoleAssignment" or "New-MailExportRequest".
https://gist.github.com/dmaasland/38bb8fbd05c764bab1baa441b4416317
#proxyshell #cmdlets
Here is a list of PowerShell cmdlets you can use with ProxyShell.
Don't focus exclusively on "New-ManagementRoleAssignment" or "New-MailExportRequest".
https://gist.github.com/dmaasland/38bb8fbd05c764bab1baa441b4416317
#proxyshell #cmdlets
Gist
proxyshell-cmdlets
GitHub Gist: instantly share code, notes, and snippets.
Search Subdomains using Jldc
#bugbounty #bugbountytips
curl -s "jldc.me/anubis/subdomains/example.com" | grep -Po '(?<=")[\w*.-]*(?=")'
#bugbounty #bugbountytips
Search JS using Gau
gau -subs DOMAIN |grep -iE '\.js'|grep -iEv '(\.jsp|\.json)' >> js.txt
#bugbounty #bugbountytipsTIGMINT - OSINT GUI software framework
https://github.com/TIGMINT/TIGMINT
#social #media #Intelligence #OSINT #TwitterAnalyser
https://github.com/TIGMINT/TIGMINT
#social #media #Intelligence #OSINT #TwitterAnalyser
GitHub
GitHub - TIGMINT/TIGMINT: TIGMINT: OSINT (Open Source Intelligence) GUI software framework
TIGMINT: OSINT (Open Source Intelligence) GUI software framework - TIGMINT/TIGMINT
Red Team Infrastructure Wiki
Wiki to collect Red Team infrastructure hardening resources
This wiki is intended to provide a resource for setting up a resilient Red Team infrastructure. It was made to complement Steve Borosh and Jeff Dimmock's BSides NoVa 2017 talk "Doomsday Preppers: Fortifying Your Red Team Infrastructure"
https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
#collection #redteam
Wiki to collect Red Team infrastructure hardening resources
This wiki is intended to provide a resource for setting up a resilient Red Team infrastructure. It was made to complement Steve Borosh and Jeff Dimmock's BSides NoVa 2017 talk "Doomsday Preppers: Fortifying Your Red Team Infrastructure"
https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
#collection #redteam
GitHub
GitHub - bluscreenofjeff/Red-Team-Infrastructure-Wiki: Wiki to collect Red Team infrastructure hardening resources
Wiki to collect Red Team infrastructure hardening resources - bluscreenofjeff/Red-Team-Infrastructure-Wiki
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
https://res.mdpi.com/d_attachment/jcp/jcp-01-00021/article_deploy/jcp-01-00021.pdf
https://res.mdpi.com/d_attachment/jcp/jcp-01-00021/article_deploy/jcp-01-00021.pdf
WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSMan/WinRM (5985/tcp) to capture NetNTLMv2 hashes.
Responder
https://github.com/KoreLogicSecurity/wmkick
Responder
https://github.com/KoreLogicSecurity/wmkick
GitHub
GitHub - KoreLogicSecurity/wmkick: WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows…
WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSMan/WinRM (5985/tcp) to capture NetNTLMv2 hashes. - KoreLogic...