Skip to content

InfosecMatter/Scripts

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Scripts

firebird-bruteforce.sh

# Usage:
firebird-bruteforce.sh <IP> <username> <wordlist.txt>

# Example:
firebird-bruteforce.sh 10.1.10.101 SYSDBA pwdlist.txt

More information here: https://www.infosecmatter.com/firebird-database-exploitation/


yanp.sh

Yet Another Nessus Parser.

It will take every Nessus CSV report found in the current working directory and it will parse out the following information from each CSV report:

  • List of found IP addresses
  • List of resolved hostnames and corresponding IP addresses
  • List of open TCP and UDP ports
  • List of URLs (http and https)
  • List of vulnerabilities and for every vulnerability:
    • List of affected IP addresses
    • List of CVEs

In the end it will also consolidate everything and produce results from all the Nessus reports.

# Usage:
cd /directory/with/nessus/results
yanp.sh

More information here: https://www.infosecmatter.com/nessus-csv-parser-and-extractor/


portsweep.ps1

A simple port sweeper, which scans list of hosts for an open port.

It retains results in a file in the current working directory, so it can be interrupted and resumed (it will not scan already scanned hosts again).

Import-Module .\portsweep.ps1

# Usage:
portsweep <list.txt> <port>

# Example:
portsweep ips.txt 445

# Check results (find open ports):
gc portsweep.*.txt | select-string True
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy