diff --git a/README.md b/README.md index af283dd..b9b7808 100644 --- a/README.md +++ b/README.md @@ -10,21 +10,31 @@ This repository contains self-made and common scripts for information gathering, - [autorecon.py](https://github.com/Tib3rius/AutoRecon) - subdomainFuzz.sh: Fuzzes subdomains for a given domain -### Enumeration: Privilege Escalation +### Enumeration: Privilege Escalation & Pivoting - [LinEnum.sh](https://github.com/rebootuser/LinEnum) - [linpeas.sh](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite) - lse.sh - unix-privesc-check.sh - [uptux.py](https://github.com/initstring/uptux) - [pspy64](https://github.com/DominicBreuker/pspy) +- portscan.py: small python script, which scans open TCP ports natively with multithread support. +Can be deployed on victim machines to scan the intranet. +- pingscan.py: small python script, which can detect internal hosts via ping probes natively. +Can be deployed on victim machines to scan the intranet. +- [deepce.sh](https://github.com/stealthcopter/deepce): Docker Privilege Escalation (e.g. exposed socket) ### Reverse Shell: Payloads - genRevShell.py: Generates a reverse shell command (e.g. netcat, python, ...) - [php-reverse-shell.php](https://github.com/pentestmonkey/php-reverse-shell) - [p0wny-shell.php](https://github.com/flozz/p0wny-shell) - [powercat.ps1](https://github.com/besimorhino/powercat) +- [aspx-reverse-shell.aspx](https://github.com/borjmz/aspx-reverse-shell) ### Miscellaneous - upload_file.py: Starts a local tcp server, for netcat usage - xss_handler.py: Starts a local http server and generates xss payload to steal cookies - [padBuster.pl](https://github.com/AonCyberLabs/PadBuster) +- sql.php: Execute sql queries passed via GET/POST +- util.py: Collection of some small functions + +### Windows