README.md

This commit is contained in:
Roman Hergenreder 2020-09-16 17:27:58 +02:00
parent 60d07a86d3
commit b426cfc958

@ -10,21 +10,31 @@ This repository contains self-made and common scripts for information gathering,
- [autorecon.py](https://github.com/Tib3rius/AutoRecon) - [autorecon.py](https://github.com/Tib3rius/AutoRecon)
- subdomainFuzz.sh: Fuzzes subdomains for a given domain - subdomainFuzz.sh: Fuzzes subdomains for a given domain
### Enumeration: Privilege Escalation ### Enumeration: Privilege Escalation & Pivoting
- [LinEnum.sh](https://github.com/rebootuser/LinEnum) - [LinEnum.sh](https://github.com/rebootuser/LinEnum)
- [linpeas.sh](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite) - [linpeas.sh](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite)
- lse.sh - lse.sh
- unix-privesc-check.sh - unix-privesc-check.sh
- [uptux.py](https://github.com/initstring/uptux) - [uptux.py](https://github.com/initstring/uptux)
- [pspy64](https://github.com/DominicBreuker/pspy) - [pspy64](https://github.com/DominicBreuker/pspy)
- portscan.py: small python script, which scans open TCP ports natively with multithread support.
Can be deployed on victim machines to scan the intranet.
- pingscan.py: small python script, which can detect internal hosts via ping probes natively.
Can be deployed on victim machines to scan the intranet.
- [deepce.sh](https://github.com/stealthcopter/deepce): Docker Privilege Escalation (e.g. exposed socket)
### Reverse Shell: Payloads ### Reverse Shell: Payloads
- genRevShell.py: Generates a reverse shell command (e.g. netcat, python, ...) - genRevShell.py: Generates a reverse shell command (e.g. netcat, python, ...)
- [php-reverse-shell.php](https://github.com/pentestmonkey/php-reverse-shell) - [php-reverse-shell.php](https://github.com/pentestmonkey/php-reverse-shell)
- [p0wny-shell.php](https://github.com/flozz/p0wny-shell) - [p0wny-shell.php](https://github.com/flozz/p0wny-shell)
- [powercat.ps1](https://github.com/besimorhino/powercat) - [powercat.ps1](https://github.com/besimorhino/powercat)
- [aspx-reverse-shell.aspx](https://github.com/borjmz/aspx-reverse-shell)
### Miscellaneous ### Miscellaneous
- upload_file.py: Starts a local tcp server, for netcat usage - upload_file.py: Starts a local tcp server, for netcat usage
- xss_handler.py: Starts a local http server and generates xss payload to steal cookies - xss_handler.py: Starts a local http server and generates xss payload to steal cookies
- [padBuster.pl](https://github.com/AonCyberLabs/PadBuster) - [padBuster.pl](https://github.com/AonCyberLabs/PadBuster)
- sql.php: Execute sql queries passed via GET/POST
- util.py: Collection of some small functions
### Windows