/Pentest-Scripts

Scripts for Pentesting

Primary LanguageShell

Installing Transfile and Proxify (Proxify depends on Transfile)

# Clone the repo
git clone https://github.com/AdityaHebballe/Pentest-Scripts.git
cd Pentest-Scripts

# Move the scripts to the local bin directory
cp proxify.sh ~/kali/.local/bin/proxify
cp Transfile.sh ~/kali/.local/bin/Transfile.sh

# Make both scripts executable
chmod +x ~/kali/.local/bin/proxify ~/kali/.local/bin/Transfile.sh

Proxify.sh

image

Script designed to display all commands required to tunnel using chisel and ligolo and start a python server automatically in ligolo or chisel folder.

Usage

First modify the LIGOLO_DIR and CHISEL_DIR to the directory where you have the binaries. I have the defaults set to ~/Documents/ligolo and ~/Documents/chisel respectively. The folder structure looks like this:

├── Documents
   ├── chisel
        ├── chisel
        └── chisel.exe
   ├── ligolo
        ├── agent
        ├── agent.exe
        ├── ligolo-selfcerts
        │   ├── ligolo_cert
        │   └── ligolo_key
        └── proxy
./proxify.sh platform method
  • platform

    • l - linux
    • w - windows
  • method

    • c - chisel
    • l - ligolo

Example:

proxify.sh l c #for linux chisel proxy
proxify.sh w l #for windows ligolo proxy

Transfile.sh

image

Script designed to display commands required for linux and windows file transfer.

Usage

Transfile.sh <filename> <platform>

platform is optional

Replace with the name of the file you want to transfer and with either "w" or "l" depending on the target platform.

Example:

Transfile.sh examplefile.txt w #To transfer examplefile.txt to windows target
Transfile.sh examplefile.txt l #To transfer examplefile.txt to linux target
Transfile.sh examplefile.txt l 8080 #To transfer examplefile.txt to linux target via port 8080

pentest.omp.json

Custom oh-my-posh config file

Install oh-my-posh:

/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)" #Install homebrew
brew install jandedobbeleer/oh-my-posh/oh-my-posh

Append this to the end of the ~/.zshrc file

Automatically displays tun0 ip in the terminal. Useful for msfvenom payloads,etc (I use gnome so I don't have the top bar IP thing that's in xfce)

image

if [ "$TERM_PROGRAM" != "Apple_Terminal" ]; then
 eval "$(oh-my-posh init zsh --config ~/Documents/Oh-my-posh/sim-web.omp.json)"
fi

ready.sh

Usage

./ready.sh name

name - Name of the target machine Then provide the ip of the target machine

  • The script will make a folder with the target machine name which contains a cherrytree template of the same name.
  • An autorecon scan is started with the ip provided.
  • The directory structure:
── example
   ├── example.ctb
   └── results
       └── 127.0.0.1
           ├── exploit
           ├── loot
           ├── report
           │   ├── local.txt
           │   ├── proof.txt
           │   └── screenshots
           └── scans
               ├── _commands.log
               ├── _full_tcp_nmap.txt
               ├── _quick_tcp_nmap.txt
               ├── _top_100_udp_nmap.txt
               └── xml
                   ├── _full_tcp_nmap.xml
                   ├── _quick_tcp_nmap.xml
                   └── _top_100_udp_nmap.xml

enumify.sh

Modified version of incursore

Usage

  _____                       _  __       
 | ____|_ __  _   _ _ __ ___ (_)/ _|_   _ 
 |  _| | '_ \| | | | '_ ' _ \| | |_| | | |
 | |___| | | | |_| | | | | | | |  _| |_| |
 |_____|_| |_|\__,_|_| |_| |_|_|_|  \__, |
                                    |___/ 
Original script by @wirzka modified by @Warrantea_v01d 

Usage: enumify.sh -H/--host <TARGET-IP> -t/--type <TYPE>
Optional: [-d/--dns <DNS SERVER>] [-o/--output <OUTPUT DIRECTORY>]

Scan Types:
	Port    : Shows all open ports 
	Script  : Runs a script scan on found ports 
	UDP     : Runs a UDP scan "requires sudo" 
	Vulns   : Runs CVE scan and nmap Vulns scan on all found ports 
	Recon   : Suggests recon commands, then prompts to automatically run them
	All     : Runs all the scans 

Original script by @wirzka gently modified by @Warrantea_v01d 

Installation

git clone https://github.com/AdityaHebballe/Pentest-Scripts.git
sudo ln -s $(pwd)/Pentest-Scripts/enumify.sh /usr/local/bin/