This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
setlocal enabledelayedexpansion | |
:: Change to your target folder | |
cd /d "C:\Path\To\Your\Folder" | |
for %%F in (*_*.dll) do ( | |
set "filename=%%~nF" | |
set "ext=%%~xF" | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Set the path to the folder containing the files | |
$folderPath = "C:\Path\To\Your\Folder" | |
# Get all files in the folder | |
Get-ChildItem -Path $folderPath -File | ForEach-Object { | |
$file = $_ | |
# Use regex to match the pattern ending with _numbers (e.g. _20230230230) | |
if ($file.Name -match "^(.*?\.\w+)_\d+$") { | |
$newName = $matches[1] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
import json | |
import time | |
import argparse | |
import getpass | |
import os | |
import sys | |
def main(): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import dns.resolver | |
f = open("subdomains.txt","r").readlines() | |
for i in f: | |
tmp = i.replace("\n","") | |
try: | |
result = dns.resolver.resolve(tmp, 'CNAME') | |
print("%s,%s" % ( tmp , result[0])) | |
except: | |
pass |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import pandas as pd | |
import argparse | |
from argparse import RawTextHelpFormatter | |
""" | |
Author: Lenk Ratchakrit | |
This naive pandas script is to get only web host IP addresses and its ports | |
Hence you can pass it to some tools like httprobe then feroxbuster through STDIN and then aquatone or gowitness | |
""" | |
def nessus_converter(filename,output): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?xml version='1.0'?> | |
<Obfuscator> | |
<Var name="InPath" value=".\bin\x64\\Release" /> | |
<Var name="OutPath" value=".\Release_Obfuscated" /> | |
<Var name="HidePrivateApi" value="true" /> | |
<Var name="RenameProperties" value="true" /> | |
<Var name="RenameFields" value="true" /> | |
<Module file="$(InPath)\test.exe" /> | |
</Obfuscator> |