Skip to content

Instantly share code, notes, and snippets.

@moscowchill
Last active October 21, 2024 09:15
Show Gist options
  • Save moscowchill/23f88a97d957609e8ba51644e0701b93 to your computer and use it in GitHub Desktop.
Save moscowchill/23f88a97d957609e8ba51644e0701b93 to your computer and use it in GitHub Desktop.
arsenal cheats for some pd tools
# projectdiscovery
#platform/linux #target/remote #cat/RECON #tag/scan
## ProjectDiscovery - intern top/100 nuclei killchain
```
sudo /home/kali/go/bin/naabu -host <ip_range> -p 8080,10000,20000,2222,7080,9009,7443,2087,2096,8443,4100,2082,2083,2086,9999,2052,9001,9002,7000,7001,8082,8084,8085,8010,9000,2078,2080,2079,2053,2095,4000,5280,8888,9443,5800,631,8000,8008,8087,84,85,86,88,10125,9003,7071,8383,7547,3434,10443,8089,3004,81,4567,7081,82,444,1935,3000,9998,4433,4431,4443,83,90,8001,8099,80,300,443,591,593,832,981,1010,1311,2480,3128,3333,4243,4711,4712,4993,5000,5104,5108,6543,7396,7474,8014,8042,8069,8081,8088,8090,8091,8118,8123,8172,8222,8243,8280,8281,8333,8500,8834,8880,8983,9043,9060,9080,9090,9091,9200,9800,9981,12443,16080,18091,18092,20720,28017 -silent -stats | httpx -silent -o <output_file> | nuclei -s low,medium,high,critical -o <output_file>
```
## ProjectDiscovery - targets file top/100 nuclei killchain
```
sudo /home/kali/go/bin/naabu -list <targets_file> -p 8080,10000,20000,2222,7080,9009,7443,2087,2096,8443,4100,2082,2083,2086,9999,2052,9001,9002,7000,7001,8082,8084,8085,8010,9000,2078,2080,2079,2053,2095,4000,5280,8888,9443,5800,631,8000,8008,8087,84,85,86,88,10125,9003,7071,8383,7547,3434,10443,8089,3004,81,4567,7081,82,444,1935,3000,9998,4433,4431,4443,83,90,8001,8099,80,300,443,591,593,832,981,1010,1311,2480,3128,3333,4243,4711,4712,4993,5000,5104,5108,6543,7396,7474,8014,8042,8069,8081,8088,8090,8091,8118,8123,8172,8222,8243,8280,8281,8333,8500,8834,8880,8983,9043,9060,9080,9090,9091,9200,9800,9981,12443,16080,18091,18092,20720,28017 -o naabu.out -stats | httpx -o <output_file> | nuclei -s low,medium,high,critical -o <output_file>
```
## ProjectDiscovery - AllPorts nuclei killchain
```
sudo /home/kali/go/bin/naabu -host <ip_range> -p - -stats | httpx -o <output_file> | nuclei -s low,medium,high,critical
```
## Projectdiscovery - DNS filter active subs
```
subfinder -d <domain> -o <output_file> | dnsx -l <targets_file> -o <output_file>
```
## Projectdiscovery - DNS extract sub A records
```
cat <targets_file> | dnsx -silent -a -resp-only > <output_file>
```
## Projectdiscovery - Subfinder gather all subs, dnsx, naabu, httpx and nuclei (External test)
```
subfinder -d <domain> -o <output_file> | dnsx -l <targets_file> -o <output_file> | sudo /home/kali/go/bin/naabu -p 8080,10000,20000,2222,7080,9009,7443,2087,2096,8443,4100,2082,2083,2086,9999,2052,9001,9002,7000,7001,8082,8084,8085,8010,9000,2078,2080,2079,2053,2095,4000,5280,8888,9443,5800,631,8000,8008,8087,84,85,86,88,10125,9003,7071,8383,7547,3434,10443,8089,3004,81,4567,7081,82,444,1935,3000,9998,4433,4431,4443,83,90,8001,8099,80,300,443,591,593,832,981,1010,1311,2480,3128,3333,4243,4711,4712,4993,5000,5104,5108,6543,7396,7474,8014,8042,8069,8081,8088,8090,8091,8118,8123,8172,8222,8243,8280,8281,8333,8500,8834,8880,8983,9043,9060,9080,9090,9091,9200,9800,9981,12443,16080,18091,18092,20720,28017 -stats | httpx -o <output_file> | nuclei -s low,medium,high,critical
```
#platform/linux #target/remote #cat/bugbounty #tag/webvuln
## BorkBounty - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl, and feed them through burp
```
gau <input_domain> --subs --blacklist png,jpg,gif | httpx -silent -proxy http://127.0.0.1:8080/
```
## Worlist generation based on external infrastructure
```
echo <target> | subfinder -silent | httpx | hakrawler | haklistgen
```
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment