All Projects → hahwul → hack-pet

hahwul / hack-pet

Licence: MIT license
🐰 Managing command snippets for hackers/bug bounty hunters. with pet.

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to hack-pet

cf-check
CloudFlare Checker written in Go
Stars: ✭ 147 (+90.91%)
Mutual labels:  bugbounty, bugbountytips
Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Stars: ✭ 34 (-55.84%)
Mutual labels:  bugbounty, bugbountytips
HolyTips
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Stars: ✭ 1,210 (+1471.43%)
Mutual labels:  bugbounty, bugbountytips
WDIR
Good resources about web security that I have read.
Stars: ✭ 14 (-81.82%)
Mutual labels:  bugbounty, bugbountytips
Awesome Bugbounty Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Stars: ✭ 2,429 (+3054.55%)
Mutual labels:  bugbounty, bugbountytips
nerdbug
Full Nuclei automation script with logic explanation.
Stars: ✭ 153 (+98.7%)
Mutual labels:  bugbounty, bugbountytips
Howtohunt
Tutorials and Things to Do while Hunting Vulnerability.
Stars: ✭ 2,996 (+3790.91%)
Mutual labels:  bugbounty, bugbountytips
DeadDNS
DNS hijacking via dead records automation tool
Stars: ✭ 44 (-42.86%)
Mutual labels:  bugbounty, bugbountytips
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+116.88%)
Mutual labels:  bugbounty
codesnip
A code bank designed with Pascal in mind
Stars: ✭ 62 (-19.48%)
Mutual labels:  snippets
ts-nextjs-tailwind-starter
🔋 Next.js + Tailwind CSS + TypeScript starter packed with useful development features
Stars: ✭ 880 (+1042.86%)
Mutual labels:  snippets
vapi
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
Stars: ✭ 674 (+775.32%)
Mutual labels:  bugbounty
30-seconds-of-csharp
Short C# code snippets for all your development needs
Stars: ✭ 132 (+71.43%)
Mutual labels:  snippets
stencil-snippets
An extension to add some snippets on vs code
Stars: ✭ 21 (-72.73%)
Mutual labels:  snippets
requests-ip-rotator
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Stars: ✭ 323 (+319.48%)
Mutual labels:  bugbounty
Password Generator
🔄 Simple password generator class library in C# 6.0, use for generate your own password! 📗
Stars: ✭ 21 (-72.73%)
Mutual labels:  snippets
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+887.01%)
Mutual labels:  bugbounty
VulWebaju
VulWebaju is a platform that automates setting up your pen-testing environment for learning purposes.
Stars: ✭ 53 (-31.17%)
Mutual labels:  bugbounty
webapp-wordlists
This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contains a wordlist of all the files directories for this version.
Stars: ✭ 306 (+297.4%)
Mutual labels:  bugbounty
BugBounty CheatSheet
BugBounty_CheatSheet
Stars: ✭ 113 (+46.75%)
Mutual labels:  bugbountytips



hack-pet

hack-pet is collection of command snippets that are useful to hackers/bug bounty hunters. It is similar to the recon_profile, but it uses the pet. pet can manage the command set more progressively.

What is pet

Simple command-line snippet manager, written in Go => pet

How to use hack-pet

Add the snippet you like from the list below to the snippet toml file(~/.config/pet/snippet.toml or $ pet edit) in pet. To add all items, you can also paste hackpet.toml.

  1. Copy & Paste hackpet.toml file to pet snippet file
$ cat ./hackpet.toml >> ~/.config/pet/snippet.toml
  1. Running pet
$ pet exec

or 

$ pet search
  1. You can find hackpet's snippets. The snippet of the hackpet has the tag #hackpet. If you have a lot of snippets in use, you can find them quickly by searching for tags.

Screenshot

Tree

.
├── hackpet.toml => all snippets
├── snippets     => collection of snippets

Snippets

Description Command
Find All Allocated IP ranges for ASN given an IP address whois -h whois.radb.net -i origin -T route $(whois -h whois.radb.net <Organization> | grep origin: | awk '{print $NF}' | head -1) | grep -w "route:" | awk '{print $NF}' | sort -n
Android set proxy adb shell settings put global http_proxy <ip address>:<param>
Android unset proxy adb shell settings put global http_proxy :0
Brute forcing for endpoints with dirsearch dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <URL>
certprobe / runs httprobe on all the hosts from certspotter curl -s https://crt.sh/\?q\=\%.<domain>\&output\=json | jq -r '.[].name_value' | sed 's/\*\.//g' | sort -u | httprobe | tee -a ./all.txt
Extract subdomains from IP Range nmap <ip range> -sn | grep "<greping domain>" | awk '{print $5}'
Find subdomain and takeover (with subfinder/amass/assetfinder/subjack) subfinder -d <domain> >> domains ; assetfinder -subs-only <domain> >> domains ; amass enum -norecursive -noalts -d <domain> >> domains ; subjack -w domains -t 100 -timeout 30 -ssl -c ~/go/src/github.com/haccer/subjack/fingerprints.json -v | tee takeover
Find LFI with gau ~/go/bin/gau <domain> | ~/go/bin/gf lfi | ~/go/bin/qsreplace "/etc/passwd" | xargs -I % -P 25 sh -c 'curl -s "%" 2>&1 | grep -q "root:x" && echo "VULN! %"'
Find OpenRedirect with gau export LHOST="http://localhost"; gau <domain> | gf redirect | qsreplace "$LHOST" | xargs -I % -P 25 sh -c 'curl -Is "%" 2>&1 | grep -q "Location: $LHOST" && echo "VULN! %"'
Get bugcrowd programs curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/bugcrowd_data.json | jq -r '.[].targets.in_scope[] | [.target, .type] | @tsv'
one | uniq); doneGet CIDR and Orgz from target lists for DOMAIN in $(cat <FILE NAME>);do echo $(for ip in $(dig a $DOMAIN +short); do whois $ip | grep -e "CIDR\|Organization" | tr -s " " | paste - -; d
Get hackerone programs curl -sL https://github.com/arkadiyt/bounty-targets-data/blob/master/data/hackerone_data.json?raw=true | jq -r '.[].targets.in_scope[] | [.asset_identifier, .asset_type] | @tsv'
Get intigriti programs curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/intigriti_data.json | jq -r '.[].targets.in_scope[] | [.endpoint, .type] | @tsv'
Get Subdomains from Archive curl -s "http://web.archive.org/cdx/search/cdx?url=*.<domain>/*&output=text&fl=original&collapse=urlkey" | sed -e 's_https*://__' -e "s/\/.*//" | sort -u
Get Subdomains from BufferOverRun curl -s https://dns.bufferover.run/dns?q=.<domain> |jq -r .FDNS_A[]|cut -d',' -f2|sort -u
Get Subdomains from CertSpotter curl -s "https://certspotter.com/api/v0/certs?domain=<domain>" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u
Get Subdomains from crt.sh curl -s "https://crt.sh/?q=%25.<domain>&output=json" | jq -r '.[].name_value' | sed 's/\*\.//g' | sort -u
Get Subdomains from JLDC curl -s "https://jldc.me/anubis/subdomains/<domain>?" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u
Get Subdomains from RapidDNS.io curl -s "https://rapiddns.io/subdomain/<domain>?full=1#result" | grep "<td><a" | cut -d '"' -f 2 | grep http | cut -d '/' -f3 | sed 's/#results//g' | sort -u
Get Subdomains from Riddler.io curl -s "https://riddler.io/search/exportcsv?q=pld:<domain>" | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u
Get Subdomains from VirusTotal curl -s "https://www.virustotal.com/ui/domains/<domain>/subdomains?limit=40" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u
Get url with gau, included parameter echo <domain> | ~/go/bin/gau | grep "=" | qsreplace -a
Get all the urls out of a sitemap.xml curl -s <sitemap URL> | xmllint --format - | grep -e 'loc' | sed -r 's|</?loc>||g'
Get urls from urlscanio gron "https://urlscan.io/api/v1/search/?q=domain:<domain>" | grep 'url' | gron --ungron
Find XSS with gospider gospider -S <TARGET URLS FILE> -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -e "code-200" | awk '{print $5}'| grep "=" | qsreplace -a | dalfox pipe -o result.txt
ipinfo curl http://ipinfo.io/<param>
Create a wordlist using param used in the domain waybackurls <domain> | grep "?" | unfurl keys | sort -u | tee -a paramlist.txt
Ports Scan without CloudFlare subfinder -silent -d <domain> | filter-resolved | cf-check | sort -u | naabu -rate 40000 -silent -verify | httprobe
Sort & Tested Domains from Recon.dev curl "https://recon.dev/api/search?key=<API Key>&domain=<domain>" |jq -r '.[].rawDomains[]' | sed 's/ //g' | sort -u |httpx -silent
Find Subdomains TakeOver subfinder -d <target> >> domains ; assetfinder -subs-only <target> >> domains ; amass enum -norecursive -noalts -d <target> >> domains ; subjack -w domains -t 100 -timeout 30 -ssl -c ~/go/src/github.com/haccer/subjack/fingerprints.json -v 3 >> takeover ;
Get multiple target's Custom URLs from ParamSpider cat <domains file> | xargs -I % python3 ~/tool/ParamSpider/paramspider.py -l high -o ./spidering/paramspider/% -d % ;
URLs Probing with cURL + Parallel cat <domains file> | parallel -j50 -q curl -w 'Status:%{http_code}\t Size:%{size_download}\t %{url_effective}\n' -o /dev/null -sk

Contribute

First, Make snippet DOML with hack-pet add

$ hack-pet add
add called
[command]
>>> echo <domain> | ~/go/bin/gau | grep "=" | qsreplace -a
echo <domain> | ~/go/bin/gau | grep "=" | qsreplace -a

[desc]
>>> get url with gau, included parameter
get url with gau, included parameter

[toml filename | e.g nmap_full_scan.toml]
>>> get_url_param.toml
get_url_param.toml

[[snippets]]
command = "echo <domain> | ~/go/bin/gau | grep \"=\" | qsreplace -a "
description = "get url with gau, included parameter"
output = ""
tag = ["hackpet"]

or

Write TOML Code in ./snippets directory

[[snippets]]
command = "echo <domain> | ~/go/bin/gau | grep \"=\" | qsreplace -a "
description = "Get url with gau, included parameter"
output = ""
tag = ["hackpet"]

Please attach a hackpet to the tag. This allows you to distinguish between different snippets and hackpet.

Second, move your DOML file to /snippet directory

$ mv get_url_param.toml ./snippets/

Finaly, Send Pull Request! (your DOML file in ./snippets/)

Merge (for me)

$ hack-pet merge
$ git add hackpet.toml README.md
$ git commit -m "merge and distribute readme"
$ git push -u origin master 

Oneline

$ hack-pet merge
$ git add hackpet.toml README.md ; git commit -m "merge and distribute readme" ; git push -u origin master
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].