Use Hunter.io to search for potential targets gathered through open source platforms. Currently this hunter.py only limits up to 100 e-mail addresses. The output is formatted in First Name, Last name and e-mail address.
Example: python hunter.py google.com
Subsection of the output:
Nancy Chen,[email protected]
Katherine Kuan,[email protected]
Nick Pollard,[email protected]
Brendan Douglas,[email protected]
Katie Hockman,[email protected]
Patrice Arruda,[email protected]
Mike Digman,[email protected]
Josh Estelle,[email protected]
Zhenni Huang,[email protected]
Joseph Wen,[email protected]
Generates iptables rules by either creating a file called wipaddr.txt with ip address in the subnet located in line 25 or adding the subnets to the arguement.
Example: python3 gen_iptables.py 192.168.1.1
Output:
iptables -A INPUT -p tcp -s 192.168.1.1 -j ACCEPT
iptables -A OUTPUT -p tcp -s 192.168.1.1 -j ACCEPT
iptables -A INPUT -j DROP
iptables -A OUTPUT -j DROP
This python script works on both python2 and python3.
Generates a full block list of firewall rules by using a file called wipaddr.txt within the subnet located in line 25, or add a list of ip addresses on the system arguement.
Example: python3 gen_netsh.py 192.168.1.253 192.168.1.254 192.168.1.252
Output: "netsh advfirewall firewall add rule name=192.168.1.254 dir=in interface=any action=block remoteip=192.168.1.254" This python script works on both python2 and python3.
passgen is a password generator that accepts an integer as an input variable to generate password. By default it generates a 15 character randomize password.
Example: python passgen.py
Output: hqohg7xw+^ulQ>X
ExampleII: python passgen.py 21
Output: "Sw,.>pfF9<^._JR/-tpfy"
phonetic accepts a string and converts the word into a relating speech sound for each character.
Example: python phonetic.py Felix
Output: Foxtrot Echo Lima India Xray
ip-api.py iterates through a file grabbing ip addreses and does a whois lookup to identify the geographical location of the ip address. If the file ipaddr.txt is not available, it accepts system arguements. This uses ip-api to do the whois query.
ipstack.py iterates through a file grabbing ip addreses and does a whois lookup to identify the geographical location of the ip address. If the file ipaddr.txt is not available, it accepts system arguements. This uses ipstack to do the whois query.
rsa_generate.py generates a private key and public key. This python script generates a 2048 bytes size private.pem and receiver.pem.
twitch_msg.py uses a twitch api key to send messages to twitch on specific channels. This can be used to send messages to your favorites channels.
hibp.py uses system arguements or file called email.txt to query against have I been pwned to see if the emails are part of a compromised dataset.
Use twilio rest as a client to generate an API Key using the Account SID and Authentication Token.
Accept a file name occurences.txt as input to create a list of occurances of how many a word shows up.
Accept a file name occurences.txt as input to create a list of occurances of how many a letter shows up.
This python scripts turns the en0 interface into promiscuous mode. This capture all traffic parses out dns request and http request. If the communication is outside of dns or http, it prints out just metadata.