Skip to content

Instantly share code, notes, and snippets.

View marcosnk's full-sized avatar

Marcos Nakamura marcosnk

View GitHub Profile
@marcosnk
marcosnk / supergobuster.sh
Created June 25, 2018 19:24 — forked from lokori/supergobuster.sh
gobuster enumerator for hack-the-box machines. This generates huge amount of useless requests..
#!/bin/bash
set -eu
URL=$1
echo "super go bustering for super brute: $URL"
gobuster -u $URL -l -s 200,204,301,302,307,403 -w /root/tools/SecLists/Discovery/Web_Content/tomcat.txt
gobuster -u $URL -l -s 200,204,301,302,307,403 -w /root/tools/SecLists/Discovery/Web_Content/nginx.txt
gobuster -u $URL -l -s 200,204,301,302,307,403 -w /root/tools/SecLists/Discovery/Web_Content/apache.txt

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

#!/bin/bash
#
#this script contributed by Matthias Meyer
#note that if your $Topdir seems to be wrong (because it is empty), the script will ask you
#the new location.
#
#10/2009 JJK: Modified by Jeffrey J. Kosowsky
# add --nightly
# check if user eguals root or backuppc
#11/2009 MMT: Modified by Matthias Meyer