added xploit payloads, move things to util folder, tool needs alot of work, scanner cleaned up, bunch of database features
This commit is contained in:
33
Util/crack.src
Normal file
33
Util/crack.src
Normal file
@@ -0,0 +1,33 @@
|
||||
cryptools = include_lib("/lib/crypto.so")
|
||||
if not cryptools then
|
||||
cryptools = include_lib(current_path + "/crypto.so")
|
||||
end if
|
||||
if not cryptools then exit("Error: Can't find crypto.so library in the /lib path or the current folder")
|
||||
|
||||
GetPassword = function(hash)
|
||||
return cryptools.decipher(hash)
|
||||
end function
|
||||
|
||||
if not params.len >= 1 then exit("No file Specified")
|
||||
fileName = params[0]
|
||||
|
||||
if fileName.len == 32 then exit(GetPassword(fileName))
|
||||
|
||||
|
||||
|
||||
file = get_shell.host_computer.File(current_path + fileName)
|
||||
if not file then
|
||||
file = get_shell.host_computer.File(fileName)
|
||||
end if
|
||||
if not file then exit("Error: File not found in current folder or at specified location")
|
||||
|
||||
content = file.get_content.split("\n")
|
||||
output = []
|
||||
for line in content
|
||||
if line.len != 32 then output.push(line)
|
||||
if line.len == 32 then output.push(GetPassword(line))
|
||||
end for
|
||||
|
||||
for line in output
|
||||
print(line)
|
||||
end for
|
||||
36
Util/get_hackshop.src
Normal file
36
Util/get_hackshop.src
Normal file
@@ -0,0 +1,36 @@
|
||||
randomIp = function()
|
||||
while true
|
||||
ip = floor((rnd * 255) + 1) + "." + floor((rnd * 255) + 1) + "." + floor((rnd * 255) + 1) + "." + floor((rnd * 255) + 1)
|
||||
if not is_valid_ip(ip) then continue
|
||||
if is_lan_ip(ip) then continue
|
||||
return ip
|
||||
end while
|
||||
end function
|
||||
|
||||
getRouter = function(ip)
|
||||
router = get_router(ip)
|
||||
if not router then router = get_switch(ip)
|
||||
if not router then return null
|
||||
return router
|
||||
end function
|
||||
|
||||
hasRepoService = function(router)
|
||||
for lanIp in router.devices_lan_ip
|
||||
ports = router.device_ports(lanIp)
|
||||
for port in ports
|
||||
if router.port_info(port).split(" ")[0] == "repository" then return true
|
||||
end for
|
||||
end for
|
||||
return null
|
||||
end function
|
||||
|
||||
main = function()
|
||||
while true
|
||||
ip = randomIp
|
||||
router = getRouter(ip)
|
||||
if not router then continue
|
||||
if not hasRepoService(router) then continue
|
||||
exit(ip)
|
||||
end while
|
||||
end function
|
||||
main
|
||||
22
Util/nmap.src
Normal file
22
Util/nmap.src
Normal file
@@ -0,0 +1,22 @@
|
||||
if params.len != 1 or params[0] == "-h" or params[0] == "--help" then exit("<b>Usage: "+program_path.split("/")[-1]+" [ip_address]</b>")
|
||||
|
||||
target_ip = params[0]
|
||||
|
||||
if not (is_valid_ip(target_ip)) then target_ip = nslookup(target_ip)
|
||||
|
||||
if not (is_valid_ip(target_ip)) then
|
||||
exit("<color=red><b>That domain is not valid.</b></color>")
|
||||
end if
|
||||
|
||||
target_router = get_router(target_ip)
|
||||
target_ports = target_router.used_ports
|
||||
|
||||
|
||||
column = "<b>Number Type Version IP</b>"
|
||||
column = column + "\n" + "0" + " " + "kernel_router" + " " + target_router.kernel_version + " " + target_router.local_ip
|
||||
for port in target_ports
|
||||
column = column + "\n" + port.port_number + " " + target_router.port_info(port) + " " + port.get_lan_ip
|
||||
end for
|
||||
|
||||
print("\nIP Address : " + target_ip)
|
||||
print(format_columns(column))
|
||||
10
Util/passgen.src
Normal file
10
Util/passgen.src
Normal file
@@ -0,0 +1,10 @@
|
||||
|
||||
if not params then exit("Usage: " + program_path.split("/")[-1] + " [length]")
|
||||
length = to_int(params[0])
|
||||
if typeof(length) != "number" or length <= 0 then exit("Length must be a positive integer.")
|
||||
pass = ""
|
||||
while length > 0
|
||||
pass = pass + "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890"[floor(rnd * 62)]
|
||||
length = length - 1
|
||||
end while
|
||||
print(pass)
|
||||
Reference in New Issue
Block a user