Skip to main content

Posts

Showing posts with the label Script

How to Create a Telegram Notifications for Conditions in Google Sheet

Create a Bot for the Telegram Alert Open Telegram messenger, sign in to your account or create a new one Enter @Botfather in the search tab and choose this bot. (Official Telegram bots have a blue checkmark beside their name.) Click “Start” to activate BotFather bot.In response, you receive a list of commands to manage bots. Choose or type the /newbot command and send it. Choose a name for your bot — your subscribers will see it in the conversation. And choose a username for your bot — the bot can be found by its username in searches. The username must be unique and end with the word “bot.” Copy the token value. How to Create a New Bot for Telegram: https://sendpulse.com/knowledge-base/chatbot/telegram/create-telegram-chatbot How to Get Your Telegram Chat ID:   https://diyusthad.com/2022/03/how-to-get-your-telegram-chat-id.html In your Telegram account, search for “@myidbot” or open this link t.me/myidbot on your smartphone. Start a conversation with that bot and type /getid. You will

Restore Your Old Blurry Face Image (Face Restoration)

Now we have a tool to restore our old images which we have taken with a low configuration camera. It's time to restore our grandparents, parents, and child blurry photos. This tool is free of cost. 😇 Thanks to the GFPGAN team, who build this.  Check the output: Installation: Download and install Python3 Download the zip file GFPGAN  and unzip it. Open the CMD and navigate to the GFPGAN folder. Run this command pip3 install -r requirements.txt Download ANACONDA and install it. Download PYTORCH  and in the package, choose pip. Download and install CUDA . Download the pre-trained model . GFPGANv1.3.pth is better to use. Move the model file to {" GFPGAN-1.3.8\experiments\pretrained_models\ "}. Copy the blur face image to {" GFPGAN-1.3.8\inputs\whole_imgs\ "}. Run the command {" python inference_gfpgan.py "}. If you are using any other model, then use "python inference_gfpgan. py -v option". Check "python inference_gfpgan.py -h" option

Movie Search By GoogleDorksV2

Now you can search movies by the script. Automation is always great. CMD Movie_Search_By_GoogleDorks.exe By Lazy hacker [Follow: https://lazyhacker22.blogspot.com/] Enter Movie Name: Secret Space UFOs Rise of the Tr3b site:vidoza.net Secret Space UFOs Rise of the Tr3b site:www.1377x.to Secret Space UFOs Rise of the Tr3b https://www.1377x.to/movie/917143/Secret-Space-UFOs-Rise-of-the-TR3B-2021/ Check this tool: Download

Convert Veracode XML Report to Excel Report V2

  A new version is here now: So now the solution is here: Access my Github URL  https://github.com/crazywifi/Veracode_XML_Report_To_Excel_File_Converter Download any file [Python or EXE]. Copy the EXE file/Python file to the Veracode XML report file folder. Run the command “Veracode_XML_to_Excel.exe Veracode_XML_File.xml” or “python3 Veracode_XML_to_Excel.py Veracode_XML_File.xml” The output report will generate by the name “Veracodeout.xlsx” Features of this script: 1. You can convert the XML file to Excel. 2. The Excel file includes: * Severity * Vulnerability Name * IssueID * Description * Remediation * SourcePath * Line Number * Mitigation Status *  Vulnerability severity name with color *  Mitigation Status 3. Remediation is in a separate column 4. The Severity is converted to strings like Critical, High, Medium, Low, and Informational. I hope this tool will make your life a little easier 😀

Run Terminal Binaries in Burp: BurpBinaryRunner - (My 2nd Burp Extension in Jython)

This tool is used to run binaries through Burp, tools like SSLscan, Nmap, FFUF, etc. The binaries that give the output on the terminal can be used in this Burp extension. I am not sure if this Burp extender will make your life easy or not. I have made it for learning purpose. Download:   https://github.com/crazywifi/BurpBinaryRunner

My First Burp Extension | Enable Tor Proxy By Burp (Jython)

Hello Everyone,  Finally, after one week of work, I learned many new things in Jython as well as in Java. When you will see the functionality of this Burp extension, it looks like it needs only one day of development, but for me, it took 1 week because I had zero knowledge of it but yes I know a little bit of Python. But now after one week of time, I can make this type of Burp extender that automates the process and make our life easy. What are the problems I faced while developing it, don't judge me, some are dumb questions to myself: How to create a Burp extension in Jython? What is JPanel and how to use it? How to run Tor proxy in Windows? How to run Tor Proxy in the background? How to kill the process in Windows? How to create a button in Jython? How to change color? etc....etc.....etc...... Download:   https://github.com/crazywifi/TOR_Proxy_Burp_Extension

IP Address Information Gathering Tool

This tool can be used in Red Team Assessment to gather the IP address details in bulk. This tool is used to find the organization's IP address belongs to which services like a cloud (AWS), service provider (Airtel), and self-server. Download:   https://github.com/crazywifi/ipdetails

Extract IP:Port from Nessus CSV File For Report Writing

Download:   https://github.com/crazywifi/Extract_IP_PORT_From_Nessus_Output

Shodan IP Address Scraping Tool

Change the Service name and add cookies to the script. Download:   https://github.com/crazywifi/Shodan_IPAddress_Scraping

Fake Traffic By Proxy | Use proxy to send requests to the server | Send traffic from multiple free proxy

There are many ways to achieve this, one of the ways is here. I want a tool that sends requests to my website, but from different proxies. So I searched for some tools, but I faced the integration issue because I want to automate the whole process. That's the reason I have created my own tool. I learned a new concept of proxies. How the tool is working? How to use this code? Command: python3 FakeTrafficByProxy.py URL Example: python3 FakeTrafficByProxy.py https://lazyhacker22.blogspot.com/ Need to change the highlighted data in the script before using it according to your website server response Download:  https://github.com/crazywifi/FakeTrafficByProxy Download Windows EXE: https://github.com/crazywifi/FakeTrafficByProxy/releases/tag/FakeTrafficByProxy

Filtering Out The Scope IP Address list from IP Address List

  I had faced a situation where the client gave me a list of 2000 IP addresses list and after sometime client gave me another list of IP addresses which was not in scope. Now the problem was that I have to filter out the scope IP address from the IP address list.  I had two options  1. Do it manually  2. Done by automation.  I had chosen 2nd option. Initially, automation takes time, but it makes our life easy. Command: Scope_IP_Address_Filter_From_IP_Address_List.exe IPaddresslist.txt outofscope.txt Output File: Finalscope.txt Download: https://github.com/crazywifi/Filtering_Out_Outofscope_IP_From_Scope/releases/tag/Scope_IP_Address_Filter_From_IP_Address_List

Convert Veracode XML Report to Excel Report

  Hello Everyone, I have seen many queries on Google regarding the Veracode XML report where people are asking about that how to convert the XML report to Excel. So now the solution is here: Access my Github URL  https://github.com/crazywifi/Veracode_XML_Report_To_Excel_File_Converter Download any file [Python or EXE]. Copy the EXE file/Python file to the Veracode XML report file folder. Run the command “Veracode_XML_to_Excel.exe Veracode_XML_File.xml” or “python3 Veracode_XML_to_Excel.py Veracode_XML_File.xml” The output report will generate by the name “Veracodeout.xlsx” Features of this script: 1. You can convert the XML file to Excel. 2. The Excel file includes: * Severity * Vulnerability Name * IssueID * Description * Remediation * SourcePath * Line Number * Mitigation Status 3. Remediation is in a separate column 4. The Severity is converted to strings like Critical, High, Medium, Low, and Informational. I hope this tool will make your life a little easier :)

How to add a custom filter in the Detect-Secrets (Yelp)code for build

Hello everyone, I am sharing a small change that I did in the detect-secrets tool which is my client's requirement. My client wants to use the “custom filter” in the Detect-Secrets but also wants, that no other option will be added while using it. Example: detect-secrets scan --filter custom_filter.py::is_invalid_secret The reason to add the filter code in the tool code, so that anybody in the company, directly can use it without remembering any options and the path of the filter file like in the above example. What is the filter in Detect-Secrets? The filter is something that you don’t want to scan at the time of repo scan by  detect-secrets . Like your organization use “AppID = dasdsfdsfsdfsf”, so for “ Detect-secrets ” this is secret but for your organization, it’s a normal value. So if you want fewer false-positive results then we use the filters. How to add filter code in code and build the detect secret? Step1:  Clone the “ Detect-Secrets ” tool repo. git clone  https://githu

SMTP_Relay_Phisher

  Overview SMTP Relay Phisher is a tool for testing and exploiting the SMTP Open Relay vulnerability by simulating real-world phishing attacks. This tool used for two purposes: To run the phishing campaign by command line To exploit the SMTP Open Relay vulnerability by sending phishing email This tool used custom SMTP-cli. I have done some basic modifications in his script. Thanks to  smtp-cli  for developing such a useful tool. Feature Overview Fully open-source means there are no limits on the use Lightweight as compared to other phishing toolkits Run multiple phishing campaigns simultaneously Send an email with embedded First Name, Last Name, and Email Highly flexible to run phishing campaign by exploiting SMTP open relay issue User enumeration by “RCPT TO” Time delay is available to bypass the open relay restriction Reason to Develop SMTP Relay Phisher Recently, I was working on a Red Team activity, where I found SMTP open relay vulnerability. I used “SMTP-cli” tool to run the phis