Skip to content

A repository for small scripts to help speed up the Hacking process in HTB

Notifications You must be signed in to change notification settings

TrackHackers/smallscripts

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 

Repository files navigation

smallscripts

A repository for small scripts to help speed up the Hacking process in HTB

This Repository will be divided into Windows and Linux hacking scripts.

Initial Enumeration

TrackScan

Introduction

TrackScan is an automated port scanning tool designed to speed up the initial enumeration phase during penetration tests. Developed by the TrackHackers team, it combines fast and detailed scans to provide a comprehensive overview of open ports and services running on a target machine.

Features

  • Fast initial port scanning using Nmap.
  • Detailed enumeration on open ports.
  • Easy-to-use command-line interface.
  • Customizable scanning options.

Usage

To run TrackScan, execute the following command:

python TrackScan.py -t <target_ip>

Replace <target_ip> with the IP address of the target machine.

For example:

python TrackScan.py -t target.htb

Windows

smb_tester.py

This script is a simple python tool that will spray easy passwords for users on smb shares. the ones we regularly see on HackTheBox.

when to use this tool? you have:

  • valid usernames
  • an open port 445 with smb shares available
  • no passwords

this tool will try empty passwords as well as the same password as the username.

python3 smbmap_tester.py -f users.txt -d MANAGER -H manager.htb

Linux

WebTrack: Web Enumeration Tool by Trackhackers

WebTrack is a Python-based web enumeration tool designed to automate the process of web service enumeration. It uses FFUF (Fuzz Faster U Fool) under the hood to perform directory and subdomain bruteforcing. The tool is highly configurable, allowing for multiple wordlists and providing real-time progress monitoring.

Prerequisites

Python 3.x FFUF tqdm Python library (pip install tqdm)

Usage

  1. Configuration: Place your wordlists' paths in the config.json file. Multiple wordlists can be specified.
{
  "directory_wordlists": ["/path/to/directory-wordlist1.txt", "/path/to/directory-wordlist2.txt"],
  "subdomain_wordlists": ["/path/to/subdomain-wordlist.txt"]
}
  1. Command Line Arguments: The tool requires the target IP and DNS name to be passed as command-line arguments.
python main.py -i 192.168.1.1 -d example.com
  1. Run: Execute the script. A progress bar will display the status in real-time.

About

A repository for small scripts to help speed up the Hacking process in HTB

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages