- Pull the docker image (In Information), do not use this repository on your
own computer or clone the repository and build the dockerfile on your down computer
- To run the image use ie: docker run --name <name_of_given_container> -it ghcr.io/algorithm-model-research/infosec-and-hacking-scripts:main bash
or if it build your own image from the Dockerfile replace ie: docker run --name <name_of_given_container> -it <docker_image> bash
- To bash into the docker container after exiting it use ie: docker start -ia <name_of_given_container>
- Small introduction for usage as there will be more complex introduction in https://github.com/Algorithm-Model-Research for useabilities
- Scripts are lists of commands executed by certain programs or scripting engines. ๐
- They are usually text documents with instructions written using a scripting language. ๐
- They are used to automate computer processes...ie attacks, automation and defenses, analysis....lets have fun! ๐
This is a collection of scripts I USE while learning scripting and programming or used in pentests๐
* I DO NOT claim ownership of all scripts...This is just a convenient collection of different scripts
* Written by different authors (including myself) for different scenarios in pentesting...A hackers Bible of some sort๐
* MOST, save for a few, are written by other reserchers from;
- GITHUB ( Maldevel, threat9, John Hammond...etc),
- HACKERONE,
- BUGCROWD,
- YOUTUBE,
- CTFs...etc
* If you have any dope new scripts you use/Or a shoutout let me know as well/ Contribute; I am always looking for new scripts ๐
- For more instroctions into docker usage, check out the organization to get a better understanding on how to use the image
- docker pull ghcr.io/algorithm-model-research/infosec-and-hacking-scripts:main
- docker pull ghcr.io/ronaldsonbellande/infosec-and-hacking-scripts:main
* bruteforce - Password brute forcing.
* cloud - Interacting with or testing cloud-based services.
* database - Testing traditional databases.
* enumeration - Enumerate DNS, web applications, and users.
* exploit - Exploits and exploit development.
* osint - Open source intelligence gathering.
* scan - Network scanners and parsers.
* shells - well, shells!!
* webapp - Tools for web application testing.
* wireless - Wireless testing tools.
* phishing - Tools to facilitate phishing.
* USB Rubber ducky - Scripts for rubber ducky/O.mg cables/Arduino/Bad USB
* ChatGPT -Automation Scripts generated with chatGPT
* Miscellaneous
## PS : THIS ๐ SCRIPTS AND REPO IS FOR EDUCATIONAL PURPOSES ONLY!!
I am NOT responsible for the misuse of this scripts to cause harm ๐ฟ in the public ๐จโ๐จโ๐งโ๐ง or upon any infrastructure ๐๏ธ.
USE THESE VERY POWERFUL AND FUN TOOLS RESPONSIBLY, you know, like alcohol! BE COOL!๐ ๐ ๐
- Palpatine @alvin-tosh
- Ronaldson Bellande @RonaldsonBellande