Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'bash'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 6 results

  1. Description Linux is a powerful and widely used operating system, it is free and open source software. It can run on wide range of hardware platforms like desktops, servers, mobile devices and even supercomputers. Most of the top companies in the world use Linux servers. Linux is growing very rapidly and demand for Linux talent is on the rise. So acquiring Linux skills can help you land a job and get ahead in your career. This tutorial is designed for computer users who have limited or no previous knowledge of Linux. If you are complete beginner in Linux or have never worked on command line, then this course is for you. In this course you’ll learn Linux from scratch. Learn to Program Using Any Shell What you learn in this course can be applied to any shell, however the focus is on the bash shell and you’ll learn some really advanced bash features. Again, whether you’re using bash, bourne (sh), KornShell (ksh), C shell (csh), Z shell (zsh), or even the tcsh shell, you’ll be able to put what you learn in this course to good use. Perfect for Linux, Unix, Mac and More! Also, you’ll be able to use these scripts on any Linux environment including Ubuntu, Debian, Linux Mint, RedHat, Fedora, OpenSUSE, Slackware, Kali Linux and more. You’re scripts will even run on other operating systems such as Apple’s Mac OS X, Oracle’s Solaris, IBM’s AIX, HP’s HP-UX, FreeBSD, NetBSD, and OpenBSD. (Sorry, this course is NOT for Windows scripting or powershell scripting.) Become an effective Linux user and advance your Career. Learning the Linux Command Line will take you FAR! Learn to appreciate the power of the Linux command line. Understand the structure of the Linux File System. Learn how to utilize Linux man pages and help tools. Realize the differences between soft and hard links. Learn how to navigate your Linux File System using few simple commands! Learn how to create, modify and process files. Learn how to create your own Linux commands. Who this course is for: Anyone interested in shell scripting or shell programming. Anyone who wants to get started with Linux. Existing Linux users or learners who wants to be effective at using the Linux command Line. Aspiring Linux system administrators. Requirements No experience required [Hidden Content] [hide][Hidden Content]]
  2. BugBountyScanner A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information output. It’s recommended to run BugBountyScanner from a server (VPS or home server), and not from your terminal. It is programmed to be low on resources, with potentially multiple days of scanning in mind for bigger scopes. The script functions on a stand-alone basis. You can run the script either as a docker image or from your preferred Debian/Ubuntu system (see below). All that is required is kicking off the script and forgetting all about it! Running the script takes anywhere in between several minutes (for very small scopes < 10 subdomains) and several days (for very large scopes > 20000 subdomains). A ‘quick mode’ flag is present, which drops some time-consuming tasks such as vulnerability identification, port scanning, and web endpoint crawling. Features Resource-efficient, suitable for running in the background for a prolonged period of time on a low-resource VPS, home server, or Raspberry Pi Telegram status notifications with per-command results Extensive CVE and misconfiguration detection with Nuclei (optionally with detection of blind vulnerabilities via Burp Collaborator) Subdomain enumeration and live web server detection Web screenshotting and crawling, HTML screenshot report generation Retrieving (hopefully sensitive) endpoints from the Wayback Machine Identification of interesting parameterized URLs with Gf Enumeration of common “temporary” and forgotten files with GoBuster Automatic detection of LFI, SSTI, and Open Redirects in URL parameters Subdomain takeover detection Port scanning (Top 1000 TCP + SNMP) ‘Quick Mode’ for opsec-safe (ish) infrastructure reconnaissance Tools amass dnsutils Go gau Gf (with Gf-Patterns) GoBuster gospider httpx nmap Nuclei (with Nuclei-Templates) qsreplace subjack webscreenshot [hide][Hidden Content]]
  3. Introduction Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Features Single Bash script Lightweight and fast Multi-platform: Unix, OSX, Solaris etc. No external dependencies Immune to heuristic and behavioural analysis Built-in aliases of often used shell commands Extends system shell with post-exploitation oriented functionalities Stealthy, with custom cleanup routine activated on exit Easily extensible (add new commands by creating Bash functions) Full tab completion [HIDE][Hidden Content]]
  4. I'm looking true the web but can't resolve this error .......Bash: $ command not found Can someone give me help ? 👽
  5. Introduction Airgeddon is a multi-use bash script for WiFi network security auditing on Linux systems. This multi-purpose WiFi hacking tool has very rich features which supports multiple methods for WiFi hacking including multiple WPS hacking modes, all-in-one WEP attack, handshake file capturing, Evil Twin attacks, Pixie Dust attacks, and so much more (see features below). Features: Monitor-managed: interface mode switcher. Multiple configurable options, multilang support, auto update, HTTP proxy auto detection for updates, and so much more. WPA/WPA2 personal networks Handshake file capturing. Cleaning and optimizing Handshake captured files Evil Twin attacks [Rogue AP]: Integrated sniffing, sslstrip2, BeEF with Hostapd + DHCP + DoS + Ettercap + Sslstrip + BeEF; WiFi password capturing through captive portal with DNS blackhole; optional MAC spoofing. WPS cracking: WPS scanning, Pixie Dust attacks, Brute-force PIN attacks [Bully, Reaver], WPS PINs attacks. WEP All-in-One attack: combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc. DoS over wireless networks using different methods [DOS Pursuit Mode]. Comptaibility: Many Linux distros, iptables/nftables. [HIDE][Hidden Content]]
  6. Bashark Post exploitation toolkit written in pure Bash Table of Contents Introduction Usage Features Demo License Introduction Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Usage To launch Bashark on compromised host, simply source the bashark.sh script from terminal: $ source bashark.sh Then type help to see Bashark's help menu Features Single Bash script Lightweight and fast Multi-platform: Unix, OSX, Solaris etc. No external dependencies Immune to heuristic and behavioural analysis Built-in aliases of often used shell commands Extends system shell with post-exploitation oriented functionalities Stealthy, with custom cleanup routine activated on exit Easily extensible (add new commands by creating Bash functions) Full tab completion Demo License This software is under MIT License [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.