added bin dir, some scripts in there, and aliases, functions, and environment variable files
This commit is contained in:
parent
d022f9a874
commit
42757d42e0
6 changed files with 317 additions and 5 deletions
|
@ -1,26 +1,44 @@
|
||||||
### list of functions to source ###
|
### list of functions to source ###
|
||||||
|
|
||||||
randpw()
|
randpw()
|
||||||
|
|
||||||
{
|
{
|
||||||
openssl rand -base64 12
|
openssl rand -base64 12
|
||||||
}
|
}
|
||||||
|
|
||||||
cipher_check()
|
cipher_check()
|
||||||
|
|
||||||
{
|
{
|
||||||
nmap --script ssl-enum-ciphers "$1"
|
nmap --script ssl-enum-ciphers "$1"
|
||||||
}
|
}
|
||||||
|
|
||||||
check_gzip()
|
check_gzip()
|
||||||
|
|
||||||
{
|
{
|
||||||
curl -I -H 'Accept-Encoding: gzip,deflate' "$1" 2> /dev/null | grep --color 'Content-Encoding' && 'echo gzip enabled' || echo 'gzip not enabled'
|
curl -I -H 'Accept-Encoding: gzip,deflate' "$1" 2> /dev/null | grep --color 'Content-Encoding' && 'echo gzip enabled' || echo 'gzip not enabled'
|
||||||
}
|
}
|
||||||
|
|
||||||
ns()
|
ns()
|
||||||
|
|
||||||
{
|
{
|
||||||
dig +short "$1"
|
dig +short "$1"
|
||||||
}
|
}
|
||||||
|
|
||||||
mx()
|
mx()
|
||||||
|
|
||||||
{
|
{
|
||||||
dig +short MX "$1"
|
dig +short MX "$1"
|
||||||
|
}
|
||||||
|
|
||||||
|
open_urls()
|
||||||
|
|
||||||
|
{
|
||||||
|
xargs -a "$1" firefox -new-tab "$line"
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
check_open_resolver()
|
||||||
|
|
||||||
|
{
|
||||||
|
nmap -sU -p 53 -sV -P0 --script "dns-recursion" "$1"
|
||||||
}
|
}
|
||||||
|
|
10
.bash_profile
Normal file
10
.bash_profile
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
#
|
||||||
|
# ~/.bash_profile
|
||||||
|
#
|
||||||
|
|
||||||
|
|
||||||
|
[[ -f ~/.bashrc ]] && . ~/.bashrc
|
||||||
|
[[ -f ~/.bash_functions ]] && . ~/.bash_functions
|
||||||
|
[[ -f ~/.bash_aliases ]] && . ~/.bash_aliases
|
||||||
|
[[ -f ~/.env ]] && . ~/.env
|
||||||
|
|
9
.env
Normal file
9
.env
Normal file
|
@ -0,0 +1,9 @@
|
||||||
|
# Enviroment Variables
|
||||||
|
|
||||||
|
# Path variable
|
||||||
|
export PATH=$PATH:$HOME/bin
|
||||||
|
|
||||||
|
# Bash prompt color - green
|
||||||
|
export PS1="\e[0;32m[\u@\h \W]\$ \e[m "
|
||||||
|
|
||||||
|
|
5
.speedswapper
Normal file
5
.speedswapper
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
! Swap caps lock and escape
|
||||||
|
remove Lock = Caps_Lock
|
||||||
|
keysym Escape = Caps_Lock
|
||||||
|
keysym Caps_Lock = Escape
|
||||||
|
add Lock = Caps_Lock
|
260
bin/rblscan
Executable file
260
bin/rblscan
Executable file
|
@ -0,0 +1,260 @@
|
||||||
|
#!/bin/bash
|
||||||
|
# Scans IP against blocklists
|
||||||
|
# Enter the IP address to test it
|
||||||
|
|
||||||
|
# Uses input to define needed information
|
||||||
|
ADDRESS=$1
|
||||||
|
|
||||||
|
# Verifies address is correct format and length
|
||||||
|
if [[ $ADDRESS =~ ([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3}) ]] ; then
|
||||||
|
:
|
||||||
|
else
|
||||||
|
echo ""
|
||||||
|
echo "Please supply a valid address"
|
||||||
|
echo ""
|
||||||
|
echo "Usage: rblscan [ip address] <subnet in CIDR>" >&2
|
||||||
|
echo ""
|
||||||
|
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Creates needed variables
|
||||||
|
|
||||||
|
BACKADDRESS=$(echo $ADDRESS | sed -r 's/([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3})/\4.\3.\2.\1/')
|
||||||
|
REVERSE=$(dig -x $ADDRESS +short)
|
||||||
|
SUBNETCIDR=$2
|
||||||
|
|
||||||
|
# Subnet hosts based on CIDR
|
||||||
|
if [[ $SUBNETCIDR = 31 ]] ; then
|
||||||
|
SUBNETSPAN="2"
|
||||||
|
elif [[ $SUBNETCIDR = 30 ]] ; then
|
||||||
|
SUBNETSPAN="4"
|
||||||
|
elif [[ $SUBNETCIDR = 29 ]] ; then
|
||||||
|
SUBNETSPAN="8"
|
||||||
|
elif [[ $SUBNETCIDR = 28 ]] ; then
|
||||||
|
SUBNETSPAN="16"
|
||||||
|
elif [[ $SUBNETCIDR = 27 ]] ; then
|
||||||
|
SUBNETSPAN="32"
|
||||||
|
elif [[ $SUBNETCIDR = 26 ]] ; then
|
||||||
|
SUBNETSPAN="64"
|
||||||
|
elif [[ $SUBNETCIDR = 25 ]] ; then
|
||||||
|
SUBNETSPAN="128"
|
||||||
|
elif [[ $SUBNETCIDR = 24 ]] ; then
|
||||||
|
SUBNETSPAN="256"
|
||||||
|
elif [[ $SUBNETCIDR = 23 ]] ; then
|
||||||
|
SUBNETSPAN="512"
|
||||||
|
elif [[ $SUBNETCIDR = 22 ]] ; then
|
||||||
|
SUBNETSPAN="1024"
|
||||||
|
elif [[ $SUBNETCIDR = 21 ]] ; then
|
||||||
|
SUBNETSPAN="2048"
|
||||||
|
elif [[ $SUBNETCIDR = 20 ]] ; then
|
||||||
|
SUBNETSPAN="4096"
|
||||||
|
elif [[ $SUBNETCIDR = 19 ]] ; then
|
||||||
|
SUBNETSPAN="8192"
|
||||||
|
elif [[ $SUBNETCIDR = 18 ]] ; then
|
||||||
|
SUBNETSPAN="16384"
|
||||||
|
elif [[ $SUBNETCIDR = 17 ]] ; then
|
||||||
|
SUBNETSPAN="32768"
|
||||||
|
elif [[ $SUBNETCIDR = 16 ]] ; then
|
||||||
|
SUBNETSPAN="65536"
|
||||||
|
elif [[ -z $SUBNETCIDR ]] ; then
|
||||||
|
:
|
||||||
|
else
|
||||||
|
echo "Please supply a valid CIDR"
|
||||||
|
echo "/16 is the largest scannable range"
|
||||||
|
exit
|
||||||
|
fi
|
||||||
|
|
||||||
|
# List of RBLs
|
||||||
|
LISTS="
|
||||||
|
b.barracudacentral.org
|
||||||
|
bb.barracudacentral.org
|
||||||
|
bl.deadbeef.com
|
||||||
|
bl.emailbasura.org
|
||||||
|
bl.spamcannibal.org
|
||||||
|
bl.spamcop.net
|
||||||
|
blackholes.five-ten-sg.com
|
||||||
|
blacklist.woody.ch
|
||||||
|
bogons.cymru.com
|
||||||
|
cbl.abuseat.org
|
||||||
|
cdl.anti-spam.org.cn
|
||||||
|
cidr.bl.mcafee.com
|
||||||
|
combined.abuse.ch
|
||||||
|
combined.rbl.msrbl.net
|
||||||
|
db.wpbl.info
|
||||||
|
dnsbl-1.uceprotect.net
|
||||||
|
dnsbl-2.uceprotect.net
|
||||||
|
dnsbl-3.uceprotect.net
|
||||||
|
dnsbl.cyberlogic.net
|
||||||
|
dnsbl.inps.de
|
||||||
|
dnsbl.njabl.org
|
||||||
|
dnsbl.sorbs.net
|
||||||
|
drone.abuse.ch
|
||||||
|
drone.abuse.ch
|
||||||
|
duinv.aupads.org
|
||||||
|
dul.dnsbl.sorbs.net
|
||||||
|
dul.ru
|
||||||
|
dyna.spamrats.com
|
||||||
|
dynip.rothen.com
|
||||||
|
http.dnsbl.sorbs.net
|
||||||
|
images.rbl.msrbl.net
|
||||||
|
ips.backscatterer.org
|
||||||
|
ix.dnsbl.manitu.net
|
||||||
|
korea.services.net
|
||||||
|
misc.dnsbl.sorbs.net
|
||||||
|
noptr.spamrats.com
|
||||||
|
ohps.dnsbl.net.au
|
||||||
|
omrs.dnsbl.net.au
|
||||||
|
orvedb.aupads.org
|
||||||
|
osps.dnsbl.net.au
|
||||||
|
osrs.dnsbl.net.au
|
||||||
|
owfs.dnsbl.net.au
|
||||||
|
owps.dnsbl.net.au
|
||||||
|
pbl.spamhaus.org
|
||||||
|
phishing.rbl.msrbl.net
|
||||||
|
probes.dnsbl.net.au
|
||||||
|
proxy.bl.gweep.ca
|
||||||
|
proxy.block.transip.nl
|
||||||
|
psbl.surriel.com
|
||||||
|
rbl.interserver.net
|
||||||
|
rbl.megarbl.net
|
||||||
|
rdts.dnsbl.net.au
|
||||||
|
relays.bl.gweep.ca
|
||||||
|
relays.bl.kundenserver.de
|
||||||
|
relays.nether.net
|
||||||
|
residential.block.transip.nl
|
||||||
|
ricn.dnsbl.net.au
|
||||||
|
rmst.dnsbl.net.au
|
||||||
|
sbl.spamhaus.org
|
||||||
|
short.rbl.jp
|
||||||
|
smtp.dnsbl.sorbs.net
|
||||||
|
socks.dnsbl.sorbs.net
|
||||||
|
spam.abuse.ch
|
||||||
|
spam.dnsbl.sorbs.net
|
||||||
|
spam.rbl.msrbl.net
|
||||||
|
spam.spamrats.com
|
||||||
|
spamlist.or.kr
|
||||||
|
spamrbl.imp.ch
|
||||||
|
t3direct.dnsbl.net.au
|
||||||
|
tor.dnsbl.sectoor.de
|
||||||
|
torserver.tor.dnsbl.sectoor.de
|
||||||
|
ubl.lashback.com
|
||||||
|
ubl.unsubscore.com
|
||||||
|
virbl.bit.nl
|
||||||
|
virus.rbl.jp
|
||||||
|
virus.rbl.msrbl.net
|
||||||
|
web.dnsbl.sorbs.net
|
||||||
|
wormrbl.imp.ch
|
||||||
|
xbl.spamhaus.org
|
||||||
|
zen.spamhaus.org
|
||||||
|
zombie.dnsbl.sorbs.net
|
||||||
|
"
|
||||||
|
|
||||||
|
## Basic Functions ##
|
||||||
|
# All of the basic functions are here.
|
||||||
|
|
||||||
|
# Checks if you're scanning a range or not
|
||||||
|
function rangecheck {
|
||||||
|
if [[ -n "$SUBNETCIDR" ]] ; then
|
||||||
|
rangebuild
|
||||||
|
rangeoutput
|
||||||
|
rangescan
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
# Builds range based on CIDR
|
||||||
|
function rangebuild {
|
||||||
|
ADDRLOCTET=$(echo $ADDRESS | sed -r 's/([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3})/\4/')
|
||||||
|
ADDRNET=$(echo $ADDRESS | sed -r 's/([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3})/\1.\2.\3./')
|
||||||
|
RANGEEND=$(expr $ADDRLOCTET + $SUBNETSPAN)
|
||||||
|
RANGELOCTS=$(seq $ADDRLOCTET $RANGEEND)
|
||||||
|
RANGEARRAY=$(for i in $RANGELOCTS ; do echo $ADDRNET$i ; done)
|
||||||
|
BACKRANGEARRAY=$(for RANGEARRA in ${RANGEARRAY} ; do echo ${RANGEARRA} | sed -r 's/([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3})/\4.\3.\2.\1/' ; done)
|
||||||
|
}
|
||||||
|
|
||||||
|
# Scans range
|
||||||
|
function rangescan {
|
||||||
|
for BACKRANGEARRA in ${BACKRANGEARRAY} ; do
|
||||||
|
for LIST in ${LISTS} ; do
|
||||||
|
if [[ $(dig +short ${BACKRANGEARRA}.${LIST}.) =~ 127.0.0.[2-50] ]] ; then
|
||||||
|
echo ""
|
||||||
|
echo $(echo $BACKRANGEARRA | sed -r 's/([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3}).([0-9]{1,3})/\4.\3.\2.\1/') " is listed in $LIST"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
done
|
||||||
|
echo ""
|
||||||
|
echo "Scan completed!!!"
|
||||||
|
echo ""
|
||||||
|
exit
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
# Runs the check against the list of RBLs then prints a result if it is listed
|
||||||
|
function defaultscan {
|
||||||
|
for LIST in ${LISTS} ; do
|
||||||
|
if [[ $(dig +short ${BACKADDRESS}.${LIST}.) =~ 127.0.0.[2-50] ]] ; then
|
||||||
|
echo "Listed in ${LIST}"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
echo ""
|
||||||
|
echo "Scan completed!!!"
|
||||||
|
echo ""
|
||||||
|
}
|
||||||
|
|
||||||
|
# Begin Output
|
||||||
|
function defaultout {
|
||||||
|
echo ""
|
||||||
|
echo "+----------------------------------------------------------------------+"
|
||||||
|
echo ""
|
||||||
|
echo " IP Address is: " $ADDRESS
|
||||||
|
echo " Reverse DNS (if any) is: " $REVERSE
|
||||||
|
echo ""
|
||||||
|
echo "+----------------------------------------------------------------------+"
|
||||||
|
echo ""
|
||||||
|
echo ""
|
||||||
|
echo "Running query now, this may take some time..."
|
||||||
|
echo "If nothing comes up, you're not listed on known blacklists."
|
||||||
|
}
|
||||||
|
|
||||||
|
# Range Output
|
||||||
|
function rangeoutput {
|
||||||
|
echo ""
|
||||||
|
echo "+----------------------------------------------------------------------+"
|
||||||
|
echo ""
|
||||||
|
echo " Range scan started on: " $ADDRESS
|
||||||
|
echo " Subnet size: /"$SUBNETCIDR
|
||||||
|
echo ""
|
||||||
|
echo "+----------------------------------------------------------------------+"
|
||||||
|
echo ""
|
||||||
|
echo ""
|
||||||
|
echo "Running scan against this range, this may take some time..."
|
||||||
|
echo ""
|
||||||
|
echo "If nothing comes up, your range is not listed on known blocklists."
|
||||||
|
}
|
||||||
|
|
||||||
|
# Help Menu with -h
|
||||||
|
while getopts ":h" SWITCH; do
|
||||||
|
case $SWITCH in
|
||||||
|
h)
|
||||||
|
echo ""
|
||||||
|
echo "IP Blocklist checker" >&2
|
||||||
|
echo ""
|
||||||
|
echo "Usage: rblscan [ip address] <subnet in CIDR>" >&2
|
||||||
|
echo ""
|
||||||
|
exit 1
|
||||||
|
;;
|
||||||
|
\?)
|
||||||
|
echo ""
|
||||||
|
echo "Invalid option: -$OPTARG" >&2
|
||||||
|
echo "Please use -h for help" >&2
|
||||||
|
echo "Usage: rblscan [ip address] <subnet in CIDR>"
|
||||||
|
exit 1
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
|
||||||
|
rangecheck
|
||||||
|
defaultout
|
||||||
|
defaultscan
|
||||||
|
|
||||||
|
exit
|
10
bin/rebind_caps_to_esc
Executable file
10
bin/rebind_caps_to_esc
Executable file
|
@ -0,0 +1,10 @@
|
||||||
|
#!/bin/bash
|
||||||
|
# rebinds caps lock key to esc
|
||||||
|
# requires ~/.sweepswapper
|
||||||
|
|
||||||
|
if [ ! -e ~/.speedswapper ]; then
|
||||||
|
echo "$HOME/.speedswapper does not exist."
|
||||||
|
exit
|
||||||
|
fi
|
||||||
|
|
||||||
|
xmodmap ~/.speedswapper
|
Loading…
Add table
Reference in a new issue