This commit is contained in:
vulpine 2020-09-12 22:19:19 -04:00
parent c769bffad7
commit bcd0629b0b
8 changed files with 57 additions and 6 deletions

44
bl.cgi Executable file
View File

@ -0,0 +1,44 @@
#!/bin/bash
echo "Content-Type: text/plain"
echo
Q=$(echo "$QUERY_STRING" | sed -n 's/^.*q=\([^&]*\).*$/\1/p' | sed "s/%20/ /g; s/%2F/\//g; s/%5C/\\\/g" | sed "s/+/ /g; s/%2B/+/")
if [[ $Q ]]
then
grep "$Q" bl.txt || echo "0 0 Not found in blacklist"
else
cat <<EOF
# shoxf bl
# to query this, simply use a ?q=<ip> query string
#
# shoxf bl outputs data in tsv format. a typical responce would look like:
# 127.0.0.1 1
# the second part is the category type
#
# category types:
# 1: abused ip
# 11: malware/botnet
# 111: DDoS drone
# 112: IRC drone
# 12: portscanning
# 2: vpn/proxy
# 21: open proxy
# 211: open socks
# 212: open http/webpage proxy
# 22: abused vpn/proxy
#
# you might notice that additional digits = sub-category :3
EOF
fi

2
scan
View File

@ -2,6 +2,6 @@
for fn in $@; do
echo "scanning $fn"
nmap -A -T4 --script ssl-cert $fn | tee -a "index/$fn.txt"
nmap -A -T4 --script ssl-cert,http-headers $fn | tee -a "index/$fn.txt"
done

2
scan1
View File

@ -1,4 +1,4 @@
#!/bin/bash
nmap -A -T4 --script ssl-cert $@ | tee -a "index/$1.txt"
nmap -A -T4 --script ssl-cert,http-headers $@ | tee -a "index/$1.txt"

2
scan6
View File

@ -2,6 +2,6 @@
for fn in $@; do
echo "scanning $fn"
nmap -6 -A -T4 --script ssl-cert $fn | tee -a "index/$fn.txt"
nmap -6 -A -T4 --script ssl-cert,http-headers $fn | tee -a "index/$fn.txt"
done

2
scanap
View File

@ -2,6 +2,6 @@
for fn in $@; do
echo "scanning $fn"
nmap -p 10799 -T5 --script ssl-cert $fn | tee -a "index/$fn.txt"
nmap --script http-headers,ssl-cert -p 80,443 -Pn -T5 $fn | tee -a "index/$fn.txt"
done

2
scann
View File

@ -2,6 +2,6 @@
for fn in $@; do
echo "scanning $fn"
nmap -A -T4 --script ssl-cert $fn -Pn | tee -a "index/$fn.txt"
nmap -p 1231,1232,1233,1234 -T4 --script ssl-cert $fn | tee -a "index/$fn.txt"
done

7
scansn Executable file
View File

@ -0,0 +1,7 @@
#!/bin/bash
for fn in $@; do
echo "scanning $fn"
nmap -sn $fn | tee -a "index/$fn.txt"
done

2
whois
View File

@ -3,6 +3,6 @@
for fn in $@; do
echo "scanning $fn"
echo "Starting WHOIS $fn" | tee -a "index/$fn.txt"
whois $fn | grep Abuse | tee -a "index/$fn.txt"
whois $fn | grep 'Abuse\|NetName\|descr:' | tee -a "index/$fn.txt"
done