Automating linux processes using python/bash scripts
- Brute force wireless passwords using
aircrack-ng - Offers force client deauthentication
- Autodetects wireless interface name
- Automatically detects operating mode of the wireless interface
- Wordlist path is
/usr/share/wordlists/rockyou.txtby default (can be changed with-woption)
Usage:
$ chmod +x wifi-crack.sh
$ sudo ./wifi-crack.sh
$ sudo ./wifi-crack.sh -w /path/to/wordlist.txt
Disable monitoring mode and just in case kill any background process running aircrack-ng:
$ sudo pkill aircrack-ng
$ sudo airmon-ng stop wlan0mon
$ sudo service network-manager restart
- Determines wether you are an ARP spoofing target by unique sorting ARP table
- If ARP spoofing is detected, script offers terminating the network interface
Usage:
$ ./arp-spoof-detect.sh
- A simple script in bash to continuously monitor system processes
Usage:
$ ./procmon.sh
- A simple python script which accepts an executable file as input argument and then communicates with VirusTotal API to check whether that file has been scanned (if yes, provide results from different AVs)
- Requires a valid VirusTotal API key to work
Usage:
$ chmod +x virustotal.py
$ sudo mv virustotal.py /bin
$ virustotal.py file.ext
- A simple script in bash to automatically align windows frame size to a custom set of coordinates
- The following resizes my terminal (has
zshin title) and Chromium browser (hasChromiumin title) - You can add/remove arbitrary windows and
-ecoordinates (gravity, x, y, w, h)
Usage:
$ ./align.sh
- Converts nmap's XML (
-oXor-oA) file to HTML using a bootstrap XSL file for visualization - Automatically opens a new tab in browser with the output HTML file to review the content
Usage:
$ ./nmap-visualize.sh /path/to/nmap-file.xml
- Requires
xclipwhich can be installed fromapt - In the following case, the content of
file.txtgets copied into the system clipboard
$ alias copy='xclip -selection c'
$ cat file.txt | copy
- The word
simpleserves a simple web server from the python module and printshttp://ip:port/for convenience
$ alias simple='ip r show | grep src | cut -d " " -f 9 | sed -e "s/^/http:\/\//" | sed "s/$/:8080\//" && python -m SimpleHTTPServer 8080'
$ simple
http://10.10.13.50:8080/
http://192.168.0.12:8080/
Serving HTTP on 0.0.0.0 port 8080 ...
- Show IPv4 address for X network interface without going through the whole
ifconfigorifconfig <netiface>output - The following shows the IPv4 address of the VPN network interface
tun0
$ alias tun0='ifconfig tun0 | grep inet | head -1 | xargs | cut -d " " -f 2'
$ tun0
10.10.13.50