Skip to content
/ freeuse Public

Some useful codes and scripts for penetration testing and red teaming

Notifications You must be signed in to change notification settings

jxroot/freeuse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

logo

freeuse


Some useful codes and scripts

📜 Table of Contents

Powershell

PowerShell

find_file.ps1 tested on powershell v5+

find_file

This PowerShell script is designed to search for files across specified drives, filtering them based on their file extensions, and then returning information about the files.

Customization Options:

To show only counts: Set $showPaths = $false.
To process all files: Set $processAll = $true, and use $excludeExtensions to specify which file types to ignore.
To include specific file types: Use $includeExtensions to list the extensions you want to process, and set $processAll = $false.
To process all drives: Set $selectedDrives = @() to include all filesystem drives.

This script is flexible and allows detailed control over what types of files to search for, which drives to search, and whether to display full file paths or just counts.

system_info.ps1 tested on powershell v5+

system_info

This PowerShell script collects a variety of system information, formats it into an HTML page, and opens that page in the default web browser.

check_cred.ps1 tested on powershell v5+

check_cred

Function to test credentials locally or remotely

Usage:

# Example usage for local testing with a plain-text password
Test-Credential -Scope "Local" -CredentialUserName "mohammad" -PlainPassword "MySecurePassword123"

# Example usage for remote testing with a plain-text password
Test-Credential -Scope "Remote" -ComputerName "RemoteServer01" -CredentialUserName "DOMAIN\Username" -PlainPassword "MySecurePassword123"

Bash

Bash

setup_tor_apache.sh tested on ubuntu 23

system_info

The provided script automates the process of setting up a Tor hidden service using Apache on an Ubuntu system.

Python

Python

Browser_Password .py tested on Windows 11 Build 26100

system_info

This Python script is designed to extract and decrypt saved login credentials (i.e., usernames and passwords) from several popular Chromium-based browsers, including Brave, Chrome, Opera, Edge, Chromium, and Arc. The script targets the Login Data database file and uses the Local State file for decryption keys, leveraging the AES encryption used by these browsers.

About

Some useful codes and scripts for penetration testing and red teaming

Resources

Stars

Watchers

Forks