Quantcast
Channel: AfterShell.com - Information Security Blog » unix
Browsing all 5 articles
Browse latest View live

SU brute force using python with pexpect library

Here is a simple python script (subruter-single.py) for su brute force that i made a few years ago. This script is using pexpect library which can be downloaded from here. Select All Code:1 2 3 4 5 6 7...

View Article



Check your system for vulnerabilities using CVEChecker

The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database. Indeed, this is not a bullet-proof...

View Article

The basics of Screen command

Screen command is useful for any pentester out there , so let's recall some information about this command: The word efficiency can mean different things for different people. When it comes to Linux...

View Article

Post Exploitation Commands Lists for Windows, Unix, OSX

Here are some Cheat Sheet to use as a reminder after owning Windows, Linux or Mac systems: Linux/Unix/BSD Post Exploitation: Download Windows Post Exploitation: Download OSX Post Exploitation: Download...

View Article

Image may be NSFW.
Clik here to view.

Extract URLs from Google search results

If you need to extract all the links / URLs from a Google search you can use the following commands: Select All Code:1 2 wget -q -U "Mozilla/5.001" -O -...

View Article

Browsing all 5 articles
Browse latest View live




Latest Images