#!/bin/bash # # This is script intended for provisioning vanilla Kali installation with a bunch # of additional packages, tools and dictionaries. Basically useful for not-so-quick (+/- 4hours) # provisioning of Kali distro intended for some heavy pentesting purposes. # # Assumptions made: # - script must be totally non-interactive, capable of provisioning Kali system without any # further user interaction (especially true for apt-get Y/n prompts) # - issues with tool installation/setup are acceptable, after all need arise - the pentester # will have to carry off the setup himself # - issues with unavailable repositories/packages are NOT acceptable. I need to either take care of # keeping tools list more or less up-to-date, or to remove tool's pull down entirely from the script # - only tools that I've found useful at least once are landing in this script. # # Mariusz B., '18-'19 # # Well, entire Kali installation assume that we are normally working as root on our Kali. # I know that assumption sucks to its root, but I wanted to avoid every "permission denied" issue and I was too lazy # to get it done properly as a non-root. if [ $EUID -ne 0 ]; then echo "This script must be run as root." exit 1 fi ROOT_DIR=/root git_clone() { git clone --recurse-submodules $1 } install_dotnet() { pushd /tmp wget -q https://packages.microsoft.com/config/ubuntu/18.04/packages-microsoft-prod.deb sudo dpkg -i packages-microsoft-prod.deb apt update apt install -y dotnet-sdk-2.2 popd } install_docker() { #curl -fsSL https://download.docker.com/linux/debian/gpg | sudo apt- #echo 'deb https://download.docker.com/linux/debian stretch stable' > /etc/apt/sources.list.d/docker.list #apt update #apt-get remove -y docker docker-engine docker.io #apt-get install -y docker-ce apt install -y docker docker-compose docker run hello-world } configure_neo4j() { mkdir -p /usr/share/neo4j/run/ mkdir -p /usr/share/neo4j/logs/ sed -i -r 's:#dbms.allow_upgrade=true:dbms.allow_upgrade=true:' /etc/neo4j/neo4j.conf neo4j start # Changes Neo4j credentials to: neo4j/neo4jj curl -H "Content-Type: application/json" -X POST -d '{"password":"neo4jj"}' -u neo4j:neo4j http://localhost:7474/user/neo4j/password } export DEBIAN_FRONTEND=noninteractive apt-get update ; apt upgrade -y apt-get update --fix-missing apt install -yq -m git build-essential binutils-dev vim python3 libunwind-dev python unzip python-pip python3-pip python3-venv python3-setuptools libssl-dev autoconf automake libtool python2.7-dev python3.7-dev python3-tk jq awscli npm graphviz golang neo4j libgconf-2-4 bloodhound lftp chromium heimdal-clients python-ldap rdate pcregrep lftp mingw-w64 bluetooth bluez libbluetooth-dev libudev-dev p7zip git ca-certificates build-essential libreadline5 libreadline-dev libusb-0.1-4 libusb-dev perl pkg-config wget libncurses5-dev gcc-arm-none-eabi libstdc++-arm-none-eabi-newlib libqt4-dev libpcap-dev libusb-1.0-0-dev libnetfilter-queue-dev bettercap oscanner tnscmd10g samba samba-common smbclient unrar libnfc-bin autoconf libnfc-dev tox libmariadb-dev python-m2crypto pip3 install virtualenv awscli wheel boto3 botocore btlejack pip2 install virtualenv wheel boto3 botocore pyinstaller lxml pyip ansi2html install_dotnet install_docker configure_neo4j cd $ROOT_DIR mkdir {data,dev,tools,utils,misc,work} # ------------------------------------------------------ cd $ROOT_DIR/data git_clone https://github.com/fuzzdb-project/fuzzdb.git git_clone https://github.com/danielmiessler/SecLists.git git_clone https://github.com/swisskyrepo/PayloadsAllTheThings.git git_clone https://github.com/j0bin/Pentest-Resources.git git_clone https://github.com/minimaxir/big-list-of-naughty-strings.git git_clone https://github.com/1N3/IntruderPayloads git_clone https://github.com/duyetdev/bruteforce-database.git wget https://gist.githubusercontent.com/mgeeky/8b7b1c8d9fe8be69978d774bddb6e382/raw/96f4e51d96b2203f19f6381c8c545b278eaa0837/all.txt # ------------------------------------------------------ cd $ROOT_DIR/tools mkdir {bruteforce,clouds,devops,deserialization,exploitdev,windows,redteam,recon,hardware,reversing,web,infra,fuzzers,linux,misc,privesc,ssl,sourceaudit,shells,wireless} git_clone https://github.com/mgeeky/Penetration-Testing-Tools # ======================================================================================= pushd bruteforce git_clone https://github.com/lanjelot/patator.git git_clone https://github.com/galkan/crowbar.git git clone --depth=1 --branch=master https://www.github.com/landgrey/pydictor.git && chmod 755 pydictor/pydictor.py popd # ======================================================================================= pushd clouds mkdir {aws,azure,gcp,kubernetes} # Multi-cloud tools git_clone https://github.com/nccgroup/ScoutSuite.git ; cd ScoutSuite ; virtualenv -p python3 venv ; source venv/bin/activate ; pip install -r requirements.txt ; cd .. git_clone https://github.com/Ice3man543/SubOver cd SubOver go build chmod +x SubOver cd .. # AWS related cd aws git_clone https://github.com/RhinoSecurityLabs/pacu.git ; cd pacu ; bash install.sh ; cd .. git_clone https://github.com/Alfresco/prowler.git git_clone https://github.com/sa7mon/S3Scanner.git git_clone https://github.com/ankane/s3tk.git git_clone https://github.com/andresriancho/enumerate-iam git_clone https://github.com/arkadiyt/aws_public_ips.git git_clone go get github.com/haccer/subjack.git git_clone https://github.com/Skyscanner/lambdaguard.git cd lambdaguard make install python3 setup.py install chmod +x bin/lambdaguard cd .. git_clone https://github.com/nahamsec/lazys3.git git_clone https://github.com/andresriancho/nimbostratus.git git_clone https://github.com/duo-labs/cloudmapper.git ; cd cloudmapper/ ; pipenv install --skip-lock ; pipenv shell ; cd .. git_clone https://github.com/awslabs/aws-security-benchmark.git git_clone https://github.com/VirtueSecurity/aws-extender-cli.git git_clone https://github.com/cloudsploit/scans.git mv scans cloudsploit cd cloudsploit npm install cd plugins/azure cp -r virtualmachines virtualMachines cp -r blobservice blobService cp -r resourceGroups resourcegroups cp storageAccounts/storageAccountsEncryption.js storageaccounts/ cd ../../.. git_clone https://github.com/dagrz/aws_pwn.git git_clone https://github.com/MindPointGroup/cloudfrunt.git git_clone https://github.com/nccgroup/PMapper.git git_clone https://github.com/tomdev/teh_s3_bucketeers.git git_clone https://github.com/carnal0wnage/weirdAAL.git ; cd weirdAAL ; apt-get install -y python3-venv ; python3 -m venv weirdAAL ; source weirdAAL/bin/activate ; pip3 install -r requirements.txt ; python3 create_dbs.py ; cp env.sample .env ; cd .. cd .. popd # ======================================================================================= pushd deserialization git_clone https://github.com/matthiaskaiser/jmet.git git_clone https://github.com/joaomatosf/JavaDeserH2HC.git git_clone https://github.com/pwntester/ysoserial.net.git git_clone https://github.com/frohoff/ysoserial.git git_clone https://github.com/NetSPI/JavaSerialKiller.git git_clone https://github.com/joaomatosf/jexboss.git wget 'https://jitpack.io/com/github/frohoff/ysoserial/master-SNAPSHOT/ysoserial-master-SNAPSHOT.jar' -O ysoserial/ysoserial.jar popd # ======================================================================================= pushd devops git clone --recurse-submodules -b develop https://github.com/torque59/Garfield.git git_clone https://github.com/wavestone-cdt/hadoop-attack-library.git wget https://raw.githubusercontent.com/n0tty/Random-Hacking-Scripts/master/pwnsible.sh ; chmod +x pwnsible.sh popd # ======================================================================================= pushd exploitdev git_clone https://github.com/sashs/Ropper.git git_clone https://github.com/longld/peda.git git_clone https://github.com/Gallopsled/pwntools.git git_clone https://github.com/packz/ropeme.git git_clone https://github.com/mgeeky/Exploit-Development-Tools.git popd # ======================================================================================= pushd hardware git_clone https://github.com/DrSchottky/mfcuk.git cd mfcuk automake autoconf ./configure make -j8 cd .. git_clone https://github.com/zhovner/mfdread.git git_clone https://github.com/DigitalSecurity/btlejuice.git npm install -g btlejuice git_clone https://github.com/nfc-tools/miLazyCracker.git cd miLazyCracker wget http://crapto1.netgarage.org/craptev1-v1.1.tar.xz wget http://crapto1.netgarage.org/crapto1-v3.3.tar.xz sed -ir 's/apt-get install/apt-get install -y/' miLazyCrackerFreshInstall.sh ./miLazyCrackerFreshInstall.sh cd .. git_clone https://github.com/RfidResearchGroup/proxmark3.git apt-get remove -y modemmanager cd proxmark3 make clean && make -j8 all cd .. git_clone https://github.com/mikeryan/crackle.git cd crackle make cd .. git_clone https://github.com/securing/gattacker.git npm install -g gattacker git_clone https://github.com/virtualabs/btlejack.git popd # ======================================================================================= pushd infra git_clone https://github.com/bonsaiviking/NfSpy.git git_clone https://github.com/lgandx/Responder.git git_clone https://github.com/hegusung/RPCScan.git git_clone https://github.com/fox-it/mitm6.git git_clone https://github.com/lgandx/PCredz.git git_clone https://github.com/DanMcInerney/net-creds.git git_clone https://github.com/rofl0r/proxychains-ng.git git_clone https://github.com/cisco-config-analysis-tool/ccat.git cd ccat wget https://github.com/cisco-config-analysis-tool/ccat/releases/download/v1.01/ccat_v1.01.rar mkdir ccat-release unrar x ccat_v1.01.rar ccat-release rm ccat_v1.01.rar cd .. git_clone https://github.com/brav0hax/smbexec.git git_clone https://github.com/inquisb/icmpsh.git git_clone https://github.com/tomac/yersinia.git git_clone https://github.com/threat9/routersploit.git git_clone https://github.com/hatRiot/clusterd.git git_clone https://github.com/joaomatosf/jexboss.git git_clone https://github.com/SpiderLabs/ikeforce.git git_clone https://github.com/EnableSecurity/sipvicious.git popd # ======================================================================================= pushd fuzzers git_clone https://github.com/googleprojectzero/domato.git wget http://www.immunitysec.com/downloads/SPIKE2.9.tgz ; tar -xvzf SPIKE2.9.tgz ; rm SPIKE2.9.tgz git_clone https://gitlab.com/akihe/radamsa.git git_clone https://github.com/google/honggfuzz.git cd honggfuzz make -j 8 make install cd .. wget https://github.com/shellphish/fuzzer.git wget http://lcamtuf.coredump.cx/afl/releases/afl-latest.tgz tar -xvzf afl-latest.tgz rm afl-latest.tgz cd $(find . -type d -name 'afl-*' -maxdepth 1 2>/dev/null) make -j 8 ; make install cd .. git_clone https://github.com/d0c-s4vage/gramfuzz.git git_clone https://github.com/nccgroup/Hodor.git git_clone https://github.com/OpenRCE/sulley.git git_clone https://github.com/renatahodovan/grammarinator.git popd # ======================================================================================= pushd linux git_clone https://github.com/Arr0way/linux-local-enumeration-script.git git_clone https://github.com/CISOfy/lynis.git popd # ======================================================================================= pushd misc git_clone https://github.com/nullsecuritynet/tools.git git_clone https://github.com/leebaird/discover.git git_clone https://github.com/dxa4481/truffleHog.git git_clone https://github.com/internetwache/GitTools.git git_clone https://github.com/kost/dvcs-ripper.git git_clone https://github.com/XiphosResearch/exploits.git git_clone https://github.com/wireghoul/graudit.git git_clone https://github.com/netbiosX/Checklists.git popd # ======================================================================================= pushd privesc git_clone https://github.com/AusJock/Privilege-Escalation.git popd # ======================================================================================= pushd recon git_clone https://github.com/FortyNorthSecurity/EyeWitness.git git_clone https://github.com/OWASP/Amass.git git_clone https://github.com/michenriksen/gitrob.git git_clone https://github.com/darkoperator/dnsrecon.git git_clone https://github.com/smicallef/spiderfoot.git git_clone https://github.com/lanmaster53/recon-ng.git ; cd recon-ng ; pip install -r REQUIREMENTS ; cd .. git_clone https://github.com/infosec-au/altdns.git git_clone https://github.com/jhaddix/domain.git mv domain jhaddix-enumall cat < jhaddix-enumall/config.py reconPath = "$PWD/recon-ng/" altDnsPath = "$PWD/altdns/" EOT cd jhaddix-enumall chmod 755 enumall.py cp $(find $ROOT_DIR/data/SecLists/Discovery/DNS/*knock*.txt) sorted_knock_dnsrecon_fierce_recon-ng.txt cd .. git_clone https://github.com/subfinder/subfinder.git cd subfinder go build chmod +x subfinder cd .. git_clone https://github.com/aboul3la/Sublist3r.git git_clone https://github.com/michenriksen/aquatone.git git_clone https://github.com/dxa4481/truffleHog.git popd # ======================================================================================= pushd redteam git_clone https://github.com/jaredhaight/PSAttack.git cd PSAttack wget https://github.com/jaredhaight/PSAttack/releases/download/v1.99.1/PSAttack-1.99.1.zip unzip -d . PSAttack-1.99.1.zip cd .. git_clone https://github.com/danielbohannon/Invoke-Obfuscation.git git_clone https://github.com/FuzzySecurity/PowerShell-Suite.git git_clone https://github.com/rvrsh3ll/Misc-Powershell-Scripts.git git_clone https://github.com/Kevin-Robertson/Inveigh.git git_clone https://github.com/Kevin-Robertson/Tater.git git_clone https://github.com/BloodHoundAD/BloodHound.git git_clone https://github.com/fox-it/BloodHound.py.git git_clone https://github.com/EmpireProject/Empire.git git_clone https://github.com/PowerShellMafia/PowerSploit.git git_clone https://github.com/samratashok/nishang.git git_clone https://github.com/dirkjanm/krbrelayx.git git_clone https://github.com/SySS-Research/Seth.git git_clone https://github.com/ropnop/windapsearch.git git_clone https://github.com/stufus/ADOffline.git git_clone https://github.com/Veil-Framework/Veil.git git_clone https://github.com/Veil-Framework/Veil-Evasion.git git_clone https://github.com/pentestgeek/phishing-frenzy.git git_clone https://github.com/trustedsec/social-engineer-toolkit.git git_clone https://github.com/bluscreenofjeff/Malleable-C2-Randomizer.git git_clone https://github.com/sensepost/ruler.git cd ruler wget https://github.com/sensepost/ruler/releases/latest/download/ruler-win64.exe wget https://github.com/sensepost/ruler/releases/latest/download/ruler-linux32.exe wget https://github.com/sensepost/ruler/releases/latest/download/ruler-linux64.exe cd .. git_clone https://github.com/rsmudge/Malleable-C2-Profiles.git git_clone https://github.com/sense-of-security/ADRecon.git git_clone https://github.com/threatexpress/malleable-c2.git git_clone https://github.com/ropnop/kerbrute.git cd kerbrute wget https://github.com/ropnop/kerbrute/releases/latest/download/kerbrute_windows_amd64.exe wget https://github.com/ropnop/kerbrute/releases/latest/download/kerbrute_windows_386.exe wget https://github.com/ropnop/kerbrute/releases/latest/download/kerbrute_linux_amd64 wget https://github.com/ropnop/kerbrute/releases/latest/download/kerbrute_linux_386 chmod +x kerbrute_* cd .. git_clone https://github.com/Raikia/CredNinja.git git_clone https://github.com/cobbr/Covenant.git cd Covenant dotnet build cd Covenant dotnet build docker build -t covenant . echo "docker run -it -p 7443:7443 -p 80:80 -p 443:443 --name covenant -v $ROOT_DIR/tools/redteam/Covenant/Covenant/Data:/app/Data covenant --username Admin --computername 0.0.0.0" > start-covenant-docker.sh chmod +x start-covenant-docker.sh cd ../.. git_clone https://github.com/cobbr/Elite.git cd Elite dotnet build cd Elite dotnet build docker build -t elite . echo "docker run -it --rm --name elite -v $ROOT_DIR/tools/redteam/Elite/Elite/Data:/app/Data elite --username Admin --computername"'$1' > start-elite-docker.sh chmod +x start-elite-docker.sh cd ../.. docker stop $(docker ps -aq) docker rm $(docker ps -aq) git_clone https://github.com/tevora-threat/PowerView3-Aggressor.git git_clone https://github.com/tevora-threat/SharpView.git git_clone https://github.com/SpiderLabs/SharpCompile.git sed -i -r 's:/tmp/SharpCompileTemp/:/tmp/:' SharpCompile/SharpCompile.cna git_clone https://github.com/cobbr/SharpGen.git cd SharpGen dotnet build wget https://gist.githubusercontent.com/mgeeky/a3f54a08ae08aa267b76f75a35c11211/raw/268614427acc69c92e57b222e2235e1891425e97/sharpgen.cna sed -i -r "s:/usr/local/share/dotnet/dotnet:$(which dotnet):" sharpgen.cna sed -i -r "s:/Users/dtmsecurity/Tools/SharpGen/bin/Debug/netcoreapp2.1/SharpGen.dll:$(pwd)/bin/Debug/netcoreapp2.1/SharpGen.dll:" sharpgen.cna cd .. #git_clone https://github.com/chrismaddalena/SharpCloud.git git_clone https://github.com/BloodHoundAD/SharpHound.git cd SharpHound wget https://github.com/BloodHoundAD/BloodHound/raw/master/Ingestors/SharpHound.exe wget https://raw.githubusercontent.com/BloodHoundAD/BloodHound/master/Ingestors/SharpHound.ps1 cd .. git_clone https://github.com/BloodHoundAD/BloodHound.git cd BloodHound wget https://github.com/BloodHoundAD/BloodHound/releases/latest/download/BloodHound-linux-x64.zip wget https://github.com/BloodHoundAD/BloodHound/releases/latest/download/BloodHound-win32-x64.zip wget https://github.com/BloodHoundAD/BloodHound/releases/latest/download/BloodHound-win32-ia32.zip for a in *.zip ; do unzip -d . $a rm $a done cd .. git_clone https://github.com/BloodHoundAD/BloodHound-Tools.git cd BloodHound-Tools/DBCreator pip install neo4j-driver echo -e "connect\ngenerate\nexit" | python DBCreator.py cd ../.. git_clone https://github.com/GhostPack/Seatbelt.git git_clone https://github.com/GhostPack/SharpDump.git git_clone https://github.com/GhostPack/Rubeus.git git_clone https://github.com/GhostPack/SharpRoast.git git_clone https://github.com/GhostPack/SharpDPAPI.git git_clone https://github.com/GhostPack/SharpUp.git git_clone https://github.com/GhostPack/SharpView.git git_clone https://github.com/GhostPack/SharpWMI.git git_clone https://github.com/tyranid/DotNetToJScript.git git_clone https://github.com/gentilkiwi/mimikatz.git git_clone https://github.com/brav0hax/smbexec.git git_clone https://github.com/SecureAuthCorp/impacket.git cd impacket ; mkdir binaries ; cd binaries ; wget https://github.com/ropnop/impacket_static_binaries/releases/latest/download/impacket_windows_binaries.zip unzip -d . impacket_windows_binaries.zip rm impacket_windows_binaries.zip wget https://github.com/ropnop/impacket_static_binaries/releases/latest/download/impacket_linux_binaries.tar.gz tar xzf impacket_linux_binaries.tar.gz rm impacket_linux_binaries.tar.gz python setup.py install cd ../../ git_clone https://github.com/rasta-mouse/Watson.git popd # ======================================================================================= pushd reversing wget https://ghidra-sre.org/ghidra_9.0_PUBLIC_20190228.zip -O ghidra.zip ; unzip -d . ghidra.zip ; rm ghidra.zip git_clone https://github.com/longld/peda.git ; echo "source $ROOT_DIR/tools/reversing/peda/peda.py" >> $ROOT_DIR/.gdbinit ; git_clone https://github.com/hugsy/gef.git git_clone https://github.com/radare/radare2.git ; cd radare2 ; sys/install.sh ; r2pm init ; r2pm update ; pip install r2pipe ; cd .. popd # ======================================================================================= pushd shells git_clone https://github.com/BlackArch/webshells.git git_clone https://github.com/Ne0nd0g/merlin.git popd # ======================================================================================= pushd sourceaudit git_clone https://github.com/presidentbeef/brakeman.git git_clone https://github.com/wireghoul/graudit.git popd # ======================================================================================= pushd ssl git_clone https://github.com/rbsec/sslscan.git git clone --depth 1 https://github.com/drwetter/testssl.sh.git git_clone https://github.com/tomato42/tlsfuzzer.git popd # ======================================================================================= pushd web git_clone https://github.com/mgeeky/tomcatWarDeployer.git git_clone https://github.com/codingo/NoSQLMap.git git_clone https://github.com/commixproject/commix.git git_clone https://github.com/droope/droopescan.git git_clone https://github.com/enjoiz/XXEinjector.git git_clone https://github.com/breenmachine/httpscreenshot.git git_clone https://github.com/beefproject/beef/ ; pushd beef ; yes | ./install ; popd git_clone https://github.com/sqlmapproject/sqlmap.git mkdir aquatone ; cd aquatone wget https://github.com/michenriksen/aquatone/releases/latest/download/aquatone_linux_amd64_1.6.0.zip unzip -d . aquatone_linux_amd64_1.6.0.zip rm aquatone_linux_amd64_1.6.0.zip chmod +x aquatone cd .. git_clone https://github.com/RhinoSecurityLabs/SleuthQL git_clone https://github.com/EnableSecurity/wafw00f.git git_clone https://github.com/nodesecurity/eslint-plugin-security ; npm install --save-dev eslint-plugin-security cat <> $ROOT_DIR/.eslintrc "plugins": [ "security" ], "extends": [ "plugin:security/recommended" ] EOT git_clone https://github.com/epinna/tplmap.git git_clone https://github.com/jekyc/wig.git git_clone https://github.com/wpscanteam/wpscan.git git_clone https://github.com/sullo/nikto.git git_clone https://github.com/gw0/PadBuster.git git_clone https://github.com/OJ/gobuster.git git_clone https://github.com/GerbenJavado/LinkFinder.git git_clone https://github.com/ticarpi/jwt_tool.git git_clone https://github.com/dnoiz1/git-money.git git_clone https://github.com/arthaud/git-dumper.git git_clone https://github.com/mogwaisec/mjet.git git_clone https://github.com/NickstaDB/BaRMIe.git git_clone https://github.com/torque59/Nosql-Exploitation-Framework.git popd # ======================================================================================= pushd windows git_clone https://github.com/M4ximuss/Powerless.git git_clone https://github.com/SecWiki/windows-kernel-exploits.git git_clone https://github.com/smgorelik/Windows-RCE-exploits.git git_clone https://github.com/abatchy17/WindowsExploits.git git_clone https://github.com/GDSSecurity/Windows-Exploit-Suggester.git git_clone https://github.com/brianwrf/WinSystemHelper.git git_clone https://github.com/pentestmonkey/windows-privesc-check.git git_clone https://github.com/rootm0s/WinPwnage.git cd WinPwnage pip install -r requirements.txt python build.py winpwnage.py pyinstaller --onefile winpwnage.py cd .. popd # ======================================================================================= pushd wireless git_clone https://github.com/brav0hax/easy-creds.git git_clone https://github.com/s0lst1c3/eaphammer.git ; cd eaphammer ; yes | ./kali-setup ; cd .. git_clone https://github.com/derv82/wifite2.git ; cd wifite2 ; python setup.py install ; cd .. popd # ======================================================================================= # # Follow repos, collect 'requirements.txt' files and feed them into `pip install`. # We avoid the hassle of using virtualenv here and there. # find . -name .git | while read line; do echo $line pushd "$(dirname $line)" if [ -f 'requirements.txt' ]; then pip install -r requirements.txt; pip3 install -r requirements.txt; elif [ -f 'Gemfile' ]; then bundle install fi popd done # Append some stuff to bashrc cat <<'EOF' >> $ROOT_DIR/.bashrc stty start undef # To get Ctrl-s working (forward command search, i-search) stty -ixon # # ENVIRONMENT VARIABLES # PROMPT_CHAR=$(if [ "$(whoami)" == "root" ] ; then echo "#" ; else echo "$" ; fi) HOST_COLOR=$(if [ "$(whoami)" == "root" ] ; then echo "6" ; else echo "1" ; fi) export PS1="\[\e[0;3${HOST_COLOR}m\]\H\[\e[0;37m\]|\[\e[0;32m\]\A\[\e[0;37m\]|\[\e[0;33m\]\w\[\e[0;3${HOST_COLOR}m\] ${PROMPT_CHAR} \[\e[1;0m\]" # My aliases alias ls='ls --color=auto' alias ll='ls -l --color=auto' alias la='ls -la' alias l='ls -CF' alias lsl="ls -lhFA | less" alias ls-l="ls -l" alias cd..="cd .." alias ..='cd ..' alias ...='cd ../../../' alias ....='cd ../../../../' alias .....='cd ../../../../' alias .4='cd ../../../../' alias .5='cd ../../../../..' alias dudirs='for a in `find . -mindepth 1 -maxdepth 1 -type d`; do echo $a... ; du -csh "$a" 2> /dev/null | grep -v total ; done' # Use less if output is bigger than screen alias less="less -F -X -R" alias ifconfig="sudo ifconfig -a" alias reload=". ~/.bashrc" # The Exits Family alias ':q'='exit' alias ':Q'='exit' alias ':x'='exit' alias ':X'='exit' alias ':w'='exit' alias ':W'='exit' alias 'q'='exit' alias 'Q'='exit' alias sudo='sudo ' alias fuck='sudo $(history -p \!\!)' alias mkdir="mkdir -pv" alias wget="wget -c" alias histg="history | grep" alias remoteip="(curl -s https://api.ipify.org/ && echo)" alias commandstat="history | awk '{CMD[$2]++;count++;}END { for (a in CMD)print CMD[a] \" \" CMD[a]/count*100 \"% \" a;}' | grep -v \"./\" | column -c3 -s \" \" -t | sort -nr | nl | head -n10" # Searchable process table alias psg="ps aux | grep -v grep | grep -i -e VSZ -e" # Copy working directory path alias cpwd="pwd | tr -d "\n" | setclip" alias meminfo='free -m -l -t' ## get top process eating memory alias psmem='ps auxf | sort -nr -k 4' alias psmem10='ps auxf | sort -nr -k 4 | head -10' ## get top process eating cpu ## alias pscpu='ps auxf | sort -nr -k 3' alias pscpu10='ps auxf | sort -nr -k 3 | head -10' alias hex2raw="tr -d '\\\x' | xxd -r -p" alias prettyjson='python -m json.tool' function killallbyname() { sudo kill -9 $(psg $1 | fawk 2 | tail -n +2 | xargs) } function extract { if [ -z "$1" ]; then # display usage if no parameters given echo "Usage: extract ." else if [ -f "$1" ] ; then NAME=${1%.*} #mkdir $NAME && cd $NAME case "$1" in *.tar.bz2) tar xvjf ./"$1" ;; *.tar.gz) tar xvzf ./"$1" ;; *.tar.xz) tar xvJf ./"$1" ;; *.lzma) unlzma ./"$1" ;; *.bz2) bunzip2 ./"$1" ;; *.rar) unrar x -ad ./"$1" ;; *.gz) gunzip ./"$1" ;; *.tar) tar xvf ./"$1" ;; *.tbz2) tar xvjf ./"$1" ;; *.tgz) tar xvzf ./"$1" ;; *.zip) unzip ./"$1" ;; *.Z) uncompress ./"$1" ;; *.7z) 7z x ./"$1" ;; *.xz) unxz ./"$1" ;; *.exe) cabextract ./"$1" ;; *) echo "extract: '$1' - unknown archive method" ;; esac else echo "'$1' - file does not exist" fi fi } # Get N column from the output. # Usage, e.g.: df -h | fawk 2 function fawk { first="awk '{print " last="}'" cmd="${first}\$${1}${last}" eval $cmd } # =================================== # Random number from specified range # randnum() { if [ "$#" -ne 2 ]; then echo "Usage: randnum " return 0 fi if [ $2 -lt $1 ]; then echo "Upper boundary must be greater than lower!" return 0 fi echo $((RANDOM % ($2-$1) + $1)) | bc } # Random string with desired length randstring() { if [ "$#" -ne 1 ]; then echo "Usage: randstring " return 0 fi if [ $1 -le 0 ]; then echo "Length must be greater than 0!" return 0 fi cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w $1 | head -n 1 } # # ======================================================= # COLORS # # Restore default color setting. # By default, set it to white color instead of actual restore. RESTORE=$(echo -en '\033[0m') RED=$(echo -en '\033[00;31m') GREEN=$(echo -en '\033[00;32m') YELLOW=$(echo -en '\033[00;33m') BLUE=$(echo -en '\033[00;34m') MAGENTA=$(echo -en '\033[00;35m') PURPLE=$(echo -en '\033[00;35m') CYAN=$(echo -en '\033[00;36m') LIGHTGRAY=$(echo -en '\033[00;37m') LRED=$(echo -en '\033[01;31m') LGREEN=$(echo -en '\033[01;32m') LYELLOW=$(echo -en '\033[01;33m') LBLUE=$(echo -en '\033[01;34m') LMAGENTA=$(echo -en '\033[01;35m') LPURPLE=$(echo -en '\033[01;35m') LCYAN=$(echo -en '\033[01;36m') WHITE=$(echo -en '\033[01;37m') red() { echo $RED$1$RESTORE } green() { echo $GREEN$1$RESTORE } yellow() { echo $YELLOW$1$RESTORE } blue() { echo $BLUE$1$RESTORE } magenta() { echo $MAGENTA$1$RESTORE } purple() { echo $PURPLE$1$RESTORE } cyan() { echo $CYAN$1$RESTORE } lightgray() { echo $LIGHTGRAY$1$RESTORE } lred() { echo $LRED$1$RESTORE } lgreen() { echo $LGREEN$1$RESTORE } lyellow() { echo $LYELLOW$1$RESTORE } lblue() { echo $LBLUE$1$RESTORE } lmagenta() { echo $LMAGENTA$1$RESTORE } lpurple() { echo $LPURPLE$1$RESTORE } lcyan() { echo $LCYAN$1$RESTORE } white() { echo $WHITE$1$RESTORE } # # ======================================================= # OTHER TWEAKS & HACKS # export HISTCONTROL=ignoredups:erasedups # no duplicate entries export HISTSIZE=100000 # big big history export HISTFILESIZE=100000 # big big history shopt -s histappend # append to history, don't overwrite it # Save and reload the history after each command finishes export PROMPT_COMMAND="history -a; history -c; history -r; $PROMPT_COMMAND" # # ======================================================= # ENVIRONMENT DEPENDING # export ENCLIP_RECIPIENT= export LESS='-F -R -X $LESS' export LESSOPEN='|~/.lessfilter %s' alias forcefullists='find ~/data/SecLists/Discovery/Web_Content/ -type f -exec sh -c "wc -l {}" \; | column -t | sort -k1,1nr | head -n 30' defaultiface=`ip route ls | grep default | pcregrep -o1 '.+dev (\S+).+'` alias diface=`echo $defaultiface` function nmapscripts() { find /usr/share/nmap/scripts/ -exec basename {} \; | grep -i "$1" | column } alias bcb='~/tools/Penetration-Testing-Tools/web/burp-curl-beautifier.py' alias mirror='wget -mkEpnp -e robots=off' alias web1='python -m SimpleHTTPServer' alias web2='ruby -run -ehttpd . -p8000' alias eslintjs='eslint --no-eslintrc -c ~/.eslintrc.js .' alias unblock_dir='sudo chmod -R 755' alias block_dir='sudo chmod -R 700' alias recursivegitpull='find . -name ".git" -type d -exec echo {} \; -exec git -C {}/.. pull \;' EOF sed -i -r "s:~/:$ROOT_DIR/:" $ROOT_DIR/.bashrc