Skip to content

Latest commit

 

History

History
115 lines (79 loc) · 5.74 KB

README.md

File metadata and controls

115 lines (79 loc) · 5.74 KB

💥

TL;DR

⛳ When you want to load all shortcuts within shell just tap bang

Update installation script & shortcut with: bang.conf.update

Quickstart

Let your environment be ready

# prerequisites
git clone https://github.com/ariary/bang.git && cd bang && ./prerequisite.sh
# zsh theme
./install/configure-zsh.sh
# load bang shortcut
export SH=zsh && echo "export PATH=$PATH:$HOME/.local/bin/" >> ~/.${SH}rc && echo "source ~/.bang/bang_conf" >> ~/.${SH}rc && echo "source ~/.bang/install/.aliases" >> ~/.${SH}rc && source ~/.${SH}rc

(Alternatively, if you want to automaticaly have them in every shell, add source ~/.bang/bang in your ~/.${SH}rc)

(We assume that you have already install zsh, otherwise replace SH envvar by bash)

You can now install tools needed by bang shortcuts!

Install tools

Ease tools installation

  • bang.conf.install-ariary: install all ariary tools useful for pentesting in ~/.local/bin/
  • bang.conf.install: install other useful tools for pentesting in ~/.local/bin/

These tools are used in bang shortcuts then.

To update the installation scripts used by these commands: bang.conf.update

  1. bang.conf.install.include golang docker
  2. bang.conf.install-ariary
  3. bang.conf.install.exclude golang docker

Bang !

Configure your pentest

⛳ When you want to load all shortcuts within shell just tap bang

Set attacker and target info: bang.conf.pentest

You could alternatively configure each item:

  • attacker addr: cAA=[ATTACKER_IP] & attacker port: cAP=[ATTACKER_PORT]
  • target addr: cTA=[TARGET_IP] & target port: cTP=[TARGET_PORT]

You could see the pentest configuration then with bang.conf.pentest.map

Shortcut Examples

List of useful bang shortcuts

List all shortcut with bang.ls

gitar (pentest easy file sharing)

fileless-xec (stealth execution of binary on a remote machine)

Queensono( Use ICMP protocol for data exchange)

jse( Extract js code from HTML page)

  • Search for HTTP request smuggling with httpecho
  • Execute shell commands from browser JS console
  • Fuzz command line

Others