├── Bash fOR eTHICAL hACKERS.png ├── LICENSE ├── README.MD ├── admin-panel-finder.sh ├── admin-panel-sniffer.sh ├── arp-spoofing-detect.sh ├── fakemail.sh ├── get-wifi-pass.sh ├── hack-gmail.sh ├── hulkscanner.sh ├── keylogger.sh ├── netdiscover.sh ├── network-monitor.sh ├── shodan-api.sh ├── wpscan.sh └── xss-vulnerability-finder.sh /Bash fOR eTHICAL hACKERS.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/R3DHULK/bash-for-ethical-hackers/80134086bbcfb760d98cfd9e78696f4aa6081f64/Bash fOR eTHICAL hACKERS.png -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2022 Sumalya Chatterjee 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.MD: -------------------------------------------------------------------------------- 1 |

Bash For Ethical Hackers

2 | Typing SVG 3 | 4 | 5 | # 6 | Typing SVG 7 | 8 | # 9 |

🔴 Also Check out My Python For Ethical Hacking Project

10 | 11 | # 12 |

Author :

Sumalya Chatterjee

13 | 14 | # 15 | ![Alt text](Bash%20fOR%20eTHICAL%20hACKERS.png) 16 | 17 | # 18 |

What is Ethical Hacking?

19 |

The term hacking goes a long way back. To be exact, it all started at the Railroad Club of MIT, where both the term ‘hacking’ and ‘hacker’ were first coined. It’s been almost 50 years now, and hacking has evolved into a discipline in the current day and age. With the increase in awareness regarding data protection and data privacy, hacking has been deemed as an illegal activity today. If caught, there’s a good chance that you will be prosecuted for quite some time depending on the degree of harm caused. 20 | 21 | None the less, to protect themselves from hackers of all sorts, employment of Ethical Hackers has become a common practice amongst organizations. Ethical hackers are given the responsibility of finding and fixing security flaws for a certain organization before black hat hackers find them.


22 | 23 | # 24 | 25 |

What Is a Scripting Language? How Does a Scripting Language Differ From a Programming Language?

26 |

A scripting language is a variant type of programming language which doesn’t need compilers to execute. Those who are not from a programming background may not understand the statement. Let us break it for non-programmers. 27 | 28 | To understand what a scripting language makes different from a programming language. Programming language needs a special type of utility called a compiler to run a program. Before a program runs, the compiler does pre-execution checks and converts the program to machine code. Then machine code will be sent to the runtime environment for execution. On the other hand, scripting languages just interpret the written code line by line and directly send the code to the runtime environment tor execution without compiling it.


29 | 30 | # 31 |

Why Are Scripting Languages Suitable for Hackers and Pentesters Than Programming Languages?

32 |

Most of the scripting languages are interpreted. Scripting languages can be run without compiling them. This feature lets hackers and pentesters directly run their scripts on the victim without compilers. Another reason would be because scripts are light to run and transfer to the target machine. In addition to those, another feature that gives the upper hand is execution time. Scripting languages are faster in execution. It can be easily weaponized; All this makes scripting language a perfect programming language for hackers and pentesters. 33 | 34 | We have covered the six most commonly used programming languages by hackers and pentesters in another article. However, we are going to cover the six most common scripting languages for hackers and pentesters in this article. However, we are not assigning any rank to all these scripting languages. We believe each language has developed with unique features. Please don’t consider the language placed in first is the most important than the placed at the sixth position. Let’s start with Bash scripting language.


35 | 36 | # 37 |

Why Bash?

38 |

Bash is the most popular and powerful scripting language in Unix and Linux systems. It’s been widely used by administrators to manage everyday tasks. Basically, Bash is a set of Linux commands used to perform pretty much anything like automating repetitive tasks, scheduling admin jobs, running health checks on the Linux servers, updating patcher on multiple servers at once, etc. In addition to these, it can also be used with other utilities to build productive scripts, which can help administrators carry out difficult tasks. All these powerful features of Bash script didn’t leave hackers and pentesters gaining attention to Bash scripting. Hackers and Pentesters found this as a great tool to perform hacking or pentesting the system. Because Bash can be used with other networks, hacking tools, and programming languages to deliver the payload to the target, it helps exfilleting the data from the victim and create a remote executable application.


39 | 40 | # 41 |

Project Is Automated For Downloading Softwares From My Main Software Repos. Have A Look On IT 👇👇👇

42 | 43 | ## 01. [Admin Panel Finder](https://github.com/R3DHULK/is-this-your-admin) 44 | ## 02. [Arp Spoofing](https://github.com/R3DHULK/mission-arp) 45 | ## 03. [Arp Spoofing Detection](https://github.com/R3DHULK/mission-arp) 46 | ## 04. [Banner Grabber](https://github.com/R3DHULK/BannerGrab) 47 | ## 05. [BruteForce SSH](https://github.com/R3DHULK/bruteforce_ssh) 48 | ## 06. [Target: Chrome ](https://github.com/R3DHULK/targetting-chrome) 49 | ## 07. [DDOS](https://github.com/R3DHULK/HULK) 50 | ## 08. [Malware In Python](https://github.com/R3DHULK/malware-in-python) 51 | ## 09. [Image Exif Tool](https://github.com/R3DHULK/exif) 52 | ## 10. [PDF Exifs Remover](https://github.com/R3DHULK/exif) 53 | ## 11. [PDF Exif Tool](https://github.com/R3DHULK/pdf-exif) 54 | ## 12. [Fake Mail](https://github.com/R3DHULK/fakemail) 55 | ## 13. [Keylogger](https://github.com/R3DHULK/keylogger-in-python) 56 | ## 14. [Password Sniffer](https://github.com/R3DHULK/passwordsniffer) 57 | ## 15. [File Monitor](https://github.com/R3DHULK/watchdog) 58 | ## 16. [Get Wifi-Password](https://github.com/R3DHULK/get_wifipass) 59 | ## 17. [System Information Gathering](https://github.com/R3DHULK/get-system-information) 60 | ## 18. [IP Scanner](https://github.com/R3DHULK/ip-scanner) 61 | ## 19. [Gmail Hacking](https://github.com/R3DHULK/ip-scanner) 62 | ## 20. [Network Monitoring](https://github.com/R3DHULK/all-about-network) 63 | ## 21. [Network Scanner](https://github.com/R3DHULK/ip-scanner) 64 | ## 22. [Port Scanner](https://github.com/R3DHULK/HulkScanner) 65 | ## 23. [Random Password And Token Generator](https://github.com/R3DHULK/password_and_token-generator) 66 | ## 24. [Shut Down My PC (For Windows Users Only)](https://github.com/R3DHULK/shut-my-pc-down) 67 | ## 25. [Shodan](https://github.com/R3DHULK/utilise_SHODAN-API) 68 | ## 26. [Sql Injection Detection](https://github.com/R3DHULK/sql-injection-detector) 69 | ## 27. [Steganography](https://github.com/R3DHULK/steganography) 70 | ## 28. [Subdomain Finder](https://github.com/R3DHULK/find-subdomains) 71 | ## 29. [Wifi DDoS Attack](https://github.com/R3DHULK/target-wifi) 72 | ## 30. [XSS Vulnerability Scanner](https://github.com/R3DHULK/xss-police) 73 | ## 31. [TCP Scanner](https://github.com/R3DHULK/HulkScanner) 74 | ## 32. [BruteForce Password](https://github.com/R3DHULK/bruteforce-password) 75 | ## 33. [Linux Password Cracker](https://github.com/R3DHULK/linux-pass-cracker) 76 | ## 34. [Bad USB](https://github.com/R3DHULK/bad-usb) 77 | ## 35. [Fake Details Generator](https://github.com/R3DHULK/lets-fake-it) 78 | ## 36. [Password Sniffer](https://github.com/R3DHULK/passwordsniffer) 79 | ## 37. [PwnKit Exploit](https://github.com/R3DHULK/Pwnkit-exploit) 80 | ## 38. [Mac Address Changer](https://github.com/R3DHULK/Mac-Changer) 81 | ## 39. [Anonymity Checker](https://github.com/R3DHULK/am-i-anonymous) 82 | 83 | # 84 |

Git Installation For Termux And Linux :

85 | 86 | ``` 87 | sudo apt install git 88 | 89 | sudo apt install python 90 | 91 | git clone https://github.com/R3DHULK/bash-for-ethical-hackers 92 | 93 | cd bash-for-ethical-hackers 94 | ``` 95 | # 96 |

For Termux Users

97 |

Use Script :

98 | 99 | $ chmod +x * 100 | $ bash or ./ 101 | 102 | # 103 |

For Linux Users

104 |

Run Command With Sudo

105 | 106 | $ chmod +x * 107 | $ sudo bash or ./ 108 | # 109 |

Found Issues??

110 |

111 | 112 |

In Future Releases Founded Bugs Will Be Resolved And Many Other Tools Will Be Added 😇😇😊😊

113 | 114 | # 115 |

Show Support 👇👇👇

116 | https://www.buymeacoffee.com/r3dhulk

117 | 118 | -------------------------------------------------------------------------------- /admin-panel-finder.sh: -------------------------------------------------------------------------------- 1 | clear 2 | apt install git 3 | 4 | git clone https://github.com/R3DHULK/is-this-your-admin/ 5 | 6 | clear 7 | 8 | cd is-this-your-admin 9 | 10 | clear 11 | 12 | apt install python 13 | 14 | clear 15 | 16 | python -m pip install -r requirements.txt 17 | 18 | clear 19 | 20 | python admin-panel-finder.py 21 | -------------------------------------------------------------------------------- /admin-panel-sniffer.sh: -------------------------------------------------------------------------------- 1 | git clone https://github.com/R3DHULK/is-this-your-admin/ 2 | 3 | clear 4 | 5 | cd is-this-your-admin 6 | 7 | clear 8 | 9 | apt install python 10 | 11 | clear 12 | 13 | python -m pip install -r requirements.txt 14 | 15 | clear 16 | 17 | python admin-panel-sniffer.py 18 | 19 | -------------------------------------------------------------------------------- /arp-spoofing-detect.sh: -------------------------------------------------------------------------------- 1 | clear 2 | apt install git 3 | 4 | clear 5 | 6 | git clone https://github.com/R3DHULK/mission-arp 7 | 8 | clear 9 | 10 | cd mission-arp 11 | 12 | clear 13 | 14 | apt install python 15 | 16 | clear 17 | 18 | python -m pip install -r requirements.txt 19 | 20 | clear 21 | 22 | sudo python arp-spoofing-detect.py 23 | 24 | -------------------------------------------------------------------------------- /fakemail.sh: -------------------------------------------------------------------------------- 1 | clear 2 | 3 | git clone https://github.com/R3DHULK/fakemail 4 | 5 | clear 6 | 7 | cd fakemail 8 | 9 | clear 10 | 11 | apt install python 12 | 13 | clear 14 | 15 | python -m pip install -r requirements.txt 16 | 17 | clear 18 | 19 | python fakemail.py 20 | -------------------------------------------------------------------------------- /get-wifi-pass.sh: -------------------------------------------------------------------------------- 1 | clear 2 | 3 | apt install git 4 | 5 | clear 6 | 7 | git clone https://github.com/R3DHULK/get_wifipass 8 | 9 | clear 10 | 11 | cd get_wifipass 12 | 13 | clear 14 | 15 | apt install python 16 | 17 | clear 18 | 19 | python get_wifipass.py 20 | -------------------------------------------------------------------------------- /hack-gmail.sh: -------------------------------------------------------------------------------- 1 | clear 2 | apt install git 3 | apt install python 4 | clear 5 | git clone https://github.com/R3DHULK/hack-gmail/ 6 | cd hack-gmail 7 | clear 8 | python hack-gmail.py 9 | -------------------------------------------------------------------------------- /hulkscanner.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | echo " 3 | █░█ █░█ █░░ █▄▀ █▀ █▀▀ ▄▀█ █▄░█ █▄░█ █▀▀ █▀█ 4 | █▀█ █▄█ █▄▄ █░█ ▄█ █▄▄ █▀█ █░▀█ █░▀█ ██▄ █▀▄ 5 | Author : Sumalya Chatterjee" 6 | if ["$1" == "" ] 7 | then 8 | echo "Usage: ./hulkscanner.sh [IP]" 9 | echo "Example ./hulkscanner.sh 192.168.1.10" 10 | else 11 | echo "Please wait while HULK is scanning all the open ports..." 12 | nc -nvz $1 1-65535 > $1.txt 2>&1 13 | fi 14 | tac $1.txt 15 | rm -rf $1.txt 16 | -------------------------------------------------------------------------------- /keylogger.sh: -------------------------------------------------------------------------------- 1 | clear 2 | 3 | apt install git 4 | 5 | clear 6 | 7 | git clone https://github.com/R3DHULK/keylogger-in-python 8 | 9 | clear 10 | 11 | cd keylogger-in-python 12 | 13 | clear 14 | 15 | apt install python 16 | 17 | clear 18 | 19 | python -m pip install -r requirements.txt 20 | 21 | clear 22 | 23 | python py-keylogger.py 24 | -------------------------------------------------------------------------------- /netdiscover.sh: -------------------------------------------------------------------------------- 1 | clear 2 | 3 | apt install netdiscover 4 | 5 | clear 6 | 7 | netdiscover 8 | 9 | -------------------------------------------------------------------------------- /network-monitor.sh: -------------------------------------------------------------------------------- 1 | clear 2 | 3 | apt install git 4 | 5 | git clone https://github.com/R3DHULK/all-about-network 6 | 7 | cd all-about-network 8 | 9 | apt install python 10 | 11 | clear 12 | 13 | python -m pip install -r requirements.txt 14 | 15 | clear 16 | 17 | python network-monitoring.py 18 | -------------------------------------------------------------------------------- /shodan-api.sh: -------------------------------------------------------------------------------- 1 | clear 2 | 3 | apt install git 4 | 5 | clear 6 | 7 | git clone https://github.com/R3DHULK/utilise_SHODAN-API 8 | 9 | clear 10 | 11 | cd utilise_SHODAN-API 12 | 13 | clear 14 | 15 | apt install python 16 | 17 | clear 18 | 19 | python shodan_api.py 20 | -------------------------------------------------------------------------------- /wpscan.sh: -------------------------------------------------------------------------------- 1 | clear 2 | apt update 3 | apt install wpscan 4 | clear 5 | wpscan 6 | -------------------------------------------------------------------------------- /xss-vulnerability-finder.sh: -------------------------------------------------------------------------------- 1 | clear 2 | 3 | apt install git 4 | 5 | clear 6 | 7 | git clone https://github.com/R3DHULK/xss-police 8 | 9 | clear 10 | 11 | cd xss-police 12 | 13 | clear 14 | 15 | apt install python 16 | 17 | clear 18 | 19 | python xss-vulnerability-finder.py 20 | --------------------------------------------------------------------------------