My Bash/Zsh aliases
awsvpndown='sudo wg-quick down wg0'
awsvpnup='sudo wg-quick up wg0'
awswgip='aws ec2 describe-instances --instance-ids=i-XXXXXXXXXXXX --query "Reservations[*].Instances[*].{Instance:PublicIpAddress}" --output text'
awswgstart='aws ec2 start-instances --instance-ids=i-XXXXXXXXXXXX'
awswgstatus='aws ec2 describe-instances --instance-ids=i-XXXXXXXXXXXXX'
awswgstop='aws ec2 stop-instances --instance-ids=i-XXXXXXXXXXXXX'
alias zz='youtube-dlc -x --audio-format mp3 -o "%(title)s.%(ext)s" $1'
Add following into ~/.ssh/config
Host dlaws
HostName dyn.dns.name.org
IdentityFile ~/.ssh/awskeypairfilename.tld
User username
Your very own Darkweb site in docker container
You can build your own darkweb site running Nginx inside docker conainer.
First you need to clone following repo: https://github.com/opsxcq/docker-tor-hiddenservice-nginx, make port changes
in main.sh (change line listen 127.0.0.1:8080; tp listen 127.0.0.1:8888) and torrc
(change HiddenServicePort 80 127.0.0.1:8080 to HiddenServicePort 80 127.0.0.1:8888)
Once you have repo ready, you can start building your own custom container image
1. Build custom container:
cmd: cd whereisyour/Dockerfile && docker build -t docker-tor-nginx .
2. Generate configuration directory, files and site address:
cmd: docker run -it --rm -v $(pwd)/web:/web docker-tor-nginx generate ^paterninurl
* please change owner of web directory as well as www sub-directory in it, otherwise it will not wokr (have to fix this in build process)
3. Run your hiden site:
cmd: docker run -d --restart=always --name hiddensite -v $(pwd)/web:/web docker-tor-nginx
4. Run shell inside container:
cmd: docker exec -it hiddensite /bin/bash
* still need to add ssl support (maybe with letsencrypt) as well fix directory permission issue
Google dorks automated
This tool lets you automate google dorking.
First you need to clone following repo: https://github.com/opsdisk/pagodo
then you need to install rependencies with: python3 -m pip install -r requirements.txt
then update dork files with: python3
and finaly run your search: python3 pagodo.py -d domain.tld -g dorks/files_containing_passwords.dorks -l 50 -s -e 15.0 -j 1.1
command above will run search on domain.tld, save 50 results, -s save output to html, run request everu 15sec, jitter 1.1