ekh_tools_resources_scripts_p04 - itnett/FTD02H-N GitHub Wiki

πŸ§‘β€πŸ’» Custom Scripts

Welcome to the Custom Scripts section! This page is dedicated to providing a collection of powerful, custom-built scripts designed to automate and enhance various IT security tasks. Whether you need to gather information, perform scans, or manage configurations, these scripts can save you time and ensure consistency in your security operations.


πŸ› οΈ Categories of Custom Scripts

πŸ” Network Reconnaissance

Scripts designed to help you gather intelligence on network infrastructure, identify active hosts, open ports, and running services.

  • PowerShell Script: Network Discovery

    • Description: A PowerShell script that automates the discovery of active devices on a network, capturing their IP addresses and open ports.
    • Key Features:
      • Scans a specified IP range.
      • Outputs a list of active hosts with open ports.
      • Easily customizable for specific environments.
    • Download/Code: View Script
  • Python Script: Service Enumeration

    • Description: A Python script that performs service enumeration on identified hosts, listing running services and their versions.
    • Key Features:
      • Multi-threaded for faster results.
      • Supports various protocols (HTTP, FTP, SSH, etc.).
      • Outputs results to a file for easy analysis.
    • Download/Code: View Script

πŸ›‘οΈ Vulnerability Scanning

Automated scripts that help identify and document vulnerabilities across systems and applications.

  • Bash Script: Basic Vulnerability Scan

    • Description: A simple Bash script that utilizes open-source tools like Nmap and Nikto to perform a basic vulnerability scan on a specified target.
    • Key Features:
      • Integrates Nmap and Nikto results.
      • Generates a consolidated report.
      • Customizable scan parameters.
    • Download/Code: View Script
  • Python Script: Web Application Vulnerability Scan

    • Description: A Python script designed to scan web applications for common vulnerabilities such as SQL injection and XSS.
    • Key Features:
      • Detects common web vulnerabilities.
      • Supports proxy settings for anonymity.
      • Generates HTML reports.
    • Download/Code: View Script

πŸ” Password Cracking & Management

Scripts to help with password cracking, management, and security audits.

  • Python Script: Automated Password Hash Cracker

    • Description: A script that automates the process of cracking password hashes using tools like Hashcat.
    • Key Features:
      • Supports multiple hash types.
      • Allows for dictionary and brute-force attacks.
      • Outputs cracked passwords to a secure file.
    • Download/Code: View Script
  • PowerShell Script: Password Policy Audit

    • Description: A PowerShell script that audits the password policies on Windows machines to ensure compliance with best practices.
    • Key Features:
      • Checks minimum password length, complexity requirements, and expiration policies.
      • Generates a report with recommendations.
      • Can be scheduled to run at regular intervals.
    • Download/Code: View Script

πŸ”§ Configuration & Automation

Scripts that automate routine configuration tasks and ensure systems remain secure over time.

  • Bash Script: Firewall Configuration

    • Description: A script to automate the setup of iptables or UFW firewall rules based on predefined security policies.
    • Key Features:
      • Applies secure default settings.
      • Supports logging and monitoring of rules.
      • Customizable to specific environment needs.
    • Download/Code: View Script
  • Python Script: Automated Patch Management

    • Description: A script that automates the checking and application of system patches on Linux servers.
    • Key Features:
      • Checks for available updates.
      • Applies security patches automatically.
      • Logs actions and sends notifications upon completion.
    • Download/Code: View Script

πŸš€ How to Get Started

Using custom scripts can significantly enhance your efficiency and accuracy in IT security tasks. Here are some tips to get started:

  • Understand the Script: Before running any script, review the code to understand what it does and how it will interact with your systems.
  • Test in a Safe Environment: Always test scripts in a controlled environment (such as a virtual machine or a test server) before deploying them in production.
  • Customize as Needed: Most scripts can be modified to suit your specific needs. Adjust parameters, add logging, or integrate with other tools as necessary.
  • Schedule and Automate: For recurring tasks, consider setting up cron jobs (Linux) or scheduled tasks (Windows) to run these scripts automatically.

πŸ“š Further Learning Resources

  • GitHub Repositories: Explore other security-focused repositories on GitHub for more scripts and tools.
  • Documentation: Many scripts include comments and documentation. Read these carefully to fully utilize the script’s capabilities.
  • Online Communities: Engage with other professionals on platforms like GitHub Discussions, Stack Overflow, or security forums to share and refine scripts.

πŸ”— Quick Links:


πŸ’‘ Pro Tip: Bookmark this page for quick access to a growing library of custom scripts that can automate and streamline your security tasks!

Happy scripting! πŸ§‘β€πŸ’»