@@ -620,11 +620,43 @@ Options:
620
620
```
621
621
622
622
623
+ ## habu.firewalk
624
+
625
+
626
+ ``` {.sourceCode .bash}
627
+ Usage: habu.firewalk [OPTIONS] IP
628
+
629
+ TCP Port Scanner.
630
+
631
+ Print the ports that generated a response with the SYN flag or (if show
632
+ use -a) all the ports that generated a response.
633
+
634
+ It's really basic compared with nmap, but who is comparing?
635
+
636
+ Example:
637
+
638
+ # habu.tcpscan -p 22,23,80,443 -s 1 45.77.113.133
639
+ 22 S -> SA
640
+ 80 S -> SA
641
+ 443 S -> SA
642
+
643
+ Options:
644
+ -p TEXT Ports to use (default: 80) example: 20-23,80,135
645
+ -i TEXT Interface to use
646
+ -f TEXT Flags to use (default: S)
647
+ -s TEXT Time between probes (default: send all together)
648
+ -t INTEGER Timeout for each probe (default: 2 seconds)
649
+ -a Show all responses (default: Only containing SYN flag)
650
+ -v Verbose output
651
+ --help Show this message and exit.
652
+ ```
653
+
654
+
623
655
## habu.forkbomb
624
656
625
657
626
658
``` {.sourceCode .bash}
627
- Usage: habu.forkbomb [OPTIONS] BOMB
659
+ Usage: habu.forkbomb [OPTIONS] [bash|batch|c|haskell|perl|php|python|ruby]
628
660
629
661
A shortcut to remember how to use fork bombs in different languages.
630
662
@@ -660,17 +692,17 @@ Usage: habu.hasher [OPTIONS] [F]
660
692
Example:
661
693
662
694
$ habu.hasher README.rst
663
- md5 : e5828c564f71fea3a12dde8bd5d27063
664
- ripemd160 : ef6886c3b68cb34a44f9ca9336f3cd0732600a84
665
- sha1 : 7bae8076a5771865123be7112468b79e9d78a640
666
- sha512 : 65cfb1cf719b851b4aea5a7f5388068687b1fdfd290817a...
667
- whirlpool : eaccf718b31d8a01f76fc08e896a6d0d73dbeafc2621fe0...
695
+ md5 e5828c564f71fea3a12dde8bd5d27063 README.rst
696
+ ripemd160 ef6886c3b68cb34a44f9ca9336f3cd0732600a84 README.rst
697
+ sha1 7bae8076a5771865123be7112468b79e9d78a640 README.rst
698
+ sha512 65cfb1cf719b851b4aea5a7f5388068687b1fdfd290817a... README.rst
699
+ whirlpool eaccf718b31d8a01f76fc08e896a6d0d73dbeafc2621fe0... README.rst
668
700
669
701
You can also specify which algorithm to use. In such case, the output is
670
702
only the value of the calculated hash:
671
703
672
704
$ habu.hasher -a md5 README.rst
673
- e5828c564f71fea3a12dde8bd5d27063
705
+ e5828c564f71fea3a12dde8bd5d27063 README.rst
674
706
675
707
Options:
676
708
-a [md5|sha1|sha256|sha512|ripemd160|whirlpool]
@@ -893,6 +925,59 @@ Options:
893
925
```
894
926
895
927
928
+ ## habu.nmap.open
929
+
930
+
931
+ ``` {.sourceCode .bash}
932
+ Usage: habu.nmap.open [OPTIONS] SCANFILE
933
+
934
+ Read an nmap report and print the open ports.
935
+
936
+ Print the ports that has been resulted open reading the generated nmap
937
+ output.
938
+
939
+ You can use it to rapidly reutilize the port list for the input of other
940
+ tools.
941
+
942
+ Supports and detects the 3 output formats (nmap, gnmap and xml)
943
+
944
+ Example:
945
+
946
+ # habu.nmap.open portantier.nmap
947
+ 22,80,443
948
+
949
+ Options:
950
+ -p [tcp|udp|sctp] The protocol (default=tcp)
951
+ --help Show this message and exit.
952
+ ```
953
+
954
+
955
+ ## habu.nmap.ports
956
+
957
+
958
+ ``` {.sourceCode .bash}
959
+ Usage: habu.nmap.ports [OPTIONS] SCANFILE
960
+
961
+ Read an nmap report and print the tested ports.
962
+
963
+ Print the ports that has been tested reading the generated nmap output.
964
+
965
+ You can use it to rapidly reutilize the port list for the input of other
966
+ tools.
967
+
968
+ Supports and detects the 3 output formats (nmap, gnmap and xml)
969
+
970
+ Example:
971
+
972
+ # habu.nmap.ports portantier.nmap
973
+ 21,22,23,80,443
974
+
975
+ Options:
976
+ -p [tcp|udp|sctp] The protocol (default=tcp)
977
+ --help Show this message and exit.
978
+ ```
979
+
980
+
896
981
## habu.ping
897
982
898
983
@@ -1116,6 +1201,39 @@ Options:
1116
1201
```
1117
1202
1118
1203
1204
+ ## habu.tcpscan-ng
1205
+
1206
+
1207
+ ``` {.sourceCode .bash}
1208
+ Usage: habu.tcpscan-ng [OPTIONS] IP
1209
+
1210
+ TCP Port Scanner.
1211
+
1212
+ Print the ports that generated a response with the SYN flag or (if show
1213
+ use -a) all the ports that generated a response.
1214
+
1215
+ It's really basic compared with nmap, but who is comparing?
1216
+
1217
+ Example:
1218
+
1219
+ # habu.tcpscan -p 22,23,80,443 -s 1 45.77.113.133
1220
+ 22 S -> SA
1221
+ 80 S -> SA
1222
+ 443 S -> SA
1223
+
1224
+ Options:
1225
+ -p TEXT Ports to use (default: 80) example: 20-23,80,135
1226
+ -i TEXT Interface to use
1227
+ -f TEXT Flags to use (default: S)
1228
+ -s TEXT Time between probes (default: send all together)
1229
+ -t INTEGER Timeout for each probe (default: 2 seconds)
1230
+ -a Show all responses (default: Only containing SYN flag)
1231
+ -v Verbose output
1232
+ -l TEXT Load session from file
1233
+ --help Show this message and exit.
1234
+ ```
1235
+
1236
+
1119
1237
## habu.tcpscan
1120
1238
1121
1239
0 commit comments