⛳ When you want to load all shortcuts within shell just tap bang
Update installation script & shortcut with: bang.conf.update
➲ Let your environment be ready
# prerequisites
git clone https://github.com/ariary/bang.git && cd bang && ./prerequisite.sh
# zsh theme
./install/configure-zsh.sh
# load bang shortcut
export SH=zsh && echo "export PATH=$PATH:$HOME/.local/bin/" >> ~/.${SH}rc && echo "source ~/.bang/bang_conf" >> ~/.${SH}rc && echo "source ~/.bang/install/.aliases" >> ~/.${SH}rc && source ~/.${SH}rc
(Alternatively, if you want to automaticaly have them in every shell, add source ~/.bang/bang
in your ~/.${SH}rc)
(We assume that you have already install zsh
, otherwise replace SH
envvar by bash
)
You can now install tools needed by bang shortcuts!
➲ Ease tools installation
bang.conf.install-ariary
: install all ariary tools useful for pentesting in ~/.local/bin/bang.conf.install
: install other useful tools for pentesting in ~/.local/bin/
These tools are used in bang shortcuts then.
To update the installation scripts used by these commands: bang.conf.update
bang.conf.install.include golang docker
bang.conf.install-ariary
bang.conf.install.exclude golang docker
➲ Configure your pentest
⛳ When you want to load all shortcuts within shell just tap bang
Set attacker and target info: bang.conf.pentest
You could alternatively configure each item:
- attacker addr:
cAA=[ATTACKER_IP]
& attacker port:cAP=[ATTACKER_PORT]
- target addr:
cTA=[TARGET_IP]
& target port:cTP=[TARGET_PORT]
You could see the pentest configuration then with bang.conf.pentest.map
➲ List of useful bang
shortcuts
List all shortcut with bang.ls
- Share file with remote machine
- Share file with remote machine safely
- Expose local file on internet (
ngrok
) (Attacker ⇠ Internet ⇠ Target)
- Exec local binary exposing it trough http (Attacker ⇠ Target)
- Copy line to run
fileless-xec
on remote - Send local binary on remote & execute it using
fileless-xec
(Attacker ⇢ Target)
- Send trough ICMP
- Receive trough ICMP
- Search for HTTP request smuggling with
httpecho
- Execute shell commands from browser JS console
- Fuzz command line
- Persistence on target (even in internal network!)
- Start a webdav server
- Intercept HTTP request from command line
- Perform
nmap
scan - Perform web indexing
- Deploy local app with trusted cert
- Launch a bomb within current directory
- Copy a line to exit vim
- Launch background process
- Get weather for a given city
bang
helpers