Coder Social home page Coder Social logo

r3dhulk / bash-for-ethical-hackers Goto Github PK

View Code? Open in Web Editor NEW
33.0 1.0 6.0 79 KB

Bash For Ethical Hacking

License: MIT License

Shell 100.00%
bash bash-script bash-scripting bashforethicalhacking blackhat blackhathacker blackhathacking cyber-security cybersecurity ethical-hacking

bash-for-ethical-hackers's Introduction

Bash For Ethical Hackers

Typing SVG

Typing SVG

🔴 Also Check out My Python For Ethical Hacking Project

Author :

Sumalya Chatterjee

Alt text

What is Ethical Hacking?

The term hacking goes a long way back. To be exact, it all started at the Railroad Club of MIT, where both the term ‘hacking’ and ‘hacker’ were first coined. It’s been almost 50 years now, and hacking has evolved into a discipline in the current day and age. With the increase in awareness regarding data protection and data privacy, hacking has been deemed as an illegal activity today. If caught, there’s a good chance that you will be prosecuted for quite some time depending on the degree of harm caused.

None the less, to protect themselves from hackers of all sorts, employment of Ethical Hackers has become a common practice amongst organizations. Ethical hackers are given the responsibility of finding and fixing security flaws for a certain organization before black hat hackers find them.


A scripting language is a variant type of programming language which doesn’t need compilers to execute. Those who are not from a programming background may not understand the statement. Let us break it for non-programmers.

To understand what a scripting language makes different from a programming language. Programming language needs a special type of utility called a compiler to run a program. Before a program runs, the compiler does pre-execution checks and converts the program to machine code. Then machine code will be sent to the runtime environment for execution. On the other hand, scripting languages just interpret the written code line by line and directly send the code to the runtime environment tor execution without compiling it.


Most of the scripting languages are interpreted. Scripting languages can be run without compiling them. This feature lets hackers and pentesters directly run their scripts on the victim without compilers. Another reason would be because scripts are light to run and transfer to the target machine. In addition to those, another feature that gives the upper hand is execution time. Scripting languages are faster in execution. It can be easily weaponized; All this makes scripting language a perfect programming language for hackers and pentesters.

We have covered the six most commonly used programming languages by hackers and pentesters in another article. However, we are going to cover the six most common scripting languages for hackers and pentesters in this article. However, we are not assigning any rank to all these scripting languages. We believe each language has developed with unique features. Please don’t consider the language placed in first is the most important than the placed at the sixth position. Let’s start with Bash scripting language.


Bash is the most popular and powerful scripting language in Unix and Linux systems. It’s been widely used by administrators to manage everyday tasks. Basically, Bash is a set of Linux commands used to perform pretty much anything like automating repetitive tasks, scheduling admin jobs, running health checks on the Linux servers, updating patcher on multiple servers at once, etc. In addition to these, it can also be used with other utilities to build productive scripts, which can help administrators carry out difficult tasks. All these powerful features of Bash script didn’t leave hackers and pentesters gaining attention to Bash scripting. Hackers and Pentesters found this as a great tool to perform hacking or pentesting the system. Because Bash can be used with other networks, hacking tools, and programming languages to deliver the payload to the target, it helps exfilleting the data from the victim and create a remote executable application.


Project Is Automated For Downloading Softwares From My Main Software Repos. Have A Look On IT 👇👇👇

07. DDOS

25. Shodan

Git Installation For Termux And Linux :

sudo apt install git

sudo apt install python

git clone https://github.com/R3DHULK/bash-for-ethical-hackers

cd bash-for-ethical-hackers

For Termux Users

Use Script :

$ chmod +x *
$ bash <software name> or ./<software name>

For Linux Users

Run Command With Sudo

$ chmod +x *
$ sudo bash <software name> or ./<software name>

Found Issues??

In Future Releases Founded Bugs Will Be Resolved And Many Other Tools Will Be Added 😇😇😊😊

Show Support 👇👇👇

https://www.buymeacoffee.com/r3dhulk

bash-for-ethical-hackers's People

Contributors

r3dhulk avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.