-
-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathdemo-external-script.sh
More file actions
executable file
Β·92 lines (81 loc) Β· 3.76 KB
/
demo-external-script.sh
File metadata and controls
executable file
Β·92 lines (81 loc) Β· 3.76 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
#!/bin/bash
#
# Demo External Script for NULLSEC Command Console v1.1
# This demonstrates how any external script can be executed from within NULLSEC
# Repository: https://github.com/bad-antics/nullsec
#
RED='\033[1;31m'
GREEN='\033[1;32m'
YELLOW='\033[1;33m'
CYAN='\033[1;36m'
WHITE='\033[1;37m'
RESET='\033[0m'
clear
echo -e "${CYAN}"
cat << "EOF"
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β
β π₯ NULLSEC EXTERNAL SCRIPT DEMO π₯ β
β β
β This script demonstrates external execution β
β capabilities from the NULLSEC command console β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
EOF
echo -e "${RESET}\n"
echo -e "${WHITE}[*] Script Information:${RESET}"
echo -e " Name: demo-external-script.sh"
echo -e " Path: $(readlink -f "$0")"
echo -e " User: $(whoami)"
echo -e " Date: $(date '+%Y-%m-%d %H:%M:%S')"
echo ""
echo -e "${YELLOW}[*] System Information:${RESET}"
echo -e " OS: $(uname -s)"
echo -e " Kernel: $(uname -r)"
echo -e " Arch: $(uname -m)"
echo -e " Hostname: $(hostname)"
echo ""
echo -e "${CYAN}[*] Available Security Tools:${RESET}"
tools=("nmap" "wireshark" "aircrack-ng" "hashcat" "hydra" "metasploit" "sqlmap")
for tool in "${tools[@]}"; do
if command -v "$tool" &> /dev/null; then
echo -e " ${GREEN}β${RESET} $tool"
else
echo -e " ${RED}β${RESET} $tool (not installed)"
fi
done
echo ""
echo -e "${WHITE}[*] Performing Sample Tasks:${RESET}"
echo ""
# Task 1: Network Interface Info
echo -e " ${CYAN}[1/3]${RESET} Checking network interfaces..."
sleep 0.5
interfaces=$(ip -br link | wc -l)
echo -e " Found ${GREEN}$interfaces${RESET} network interfaces"
# Task 2: Check for wireless
echo -e " ${CYAN}[2/3]${RESET} Checking for wireless adapters..."
sleep 0.5
if iwconfig 2>/dev/null | grep -q "IEEE 802.11"; then
echo -e " ${GREEN}β${RESET} Wireless adapter detected"
else
echo -e " ${YELLOW}β ${RESET} No wireless adapter found"
fi
# Task 3: Sample nmap scan (safe)
echo -e " ${CYAN}[3/3]${RESET} Testing nmap availability..."
sleep 0.5
if command -v nmap &> /dev/null; then
echo -e " ${GREEN}β${RESET} nmap is ready ($(nmap --version | head -n1))"
else
echo -e " ${RED}β${RESET} nmap not available"
fi
echo ""
echo -e "${GREEN}[β] Demo script completed successfully!${RESET}"
echo ""
echo -e "${YELLOW}βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ${RESET}"
echo -e "${WHITE}This script was executed from the NULLSEC Command Console${RESET}"
echo -e "${WHITE}You can run ANY script this way:${RESET}"
echo -e " ${CYAN}nullsec@exec >${RESET} run /path/to/your-script.sh"
echo -e " ${CYAN}nullsec@exec >${RESET} run /path/to/exploit.py"
echo -e " ${CYAN}nullsec@exec >${RESET} run ./custom-tool.rb"
echo -e "${YELLOW}βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ${RESET}"
echo ""