forked from vncsb/haxos
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhome.nix
141 lines (131 loc) · 2.97 KB
/
home.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
{ config, pkgs, pkgs-stable, lib, dotfiles, ... }:
let
gobuster = pkgs.callPackage ./pkgs/gobuster.nix { };
seclists = pkgs.callPackage ./pkgs/seclists.nix { };
raccoon = pkgs.callPackage ./pkgs/raccoon.nix { };
openvpn-legacy = pkgs.callPackage ./overrides/openvpn.nix { };
msf-database = pkgs.callPackage ./config/metasploit/database.nix { };
gitdumper = pkgs.python3Packages.callPackage ./pkgs/gitdumper.nix { };
dirsearch = pkgs.python3Packages.callPackage ./pkgs/dirsearch.nix { };
python-packages = ps: with ps; [
impacket
pwntools
pyftpdlib
dirsearch
];
metasploit-stable = pkgs-stable.metasploit;
in
{
home.username = "haxos";
home.homeDirectory = "/home/haxos";
home.stateVersion = "23.11";
fonts.fontconfig.enable = true;
home.packages = with pkgs; [
gcc
git
tmux
zsh
alacritty
neovim
chromium
firefox-devedition
eza
meslo-lgs-nf
terminus-nerdfont
gobuster
nodejs
xsel
ripgrep
fd
wget
rustup
go
openvpn-legacy
unzip
raccoon
metasploit-stable
nmap
nssTools
zap
burpsuite
(python3.withPackages python-packages)
bruno
cadaver
thc-hydra
openldap
enum4linux
netexec
samba
kerbrute
updog
rclone
exploitdb
john
evil-winrm
bloodhound
bloodhound-py
sslscan
wpscan
gitdumper
wine
winetricks
mono
sqlmap
wireshark
exiftool
whatweb
wafw00f
onesixtyone
snmpcheck
nfs-utils
jq
dig
responder
crackmapexec
openssl
dnsrecon
amass
];
xsession.windowManager.awesome = {
enable = true;
};
programs.home-manager.enable = true;
xdg.configFile = {
"awesome" = {
source = "${dotfiles}/.config/awesome";
recursive = true;
};
"nvim" = {
source = "${dotfiles}/.config/nvim";
recursive = true;
};
"alacritty" = {
source = "${dotfiles}/.config/alacritty";
recursive = true;
};
};
home.file = {
".zshrc".source = "${dotfiles}/.zshrc";
".p10k.zsh".source = "${dotfiles}/.p10k.zsh";
".tmux.conf".source = "${dotfiles}/.tmux.conf";
"wordlists/seclists".source = seclists;
".msf4/database.yml".text = msf-database;
};
home.sessionVariables = {
TMUX_LOGGING = "true";
};
home.activation.install-root-certificate =
let
zap = "${pkgs.zap}/bin/zap";
certutil = "${pkgs.nssTools}/bin/certutil";
awkPath = "${pkgs.gawk}/bin";
in
lib.hm.dag.entryAfter [ "installPackages" ] ''
export PATH="$PATH:${awkPath}"
$DRY_RUN_CMD ${zap} -addoninstall network -cmd $VERBOSE_ARG
$DRY_RUN_CMD ${zap} -certpubdump $HOME/zap-certificate.cer -cmd $VERBOSE_ARG
$DRY_RUN_CMD mkdir -p $HOME/.pki/nssdb
$DRY_RUN_CMD ${certutil} -d $HOME/.pki/nssdb -N --empty-password
$DRY_RUN_CMD ${certutil} -d sql:$HOME/.pki/nssdb/ -A -t "CP,CP," -n zap-certificate -i $HOME/zap-certificate.cer $VERBOSE_ARG
'';
}