Skip to content

Instantly share code, notes, and snippets.

@3lpsy
3lpsy / burte_force_bandit.py
Last active July 23, 2020 22:15
Bandit 24 Brute Force Script For OverTheWire
#!/usr/bin/env python3
## Assumes using ssh forwarding to access socket over localhost
import socket
import sys
PASS = "UoMYTrfrBFHyQXmg6gzctqAwOmw1IohZ"
export HTTP_PROXY_IP=x.x.x.x
export HTTP_PROXY_PORT=8080
function useproxy() {
export http_proxy="http://${HTTP_PROXY_IP}:${HTTP_PROXY_PORT}/"
export https_proxy="http://${HTTP_PROXY_IP}:${HTTP_PROXY_PORT}/"
}
function disableproxy() {
#!/usr/bin/env python3
'''
A simple Zap Parser to filter on certain things like port and plugin ID. More filters may be implemented later.
'''
import sys
from pathlib import Path
import lxml.etree as et
import csv
@3lpsy
3lpsy / shellpy.py
Created October 23, 2019 00:09
Convernt a binary to python shell code
#!/usr/bin/env python
import sys
if __name__ == "__main__":
if len(sys.argv) < 2:
print "usage: %s file.bin\n" % (sys.argv[0],)
sys.exit(0)
shellcodes = []
ctr = 1
maxlen = 15
#!/usr/bin/env python3
# Import smtplib for the actual sending function
import smtplib
import sys
import argparse
# Import the email modules we'll need
from email.message import EmailMessage
@3lpsy
3lpsy / EmbedMe.cs
Created October 30, 2019 20:00
EmbedMe.cs
using System;
using System.Reflection;
// this is a simple C# program that
// has another C# program (exe/dll)
// embedded in it
namespace Brunt
{
public class Brunt
@3lpsy
3lpsy / Veil_Install_Notes.txt
Last active January 27, 2021 10:20
Installing Veil Evasion in Headless Mode
# you can also attempt to use X forwarding for this but long story short, wine wants a GUI (display) to do certain things
# in headless mode, you'll need to setup a headless x server
# useful issue: https://github.com/Veil-Framework/Veil/issues/229
# probably want to be root
# install xvfb for the headless xserver
apt install xvfb
# make sure there's no display set (or that 0 is free)
echo $DISPLAY
@3lpsy
3lpsy / keybase.md
Created November 7, 2019 03:53
Keybase Proof

Keybase proof

I hereby claim:

  • I am 3lpsy on github.
  • I am 3lpsy (https://keybase.io/3lpsy) on keybase.
  • I have a public key whose fingerprint is 9D4B D713 098E C224 AEC9 A9D9 C52C 3543 28A8 02D2

To claim this, I am signing this object:

@3lpsy
3lpsy / hp_ilo_create_admin_account.py
Last active August 3, 2022 19:07
2017-12542: Create Admin Account HP ILO Exploit (Metasploit Port to Python)
import sys
import argparse
import requests
import random
import string
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
@3lpsy
3lpsy / heartbleed.py
Created November 18, 2019 16:32 — forked from eelsivart/heartbleed.py
Heartbleed (CVE-2014-0160) Test & Exploit Python Script
#!/usr/bin/python
# Modified by Travis Lee
# Last Updated: 4/21/14
# Version 1.16
#
# -changed output to display text only instead of hexdump and made it easier to read
# -added option to specify number of times to connect to server (to get more data)
# -added option to send STARTTLS command for use with SMTP/POP/IMAP/FTP/etc...
# -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port)