I hereby claim:
- I am byt3bl33d3r on github.
- I am byt3bl33d3r (https://keybase.io/byt3bl33d3r) on keybase.
- I have a public key whose fingerprint is 7069 4855 F807 0C99 9731 C777 60FA BDD3 A6E1 5E81
To claim this, I am signing this object:
| from cryptography.hazmat.backends import default_backend | |
| from cryptography.hazmat.primitives import hashes, padding | |
| from cryptography.hazmat.primitives.asymmetric import ec | |
| from cryptography.hazmat.primitives.kdf.hkdf import HKDF | |
| from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes | |
| from secrets import token_bytes | |
| class DiffieHellman: | |
| def __init__(self): |
| from System.IO import MemoryStream | |
| from System.Text import Encoding | |
| from System.Security.Cryptography import Aes, AsymmetricAlgorithm, CryptoStream, CryptoStreamMode | |
| class DiffieHellman: | |
| def __init__(self): | |
| self.aes = Aes.Create() | |
| self.diffieHellman = AsymmetricAlgorithm.Create("ECDiffieHellmanCng") | |
| self.PublicKey = self.diffieHellman.PublicKey.ToByteArray() |
| using System; | |
| using IronPython.Hosting; | |
| using IronPython.Modules; | |
| //using IronPython.Runtime; | |
| using System.IO; | |
| using System.Linq; | |
| using System.Reflection; | |
| using Microsoft.Scripting.Hosting; | |
| using Microsoft.Scripting.Utils; | |
| using System.Collections.Generic; |
| import shodan | |
| import sys | |
| from shodan import APIError | |
| from netaddr import IPNetwork | |
| SHODAN_API_KEY= 'APIKEY' | |
| api = shodan.Shodan(SHODAN_API_KEY) | |
| targets = map(IPNetwork, sys.argv[1].split(',')) |
| import sys | |
| ps_shellcode = '@(' | |
| with open(sys.argv[1], 'rb') as shellcode: | |
| byte = shellcode.read(1) | |
| while byte != '': | |
| ps_shellcode += '0x{}, '.format(byte.encode('hex')) | |
| byte = shellcode.read(1) |
I hereby claim:
To claim this, I am signing this object:
| #! /usr/bin/env python2 | |
| import requests | |
| import lxml.html | |
| import sys | |
| r = requests.get(sys.argv[1]) | |
| tree = lxml.html.fromstring(r.text) | |
| try: |
I hereby claim:
To claim this, I am signing this object:
| #! /usr/bin/env python2.7 | |
| from scapy.all import * | |
| from netfilterqueue import NetfilterQueue | |
| def modify(packet): | |
| pkt = IP(packet.get_payload()) #converts the raw packet to a scapy compatible string | |
| #modify the packet all you want here |
| #! /usr/bin/env python | |
| import sys | |
| import re | |
| import os | |
| from decimal import Decimal #for conversion milliseconds -> seconds | |
| if len(sys.argv) < 2: | |
| print 'Usage: duck-hunter.py <duckyscript> output.txt' | |
| #print 'Usage: duck-hunter.py <duckyscript> <language> output.txt' |