Skip to content

Instantly share code, notes, and snippets.

View danilovazb's full-sized avatar

Danilo `UnkL4b` Vaz danilovazb

View GitHub Profile
#!/bin/bash
#
# . . , ,
# |` \/ \/ \,',
# ; ` \/\,.
# : ` \,/
# | /
# ; :
# : ;
# | ,---. /
@danilovazb
danilovazb / st4wa.py
Created June 16, 2014 15:13
# S.T.4.W.A - StreamTwitter4WhatsApp # Autor: Danilo # Dt: 13/06/2014
#!/usr/bin/env python
# S.T.4.W.A - StreamTwitter4WhatsApp
# Autor: Danilo
# Dt: 13/06/2014
# Import das libs que vamos utilizar
import tweepy
import json
import re
#!/usr/bin/python
import os
import platform
print "Content-Type: text/html"
print
print """\
<!DOCTYPE html>
<html lang="en">
<head> <meta charset="utf-8">
<title>Hello World from Python by Koding</title>
#!/usr/bin/python
import urllib2
from bs4 import BeautifulSoup
# Abre a pagina principal do IBGE onde contem os links para os estados.
html = urllib2.urlopen('http://cidades.ibge.gov.br/xtras/home.php').read()
# Pega o conteudo da pagina em HTML e joga para o BeautifulSoup mapear as tags
soup = BeautifulSoup(html)
#!/usr/bin/python
import urllib2
from bs4 import BeautifulSoup
# Abre a pagina principal do IBGE onde contem os links para os estados.
html = urllib2.urlopen('http://cidades.ibge.gov.br/xtras/home.php').read()
# Pega o conteudo da pagina em HTML e joga para o BeautifulSoup mapear as tags
soup = BeautifulSoup(html)
#!/usr/bin/python
import urllib2
from bs4 import BeautifulSoup
# Abre a pagina principal do IBGE onde contem os links para os estados.
html = urllib2.urlopen('http://cidades.ibge.gov.br/xtras/home.php').read()
# Pega o conteudo da pagina em HTML e joga para o BeautifulSoup mapear as tags
soup = BeautifulSoup(html)
import urllib2
import json
UF = ['AC','AL','AM','AP','BA','CE','DF','ES','GO','MA','MG','MS','MT','PA','PB','PE','PI','PR','RJ','RN','RO','RR','RS','SC','SE','SP','TO']
#UF = ['AC','AL','AM','AP','BA','CE']
for estado in UF:
#print estado
urlCidade = 'https://ww18.itau.com.br/wsinvestnet/Corban.asmx/MontarCombosCorbanCidade?estado=' + estado + '&servico=3&segmento=8&callback=_jqjsp&_1412367567213='
arquivoIBGE = "contribuintes" + "-" + str(now.day) + str(now.month) + str(now.year) + ".csv"
arquivoGrava = open(arquivoIBGE,'a')
arquivoGrava.write("%s,%s,%s,%s,%s,%s,%s,%s" % \
(mun.strip(),val_popu_estimada2014.strip(),val_popu_estimada2010.strip(),val_uni_territorial.strip(),\
val_dens_demografica.strip(),val_cod_municipio.strip(),val_gentilico.strip(),val_prefeito.strip()+"\n")
#!/usr/bin/python
#-------------------------------------------------------------------------------
# Exploit Name: Wordpress WP Symposium 14.11 Shell Upload Vulnerability
# Vulnerability discovered by Claudio Viviani - http://www.homelab.it
# Exploit written by Claudio Viviani / Edited INURL - BRASIL
# 2014-11-27: Discovered vulnerability
# 2014-12-01: Vendor Notification (Twitter)
# 2014-12-02: Vendor Notification (Web Site)
# 2014-12-04: Vendor Notification (E-mail)
# 2014-12-11: No Response/Feedback
<?php
function compare_array($array1, $array2) {
$compare = array_diff($array1, $array2);
return (empty($compare)) ? '1' : '0';
}
$arrayzao = array();
function create_array() {