I hereby claim:
- I am felmoltor on github.
- I am felmoltor (https://keybase.io/felmoltor) on keybase.
- I have a public key whose fingerprint is 1485 9C64 36C5 CA4F 236B C04A 990A 3B4D BB7C FB45
To claim this, I am signing this object:
| #!/bin/bash | |
| if [[ ! -f $1 || $# -ne 2 ]];then | |
| echo "Usage: $0 <file> <resultfile>" | |
| else | |
| resultfile=$2 | |
| echo -n "" > $resultfile | |
| for line in `cat $1`; do | |
| line=$(echo $line | tr -d ' ') | |
| if [[ $(echo $line | grep "-"| wc -l) > 0 ]];then |
| # With this two lines of bash you will donwload the last malware samples extracted from the public lists of www.malwaredomainlist.com | |
| # and you'll submit automatically the alive samples (check if the response was an executable or not) to totalhash.com (contribute to | |
| # the community) and obtain the detection rate of the sample # from Virus Total (virustotal.com). | |
| # As a result you'll get a bunch of executable files and their detection rate in the log "output.virustotal.txt" | |
| # Download all the samples detected and listed in the public CSV of mdl.com | |
| $ curl -s http://www.malwaredomainlist.com/mdlcsv.php | awk 'BEGIN {FS="\",\""} {print $2}' | strings -n 3 | grep -E "\.exe$|\.so$|\.bin$|\.src$|\.pdf$|\.docx$|\.vb$|\.sh$" | xargs -I% bash -c 'echo "Downloading: %" && curl -s -O %' | tee $(date +%Y%m%d_%H%M)_malware_download.log | |
| # Upload the downloaded samples to totalhash.com and query virustotal.com with it MD5 checksum to obtain the detection ratio | |
| $ ls *_malware_download.log -ltr | tail -n1 | cat $(awk '{pr |
| #################################################### | |
| # List all the files recursively under a directory # | |
| #################################################### | |
| def ls_r_files(path) | |
| path.gsub!(/\/+$/,"") | |
| if path[-2,2] != "/." and path[-2,3] != "/.." | |
| if File.directory?(path) | |
| fentries = [] | |
| entries = Dir.entries(path) |
| Top domains leaked in 5M password dump of Gmail accounts. Mainly gmail.com and yandex.ru, another similar domains that seems like bug in the phishing or keylogger program: | |
| 4800946 gmail.com | |
| 123213 yandex.ru | |
| 608 gmail.com777 | |
| 338 gmail.com.vn | |
| 256 gmail.com.br | |
| 238 gmail.com.au | |
| 188 gmail.com7777 | |
| 174 gmail.com.com |
| -------------------- | |
| ---- 1º Million ---- | |
| -------------------- | |
| Analyzing a file with user, passwords and separator ':' | |
| Loading the whole dump file. Be patient... | |
| Spliting the dump information... | |
| Analycing the password frecuency... | |
| Analycing the domains frecuency... | |
| Analycing passwords complexity... |
| -------------- | |
| - 1º Million - | |
| -------------- | |
| ________________ __________ ____ _______ | |
| \_ _____/ _ \\______ \ ___ _/_ | \ _ \ | |
| | __)/ /_\ \| ___/ \ \/ /| | / /_\ \ | |
| | | / | \ | \ / | | \ \_/ \ | |
| \__ | \____|__ /____| \_/ |___| /\ \_____ / | |
| \/ \/ \/ \/ |
| /admin.cgi | |
| /administrator.cgi | |
| /agora.cgi | |
| /aktivate/cgi-bin/catgy.cgi | |
| /analyse.cgi | |
| /apps/web/vs_diag.cgi | |
| /axis-cgi/buffer/command.cgi | |
| /bandwidth/index.cgi | |
| /bigconf.cgi | |
| /cartcart.cgi |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| TOPIP=15 | |
| TOPUP=30 | |
| TOPU=30 | |
| TOPP=30 | |
| TOPLU=15 | |
| TOPLP=15 | |
| GEOLITEDB="/home/<username>/maxmind/GeoIPCountryWhois.db" # Use the sqlite3 db created with http://pastebin.com/9WxCy5ks |
| #!/bin/bash | |
| # Author: Felipe Molina (@felmoltor) | |
| # Date: January 2015 | |
| # Purpose: This scripts checks for new binaries captured by kippo and send an email when an attacker drops a new one | |
| ############################# | |
| LASTLS='lastls.txt' | |
| CURRENTLS='currentls.txt' |