Install Node.js 4.x, then:
npm install frida co uuid
and run:
node app.js
sudo apt-get update -y && sudo apt-get upgrade -y | |
wget http://developer.download.nvidia.com/compute/cuda/repos/ubuntu1204/x86_64/cuda-repo-ubuntu1204_5.5-0_amd64.deb | |
sudo dpkg -i cuda-repo-ubuntu1204_5.5-0_amd64.deb | |
sudo apt-get update -y && sudo apt-get install -y nvidia-settings nvidia-current-dev nvidia-modprobe cuda | |
cat >> ~/.profile <<END | |
export CUDA_HOME=/usr/local/cuda-5.5 | |
export CUDA_ROOT=/usr/local/cuda-5.5 |
Install Node.js 4.x, then:
npm install frida co uuid
and run:
node app.js
#!/usr/bin/python | |
import socket | |
import re | |
from capstone import * | |
from Pwn import * | |
import sys | |
# p = Pwn(mode=1,host='52.20.10.244',port=12351) | |
def disas(code): | |
asm = '' |
# Find the IAM username belonging to the TARGET_ACCESS_KEY | |
# Useful for finding IAM user corresponding to a compromised AWS credential | |
# Requirements: | |
# | |
# Environmental variables: | |
# AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY | |
# python: | |
# boto |
#!/usr/bin/env python2 | |
try: | |
import scapy.all as scapy | |
except ImportError: | |
import scapy | |
if __name__ == "__main__": | |
from argparse import ArgumentParser | |
parser = ArgumentParser( |
var blessed = require('blessed'); | |
var contrib = require('blessed-contrib'); | |
var screen = blessed.screen(); | |
var request = require("request"); | |
// You need to install dependencies: | |
// npm install blessed blessed-contrib | |
// Constants |
#!/usr/bin/env python2 | |
import logging | |
logging.getLogger("scapy.runtime").setLevel(logging.ERROR) | |
from multiprocessing.pool import ThreadPool | |
from multiprocessing import cpu_count | |
import libemu | |
from cachetools import LRUCache | |
from scapy.layers.all import TCP, UDP, Raw | |
from scapy.all import sniff |
# install txtorcon! | |
virtualenv virtenv-txtorcon | |
. ./virtenv-txtorcon/bin/activate | |
pip install txtorcon | |
export project=myproject | |
export secret=`pwgen 64` | |
mkdir -p public_html/$secret | |
cp -a $project public_html/$secret |
<# | |
Author: Casey Smith @subTee | |
License: BSD3-Clause | |
.SYNOPSIS | |
Simple Reverse Shell over HTTP. Execute Commands on Client. | |
<# | |
Created By Casey Smith | |
@subTee | |
RSA in PowerShell. | |
Just Cause... | |
Reference notes for the curious | |
p = 61 <= first prime number (destroy this after computing e and d) | |
q = 53 <= second prime number (destroy this after computing e and d) |