This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Author: Kitwipat Towattana (@icheernoom) | |
import urllib, urllib2, string, re, sys | |
def minus(num): | |
return float(num[0]) - float(num[1]) | |
url_check = 'http://web.camsctf.com/b/check.php' | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Author: Kitwipat Towattana (@icheernoom) | |
import hashlib | |
from PIL import Image | |
md5 = [] | |
width = 300 | |
height = 300 | |
for i in range(0,10): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
use File::Find; | |
print "\n\n\t### Search String in Files on Directory and Subdirectory By ICheer_No0M ###\n\n"; | |
print 'Path File : '; | |
chomp($path=<stdin>); | |
print 'Search Keyword : '; | |
chomp($string=<stdin>); | |
$keyword = AddSlashes($string); | |
find(\&file_names, $path); | |
sub file_names { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# hb_honeypot.pl -- a quick 'n dirty honeypot hack for Heartbleed | |
# | |
# This Perl script listens on TCP port 443 and responds with completely bogus | |
# SSL heartbeat responses, unless it detects the start of a byte pattern | |
# similar to that used in Jared Stafford's ([email protected]) demo for | |
# CVE-2014-0160 'Heartbleed'. | |
# | |
# Run as root for the privileged port. Outputs IPs of suspected heartbleed scan |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Author: Kitwipat Towattana (@icheernoom) | |
import socket, re | |
def get_data(recv): | |
m = re.match("(.+)\nThe", recv) | |
return m | |
def get_num(m): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
use LWP::UserAgent; | |
use HTTP::Cookies; | |
$user='admin'; | |
$password='1234'; | |
$target = 'http://localhost/smf2/'; | |
$ua = LWP::UserAgent->new() or die; | |
$cookie_jarr = HTTP::Cookies->new(); | |
$ua->cookie_jar( $cookie_jarr ); | |
$resr = $ua->post($target.'index.php?action=login2', |
NewerOlder