This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# import socket programming library | |
# @itsecurityco (Juan) | |
import socket | |
# import thread module | |
from _thread import * | |
door_closed = b""" | |
______________ | |
|\ ___________ /| |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# https://github.com/rapid7/metasploit-framework/wiki/How-to-Send-an-HTTP-Request-Using-HTTPClient | |
require 'msf/core' | |
class MetasploitModule < Msf::Auxiliary | |
include Msf::Exploit::Remote::HttpClient | |
def initialize(info = {}) | |
super( | |
update_info( |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* @author: Juan Escobar ([email protected]) */ | |
package net.dreamlab.modbuscoils | |
import androidx.appcompat.app.AppCompatActivity | |
import android.os.Bundle | |
import android.os.StrictMode | |
import android.util.Log | |
import android.view.View | |
import io.ktor.network.selector.* | |
import io.ktor.network.sockets.* |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
startup_message off | |
hardstatus alwayslastline | |
hardstatus string '%{= kG}[ %{G}%H %{g}][%= %{=kw}%?%-Lw%?%{r}(%{W}%n*%f%t%?(%u)%?%{r})%{w}%?%+Lw%?%?%= %{g}][%{B}%Y-%m-%d %{W}%c %{g}]%{w} %l' | |
# Allow scrollwheel to scroll back the terminal output rather than forwarding it | |
# to the process (e.g. scroll through bash history or vim output). | |
termcapinfo xterm* ti@:te@ | |
altscreen on |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl -s https://lintlyci.github.io/Flake8Rules/api/rules/$1/ | jq '.links' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /usr/bin/env python | |
# Based off: (mastahyeti/merger.py) https://gist.github.com/mastahyeti/2720173 | |
# Modified: @itsecurityco | |
import xml.etree.ElementTree as etree | |
import shutil | |
import os | |
# Severify of vulnerability | |
SEVERITY_INFO = 0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# x86 instructions to opcode | |
# Autor: @itseco | |
# Usage: ./shell_nasm "Here the shellcode..." | |
perl -e 'print "'$1'"' > /tmp/shellcode && ndisasm -b 32 /tmp/shellcode && rm -f /tmp/shellcode |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# Author: @itsecurityco | |
# This script takes a string generated | |
# by msfvenom on bt5r3 via PIPE | |
# and will clean the raw shellcode | |
import sys | |
import re | |
if sys.stdin.isatty(): |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# Author: @itseco | |
# This script takes a filename as argument | |
# and will produce the opcodes | |
# to push this string onto the stack | |
# Original file: pvePushString.pl (www.corelan.be) | |
import sys | |
if len(sys.argv) < 2: | |
print " usage: %s \"String to put on stack\"" % sys.argv[0] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# Author: @itseco | |
# This script takes a filename as argument | |
# will write bytes in \x format to the file | |
import sys | |
handle = open(sys.argv[1], 'w') | |
buf = "Paste the shellcode here..." | |
handle.write(buf) | |
handle.close() |
NewerOlder