I hereby claim:
- I am killswitch-gui on github.
- I am killswitchgui (https://keybase.io/killswitchgui) on keybase.
- I have a public key whose fingerprint is 7F6A A2E0 2FC2 9D10 4327 B138 CB86 0113 C1B6 9F03
To claim this, I am signing this object:
| import zlib | |
| import struct | |
| import sys | |
| # 4 byte header | |
| # crc32 uLong | |
| # | |
| # 0 1 | |
| # +---+---+ | |
| # |CMF|FLG| |
| #!/usr/env python | |
| ############################################################################################################### | |
| ## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script | |
| ## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift | |
| ##------------------------------------------------------------------------------------------------------------- | |
| ## [Details]: | |
| ## This script is intended to be executed locally on a Linux box to enumerate basic system info and | |
| ## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text | |
| ## passwords and applicable exploits. |
| #!/usr/bin/python | |
| # Pure Python Tiny Packet Snifer | |
| # Author: Alexander Rymdeko-Harvey | |
| # Twitter: @Killswitch-GUI | |
| import socket, time | |
| from datetime import datetime | |
| import struct | |
| def outputPcapPFile(fileName): |
| # 255 min host group | |
| # min rate 1000 should be fine for internal | |
| # Full Port Scan / --open | |
| nmap -Pn -n -sS -p- -sV --min-hostgroup 255 --min-rtt-timeout 25ms --max-rtt-timeout 100ms --max-retries 1 --max-scan-delay 0 --min-rate 1000 -oA <customer-#> -vvv --open -iL <IPLIST> |
I hereby claim:
To claim this, I am signing this object: