This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# Special Thanks: @bigendiansmalls for some commands and help | |
# Mainframe hackers 4 lyfe | |
# based on LinEnum.sh | |
#Config | |
useful="nc netcat wget nmap gcc python curl" | |
compilers="c89 c99 c++ xlc cc javac" | |
username=`logname` |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Taken straight from https://youtu.be/kf829-tm0VM?t=1181 | |
alias nmap='sudo nmap -g53 --randomize-hosts --script-args http.useragent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36 Edge/12.0i" ' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
import os | |
import re | |
def make_header(name): | |
return ''')ATTR DEFAULT(%+_) | |
% type(text) intens(high) | |
~ type(text) intens(high) caps(off) just(asis ) color(red) | |
+ type(text) color(turq) caps(off) | |
` type(text) intens(high) caps(off) just(asis) color(yellow) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
from faker import Faker | |
fake = Faker() | |
for i in xrange(1000000): | |
x = fake.credit_card_full().splitlines() | |
a = fake.address().splitlines() | |
print x[1] + " " + x[2] + ' ' + x[3].split()[1] + " " + a[0] + " " + a[1] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
S.No | Clist Command | Its USE | |
---|---|---|---|
1 | &DATATYPE | &DATATYPE is used to determine the data type of an expression. | |
2 | &EVAL | &EVAL forces numeric evaluation of the expression that is passed to the function. | |
3 | &LASTCC | The &LASTCC variable contains the return code from the last TSO command,subcommand, CLIST statement, or nested CLIST that was executed. | |
4 | &LENGTH | The &LENGTH function returns the number of bytes occupied by an expression or character string. | |
5 | &MAXCC | The &MAXCC variable contains the highest return code from any TSO command,subcommand, CLIST statement, or nested CLIST that was executed while the current CLIST is active. | |
6 | &NRSTR | The &NRSTR function defines a non-rescannable string. | |
7 | &STR | The &STR function is used to pass character data to a CLIST without any CLIST language evaluation being done on the data. | |
8 | &SUBSTR | The &SUBSTR function is used to extract a character string from within another character string. | |
9 | &SYS_VARIABLES | TSO/E contains certain control variables which are available for use in CLISTs |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
import tweepy | |
import sys | |
# argument 1 is the tweet, argument 2 is the path to the image | |
def get_api(cfg): | |
auth = tweepy.OAuthHandler(cfg['consumer_key'], cfg['consumer_secret']) | |
auth.set_access_token(cfg['access_token'], cfg['access_token_secret']) | |
return tweepy.API(auth) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# To use this program: | |
# ./add_racf_user.py users.txt | |
# users.txt has either a username (max 7 chars, must start with a letter) | |
# or a name (two words seperated by a space) | |
from ftplib import FTP #For FTP stuff | |
import time #needed for sleep | |
import os #to manipulate people... uh I mean files |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
echo "[+] Uploading and Compiling" | |
HLASM=`echo $1|awk -F. '{print $1}'` | |
JCL=$2 | |
HOST='SMOG' | |
echo "[+] HLASM File: $1 to $HLASM" | |
echo "[+] JCL File: $JCL" | |
echo "[+] Host: $HOST" | |
ftp -iv $HOST <<END_SCRIPT | |
passive |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
//SOF1C JOB (ASSY),'COMPILE IT',CLASS=A,MSGCLASS=Y, | |
// NOTIFY=&SYSUID,MSGLEVEL=(1,1) | |
//* Use this JCL to compile HLASM in TEST mode | |
//* So you can use TSO TEST to debug | |
// SET FILE=APFLISTC | |
//ASM EXEC PROC=HLASMCL,PARM.L=(TEST),PARM.C=(TEST) | |
//SYSIN DD DSN=SOF.ASM.SOURCE(&FILE),DISP=(SHR) | |
//C.SYSLIB DD DISP=SHR,DSN=SYS1.MACLIB | |
// DD DISP=SHR,DSN=SYS1.MODGEN | |
//L.SYSLMOD DD DSN=SOF.ASM.BIN(&FILE),DISP=(SHR) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
//<USERID> JOB (ACCT), | |
// ' ', | |
// CLASS=A, | |
// MSGCLASS=X, | |
// MSGLEVEL=(1,1), | |
// REGION=0M | |
//UNIXCMD EXEC PGM=BPXBATCH,REGION=800M | |
//STDPARM DD * | |
SH find . -type f -exec ls -s {} \; > /tmp/t | |
/* |