This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
""" | |
(c) Immunity, Inc. 2004-2008 | |
U{Immunity Inc.<http://www.immunityinc.com>} | |
Shellcode diff | |
- Corrected by <MGeeky> to support BINARY |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <windows.h> | |
#include <cstdio> | |
/////////////////////////////////////////////// | |
IMAGE_DOS_HEADER *g_iDosHdr; | |
IMAGE_FILE_HEADER *g_iFileHdr; | |
IMAGE_OPTIONAL_HEADER *g_iOptionalHdr; | |
IMAGE_SECTION_HEADER g_iNewSectHdr, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
def urlencoded2dict(txt): | |
s = '{' + re.sub("([^=]+)=([^&]*)&?", r'"\1":"\2", ', txt) + '}' | |
return json.loads(s.replace(', }', '}')) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# Script intended to ease malicious JS deobfuscation. | |
# | |
# Deobfuscates Locky Javascript transformations to a human readable JS | |
# (most likely it will work with other malware obfuscation transformations as well) | |
# | |
# Try this out with: | |
# $ python translate.py -f locky.js -s deobfuscate.py Deobfuscate | |
# |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# Simple multi-threaded ZIP cracker. | |
# | |
# MGeeky, 2016 | |
# | |
require 'archive/zip' | |
require 'tmpdir' | |
require 'fileutils' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# Pexpect driven SSH Command sending script. | |
# Based on: | |
# Violent Python, by TJ O'Connor | |
# | |
import pexpect | |
from sys import argv, exit | |
PROMPT = ['#', '>>>', '> ', '\$ '] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# Pxssh driven SSH brute-forcing script. | |
# Based on: | |
# Violent Python, by TJ O'Connor | |
# | |
import pxssh | |
import time | |
import optparse | |
from sys import argv, exit, stdout |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* Copy the below line to your bookmarklet: */ | |
javascript:(function(){MAX_URLS_TO_FETCH = 512; limit_reached = false; function decodeHtml(html) {txt = document.createElement('textarea'); txt.innerHTML = html; return txt.value; } String.prototype.endsWith = function(suffix) {return this.indexOf(suffix, this.length - suffix.length) !== -1; }; function normalizeUri(uri) {if (!uri || uri.length < 1) {return ''; } if(uri.toLowerCase().startsWith('javascript:') || uri.toLowerCase().startsWith('mailto:') || uri.toLowerCase().startsWith('phone:') || uri.toLowerCase().startsWith('tel:') || uri.toLowerCase().startsWith('phone:') || uri.toLowerCase().startsWith('#') ) {return ''; } orig = location.origin; if (uri.startsWith('http') && !uri.startsWith(orig)) {if (uri.substr(uri.indexOf(':')).startsWith(orig.substr(orig.indexOf(':')))) {return uri; } return ''; } if (uri.startsWith(orig)) {return uri; } if (uri.startsWith('//')) {return location.protocol + uri; } if (uri.startsWith('"') || uri.startsWith("'") ) {return '' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# Bluetooth scanner with ability to spam devices | |
# with incoming OBEX Object Push requests containing | |
# specified file. | |
# | |
# Mariusz B. / MGeeky, 16' | |
# | |
# Partially based on `Violent Python` snippets. | |
# Modules required: | |
# python-bluez |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
CloseFile | |
CreateFile | |
CreateFileMapping | |
DeviceIoControl | |
FileSystemControl | |
FlushBuffersFile | |
Load Image | |
LockFile | |
NotifyChangeDirectory | |
Process Create |