I hereby claim:
- I am narbehaj on github.
- I am narbehaj (https://keybase.io/narbehaj) on keybase.
- I have a public key ASAr51tdbhigfadz3DSGd42O4fK7myEGKtcqmz5A_i0CKwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
import hashlib | |
import os | |
m_list = [] | |
for i, d , e in os.walk('/home/test/'): | |
for file in e: | |
if file.endswith('mkv'): | |
with open('{}/{}'.format(i, file), 'rb') as file_read: | |
for chunk in iter(lambda: file_read.read(4096), b""): |
import socket | |
file_name = 'hosts.txt' | |
def read_hosts(file): | |
hosts = [] | |
with open(file, 'r') as f: | |
for host in f.readlines(): |
########################### | |
# pip3 install python-gnupg | |
########################### | |
import os | |
from gnupg import GPG | |
# If using Debian/Ubuntu, it should be under | |
# /home/USERNAME/.gnupg otherwise check manually |
from scapy.all import * | |
def packet_callback(packet): | |
if packet[TCP].payload: | |
if packet[IP].dport == 80: | |
print("\n{} ----HTTP----> {}:{}:\n{}".format(packet[IP].src, | |
packet[IP].dst, | |
packet[IP].dport, | |
str(bytes(packet[TCP].payload)))) |
from hashlib import md5 | |
import random | |
from itertools import chain, product | |
def bruteforce(charset, maxlength): | |
return (''.join(candidate) | |
for candidate in chain.from_iterable(product(charset, repeat=i) | |
for i in range(2, maxlength + 1))) |
#!/bin/bash | |
source /etc/openvpn/easy-rsa/vars | |
client=$1 | |
/etc/openvpn/easy-rsa/build-key $client | |
mkdir -p /tmp/tmp-vpn-client/$client | |
cp /etc/openvpn/easy-rsa/keys/$client.* /tmp/tmp-vpn-client/$client/ | |
cp /etc/openvpn/easy-rsa/keys/ca.crt /tmp/tmp-vpn-client/$client/ |