I hereby claim:
- I am yuudev on github.
- I am yuu (https://keybase.io/yuu) on keybase.
- I have a public key ASDQIydjpVlQx_E5naVLU96qDEUSlQvDim0CIZeSl4atnwo
To claim this, I am signing this object:
import time | |
import urllib.request | |
l0 = '8b........d8...............................................................................................................88..88....................................................................................................88.....................................................................................88..88.................................................................................................................................88..88..................................................................................................................................88......................................................................................' | |
l1 = '.Y8,....,8P................................................................................................................88..""....................................................................................................88.................................................................... |
$ python3 t2s.py | |
Initializing Twitch2Shell v0.1! | |
Connecting to irc.chat.twitch.tv on port 6667... | |
Joining #hardchat | |
Listening for commands... | |
2020-05-02 20:33:57 | hardchat: !! ls | |
2020-05-02 20:34:01 | aukkras: !! cat bins.txt | |
2020-05-02 20:34:06 | 0xdade: !! curl -fsSLd http://get.docker.com -o- http://get-docker.sh | bash | |
2020-05-02 20:34:12 | cryllicx: !! sudo -l | |
2020-05-02 20:34:15 | hardchat: !! ^C |
import sys, base64, hexdump, textwrap | |
from itertools import permutations | |
# pip3 install textwrap hexdump | |
# Create file full of base64 fragments, each one on a new line | |
# Usage: | |
# python3 debaser.py <file> | |
def getLines(): | |
with open(sys.argv[1],"r") as f: |
import urllib.request, json, sys, textwrap | |
# Run like | |
# python3 pubsploit.py CVE-2017-0143 | |
def cveSearch(cve): | |
with urllib.request.urlopen('http://cve.circl.lu/api/cve/'+cve) as url: | |
data = json.loads(url.read().decode()) | |
try: | |
if data['cvss']: | |
print("{} | CVSS {}".format(cve,data['cvss'])) |
; 84 byte LINUX_REBOOT_CMD_POWER_OFF Binary Golf | |
BITS 64 | |
org 0x100000000 | |
;---------------------+------+------------+------------------------------------------+-----------------------------+----------+ | |
; CODE LISTING | OFFS | ASSEMBLY | CODE COMMENT | ELF HEADER STRUCT | PHDR | | |
;---------------------+------+------------+------------------------------------------+-----------------------------+----------+ | |
db 0x7F, "ELF" ; 0x0 | 7f454c46 | PROTIP: Can use magic as a constant ;) | ELF Magic | | | |
_start: ;------|------------|------------------------------------------|-----------------------------|----------| | |
mov edx, 0x4321fedc ; 0x04 | badcfe2143 | Moving magic values... | ei_class,ei_data,ei_version | | | |
mov esi, 0x28121969 ; 0x09 | be69191228 | into their respective places | unused | | |
BITS 64 | |
org 0x100000000 ; Where to load this into memory | |
;----------------------+------+-------------+----------+------------------------ | |
; ELF Header struct | OFFS | ELFHDR | PHDR | ASSEMBLY OUTPUT | |
;----------------------+------+-------------+----------+------------------------ | |
db 0x7F, "ELF" ; 0x00 | e_ident | | 7f 45 4c 46 | |
_start: mov al,0x3c ; 0x04 | ei_class | | b0 | |
; 0x05 | ei_data | | 3c |
I hereby claim:
To claim this, I am signing this object:
This is a collection of NFO templates from various PSP Crack / Warez Groups | |
--- 4Fun | |
▄▀ ▄▄█▓▄ ____________________ __________ ▄▓█▄▄ ▀▄ | |
▐█ ███▀██▓▄ / | \_ _____/ | \ \@TiLK ▄▓██▀███ █▌ | |
▓██▀ ░▐█▓▓ / | || __) | | / | \ ▓▓█▌░ ▀██▓ | |
▀█▓ ░▐█▓▌ / ^ / \ | | / | \ ▐▓█▌░ ▓█▀ | |
▀▀ ▄██▓ \____ |\___ / |______/\____|__ / ▓██▄ ▀▀ | |
▄██▓▀ ▄▀ |__| \/ \/ ▀▄ ▀▓██▄ |
Super work in progress. These are 80 column wide text effects from old | |
pirate groups, BBS's, and elsewhere. | |
Marked with --- at the beginning marks visually similar or related elements | |
---[ Ratings ] | |
[■■■■■■■■■■] 10/10 | |
░░░░░░░▒▒▒ 7/10 | |
[■■■■■■----] |
import subprocess | |
import sys | |
import os | |
archive = sys.argv[2] | |
passfile = sys.argv[1] | |
f = open(passfile, "r") | |
for line in iter(f): | |
trypass = line.strip('\n') |