This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
http://[2a01:4f8:c012:8025::1]:8080/announce | |
http://[2a04:ac00:1:3dd8::1:2710]:2710/announce | |
http://1337.abcvg.info:80/announce | |
http://207.241.226.111:6969/announce | |
http://207.241.231.226:6969/announce | |
http://49.12.76.8:8080/announce | |
http://aboutbeautifulgallopinghorsesinthegreenpasture.online:80/announce | |
http://bittorrent-tracker.e-n-c-r-y-p-t.net:1337/announce | |
http://bt.okmp3.ru:2710/announce | |
http://bvarf.tracker.sh:2086/announce |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python3 | |
# | |
# spooftest.py version v1.2 | |
# USAGE: | |
# server# chmod a+x spooftest.py | |
# server# ./spooftest.py <dest server> <num of packets to send> | |
# | |
# | |
# This is a small, simple script to test your server's abilities to spoof IPv4 packets or not. | |
# You should use this instead of things like caida project's tool, because they're rumored to |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
------------------[ Requirements to test for IP Spoofing ]------------------ | |
1.) Server (Throw-Away) That Simply needs to run tcpdump. | |
2.) Server that you suspect/hope can IP Spoof AKA has IPHM IP Header Modification turned on. | |
On both servers we'll be running: | |
apt-get update | |
apt-get install net-tools bind9-dnsutils inetutils-tools tcpdump graphviz python3-scapy -y | |
apt-get install python3-scapy -y | |
- OR - | |
yum update |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
udp://tracker.dler.com:6969/announce | |
udp://exodus.desync.com:6969/announce | |
http://t.acg.rip:6699/announce | |
http://tracker.files.fm:6969/announce | |
https://tracker.tamersunion.org:443/announce | |
https://trackers.mlsub.net:443/announce | |
udp://ipv6.fuuuuuck.com:6969/announce | |
udp://ec2-18-191-163-220.us-east-2.compute.amazonaws.com:6969/announce | |
udp://tracker.0x7c0.com:6969/announce | |
udp://tracker.fnix.net:6969/announce |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
$http_client_ip = ''; | |
$http_x_forwarded_for = ''; | |
$remote_addr = $_SERVER['REMOTE_ADDR'] ?? ''; | |
$remote_host = ''; | |
$remote_port = $_SERVER['REMOTE_PORT'] ?? ''; | |
$remote_user = ''; | |
$redirect_remote_user = ''; | |
$http_user_agent = $_SERVER['HTTP_USER_AGENT'] ?? ''; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
open -na "Google Chrome Canary" --args --user-data-dir=/Users/dave/.burp-chrome --allow-insecure-localhost --allow-running-insecure-content --disable-add-to-shelf --disable-background-networking --disable-bundled-ppapi-flash --disable-captive-portal-bypass-proxy --disable-clear-browsing-data-counters --disable-client-side-phishing-detection --disable-cloud-import --disable-component-cloud-policy --disable-component-extensions-with-background-pages --disable-component-update --disable-contextual-search --disable-datasaver-prompt --disable-default-apps --disable-device-discovery-notifications --disable-dinosaur-easter-egg --disable-domain-reliability --disable-eol-notification --disable-extensions-http-throttling --disable-http2 --disable-logging --disable-login-animations --disable-network-portal-notification --disable-ntp-popular-sites --disable-offer-upload-credit-cards --disable-office-editing-component-extension --disable-offline-auto-reload --disable-offline-auto-reload-visible-only --disable-password-gen |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# | |
# This is a small Twilio Lookup Script by me, SCRAMBLR. It's a work in progress | |
# and I'll be adding more functionality soon. The first major thing I'll be adding | |
# is the ability to pick and choose which features you deploy on each request, as | |
# some are way more expensive than others. | |
# | |
# This started out as a small sideproject/script for myself, but I figure the community | |
# might find it useful. If not, fuck you! ;) | |
# |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# | |
# This is a small, simple script to test your server's abilities to spoof IPv4 packets or not. | |
# You should use this instead of things like caida project's tool, because they're rumored to | |
# collect data or hand it off to others who harass the server/network owners until they re-configure | |
# their networks and discontinue allowing spoofed packets. | |
# | |
# By default, this script sends spoofed packets to fuzzme.packet.tel - but it can be configured to | |
# send them anywhere. You can download a constantly running pcap by typing: | |
# wget http://fuzzme.packet.tel/fuzzme.packet.tel.last10minutes.pcap |