This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| # | |
| # This is a small Twilio Lookup Script by me, SCRAMBLR. It's a work in progress | |
| # and I'll be adding more functionality soon. The first major thing I'll be adding | |
| # is the ability to pick and choose which features you deploy on each request, as | |
| # some are way more expensive than others. | |
| # | |
| # This started out as a small sideproject/script for myself, but I figure the community | |
| # might find it useful. If not, fuck you! ;) | |
| # |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| # | |
| # This is a small, simple script to test your server's abilities to spoof IPv4 packets or not. | |
| # You should use this instead of things like caida project's tool, because they're rumored to | |
| # collect data or hand it off to others who harass the server/network owners until they re-configure | |
| # their networks and discontinue allowing spoofed packets. | |
| # | |
| # By default, this script sends spoofed packets to fuzzme.packet.tel - but it can be configured to | |
| # send them anywhere. You can download a constantly running pcap by typing: | |
| # wget http://fuzzme.packet.tel/fuzzme.packet.tel.last10minutes.pcap |
NewerOlder