This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python | |
| # dump-images.py | |
| # | |
| # Extract all the image data from the banners and store them as separate images | |
| # in a provided output directory. | |
| # | |
| # Example: | |
| # shodan download --limit -1 screenshots.json.gz has_screenshot:true | |
| # ./dump-images.py screenshots.json.gz images/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python | |
| # gifcreator.py | |
| # | |
| # Dependencies: | |
| # - arrow | |
| # - shodan | |
| # | |
| # Installation: | |
| # sudo easy_install arrow shodan | |
| # sudo apt-get install imagemagick |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| apikey="xxx" | |
| echo "$(tput setaf 7)Uploading $1 to VirusTotal$(tput sgr0)" | |
| vt_hash=$(curl -X POST 'https://www.virustotal.com/vtapi/v2/file/scan' --form apikey=$apikey --form file=@"$(realpath $1)" | grep -o '"[0-9|a-f]{64}"' | head -1 | sed 's/"//g') | |
| echo done: $(sha256sum $1) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| # | |
| # This is a small, simple script to test your server's abilities to spoof IPv4 packets or not. | |
| # You should use this instead of things like caida project's tool, because they're rumored to | |
| # collect data or hand it off to others who harass the server/network owners until they re-configure | |
| # their networks and discontinue allowing spoofed packets. | |
| # | |
| # By default, this script sends spoofed packets to fuzzme.packet.tel - but it can be configured to | |
| # send them anywhere. You can download a constantly running pcap by typing: | |
| # wget http://fuzzme.packet.tel/fuzzme.packet.tel.last10minutes.pcap |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| # Cloudflare API v.4 Variables | |
| CF_APIKEY='Your API Key Here' | |
| CF_ZONEID='The Zone ID here' # Found on your Cloudflare Dashboard | |
| CF_DNSID='The DNS ID here' # Found by listing DNS with Cloudflare API, see below for command | |
| CF_EMAIL='your@email.address' | |
| CF_DNS='address.domain.com' | |
| GET_IP=$(dig +short txt ch whoami.cloudflare @1.0.0.1) |
OlderNewer