Skip to content

Instantly share code, notes, and snippets.

View sh1nu11bi's full-sized avatar

sh1nu11bi

View GitHub Profile
@sh1nu11bi
sh1nu11bi / browserinmiddle.txt
Created February 18, 2015 17:44
BH-Python Code:Man-In-the Middle
mitb.py will create a simple example example that will watch for a user browsing Facebook or GMail,de-auth them, and then
modify the login form to send their username and password to an HTTP server that we control.
Our HTTP server will then simply redirect them back to the real login page.
@sh1nu11bi
sh1nu11bi / scanner.py
Created February 18, 2015 17:45
Raw Sockets and sniffing
import socket
import os
import struct
import threading
from netaddr import IPNetwork,IPAddress
from ctypes import *
# host to listen on
host = "192.168.0.187"
@sh1nu11bi
sh1nu11bi / arper.py
Created February 18, 2015 17:48
Black Hat Code-Python Hacking_scapy_steal email cred
from scapy.all import *
import os
import sys
import threading
interface = "en1"
target_ip = "172.16.1.71"
gateway_ip = "172.16.1.254"
packet_count = 1000
poisoning = True
@sh1nu11bi
sh1nu11bi / dirlister.py
Created February 18, 2015 17:49
Git_Command and Control_BH Python
# dirlister.py
__version__ = "0.1"
import os
def run(**args):
print "[*] Dirlister module."
files = os.listdir(".")
return str(files)
@sh1nu11bi
sh1nu11bi / content_bruter.py
Created February 18, 2015 17:51
WebApplicationScanning
import urllib2
import urllib
import threading
import Queue
threads = 5
target_url = "http://testphp.vulnweb.com"
wordlist_file = "/tmp/all.txt" # from SVNDigger
resume = None
user_agent = "Mozilla/5.0 (X11; Linux x86_64; rv:19.0) Gecko/20100101 Firefox/19.0"
@sh1nu11bi
sh1nu11bi / keylogger.py
Created February 18, 2015 17:52
Windows Trojan-BH_Python
from ctypes import *
import pythoncom
import pyHook
import win32clipboard
user32 = windll.user32
kernel32 = windll.kernel32
psapi = windll.psapi
current_window = None
@sh1nu11bi
sh1nu11bi / PrivEsc.txt
Created February 18, 2015 17:54
BH_Python_Windows Privelage Escalation
This process does not involve any API hooking, so we can fly under most anti-virus software's radar.
localhost$ easy_install pywin32 wmi
http://sourceforge.net/projects/pywin32
@sh1nu11bi
sh1nu11bi / Sublime setup
Created February 19, 2015 03:51
Sublime Text Set-up
1.Download Version/acrh for sublime text2
http://www.sublimetext.com/2
Packages download
I used to use Sublime Text 2 with
@sh1nu11bi
sh1nu11bi / info_sec python modules
Created February 19, 2015 15:31
This a collection of Python modules commonly associated with InfoSec.
Scapy: send, sniff and dissect and forge network packets. Usable interactively or as a library
pypcap, Pcapy and pylibpcap: several different Python bindings for libpcap
libdnet: low-level networking routines, including interface lookup and Ethernet frame transmission
dpkt: fast, simple packet creation/parsing, with definitions for the basic TCP/IP protocols
Impacket: craft and decode network packets. Includes support for higher-level protocols such as NMB and SMB
pynids: libnids wrapper offering sniffing, IP defragmentation, TCP stream reassembly and port scan detection
Dirtbags py-pcap: read pcap files without libpcap
flowgrep: grep through packet payloads using regular expressions
Knock Subdomain Scan, enumerate subdomains on a target domain through a wordlist
Mallory, extensible TCP/UDP man-in-the-middle proxy, supports modifying non-standard protocols on the fly

Keybase proof

I hereby claim:

  • I am sh1nu11bi on github.
  • I am sh1nu11bi (https://keybase.io/sh1nu11bi) on keybase.
  • I have a public key whose fingerprint is 3BA5 FB9B C6C3 4812 15D8 04CB 0FBA 146F E8FD 3B2B

To claim this, I am signing this object: