I hereby claim:
- I am sh1nu11bi on github.
- I am sh1nu11bi (https://keybase.io/sh1nu11bi) on keybase.
- I have a public key whose fingerprint is 3BA5 FB9B C6C3 4812 15D8 04CB 0FBA 146F E8FD 3B2B
To claim this, I am signing this object:
mitb.py will create a simple example example that will watch for a user browsing Facebook or GMail,de-auth them, and then | |
modify the login form to send their username and password to an HTTP server that we control. | |
Our HTTP server will then simply redirect them back to the real login page. | |
import socket | |
import os | |
import struct | |
import threading | |
from netaddr import IPNetwork,IPAddress | |
from ctypes import * | |
# host to listen on | |
host = "192.168.0.187" |
from scapy.all import * | |
import os | |
import sys | |
import threading | |
interface = "en1" | |
target_ip = "172.16.1.71" | |
gateway_ip = "172.16.1.254" | |
packet_count = 1000 | |
poisoning = True |
# dirlister.py | |
__version__ = "0.1" | |
import os | |
def run(**args): | |
print "[*] Dirlister module." | |
files = os.listdir(".") | |
return str(files) |
import urllib2 | |
import urllib | |
import threading | |
import Queue | |
threads = 5 | |
target_url = "http://testphp.vulnweb.com" | |
wordlist_file = "/tmp/all.txt" # from SVNDigger | |
resume = None | |
user_agent = "Mozilla/5.0 (X11; Linux x86_64; rv:19.0) Gecko/20100101 Firefox/19.0" |
from ctypes import * | |
import pythoncom | |
import pyHook | |
import win32clipboard | |
user32 = windll.user32 | |
kernel32 = windll.kernel32 | |
psapi = windll.psapi | |
current_window = None |
This process does not involve any API hooking, so we can fly under most anti-virus software's radar. | |
localhost$ easy_install pywin32 wmi | |
http://sourceforge.net/projects/pywin32 |
1.Download Version/acrh for sublime text2 | |
http://www.sublimetext.com/2 | |
Packages download | |
I used to use Sublime Text 2 with |
Scapy: send, sniff and dissect and forge network packets. Usable interactively or as a library | |
pypcap, Pcapy and pylibpcap: several different Python bindings for libpcap | |
libdnet: low-level networking routines, including interface lookup and Ethernet frame transmission | |
dpkt: fast, simple packet creation/parsing, with definitions for the basic TCP/IP protocols | |
Impacket: craft and decode network packets. Includes support for higher-level protocols such as NMB and SMB | |
pynids: libnids wrapper offering sniffing, IP defragmentation, TCP stream reassembly and port scan detection | |
Dirtbags py-pcap: read pcap files without libpcap | |
flowgrep: grep through packet payloads using regular expressions | |
Knock Subdomain Scan, enumerate subdomains on a target domain through a wordlist | |
Mallory, extensible TCP/UDP man-in-the-middle proxy, supports modifying non-standard protocols on the fly |
I hereby claim:
To claim this, I am signing this object: