This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Packet Grenade | |
# Feb 13, 2015 | |
# Lists of targets | |
set pinglist [list www.google.com www.facebook.com] | |
set httplist [list www.google.com www.facebook.com] | |
set httpslist [list www.google.com www.facebook.com] | |
set ftplist [list] | |
set sshlist [list alt.org thebes.openshells.net] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#fifo_logwatch.sh -jrelo | |
trap ctrl_c INT | |
fifo=/tmp/fifolog.$$ | |
mkfifo "${fifo}" || exit 1 | |
function ctrl_c() { | |
echo "ctrl^c caught. exiting..." | |
rm "${fifo}" | |
exit 130; |
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var serialized_obj = [ | |
0,1,0,0,0,255,255,255,255,1,0,0,0,0,0,0,0,4,1,0,0,0,34,83,121,115,116,101,109,46,68,101,108, | |
101,103,97,116,101,83,101,114,105,97,108,105,122,97,116,105,111,110,72,111,108,100,101,114,3,0,0,0,8,68,101,108, | |
101,103,97,116,101,7,116,97,114,103,101,116,48,7,109,101,116,104,111,100,48,3,3,3,48,83,121,115,116,101,109,46, | |
68,101,108,101,103,97,116,101,83,101,114,105,97,108,105,122,97,116,105,111,110,72,111,108,100,101,114,43,68,101,108,101, | |
103,97,116,101,69,110,116,114,121,34,83,121,115,116,101,109,46,68,101,108,101,103,97,116,101,83,101,114,105,97,108,105, | |
122,97,116,105,111,110,72,111,108,100,101,114,47,83,121,115,116,101,109,46,82,101,102,108,101,99,116,105,111,110,46,77, | |
101,109,98,101,114,73,110,102,111,83,101,114,105,97,108,105,122,97,116,105,111,110,72,111,108,100,101,114,9,2,0,0, |
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var serialized_obj = [ | |
0,1,0,0,0,255,255,255,255,1,0,0,0,0,0,0,0,4,1,0,0,0,34,83,121,115,116,101,109,46,68,101,108, | |
101,103,97,116,101,83,101,114,105,97,108,105,122,97,116,105,111,110,72,111,108,100,101,114,3,0,0,0,8,68,101,108, | |
101,103,97,116,101,7,116,97,114,103,101,116,48,7,109,101,116,104,111,100,48,3,3,3,48,83,121,115,116,101,109,46, | |
68,101,108,101,103,97,116,101,83,101,114,105,97,108,105,122,97,116,105,111,110,72,111,108,100,101,114,43,68,101,108,101, | |
103,97,116,101,69,110,116,114,121,34,83,121,115,116,101,109,46,68,101,108,101,103,97,116,101,83,101,114,105,97,108,105, | |
122,97,116,105,111,110,72,111,108,100,101,114,47,83,121,115,116,101,109,46,82,101,102,108,101,99,116,105,111,110,46,77, | |
101,109,98,101,114,73,110,102,111,83,101,114,105,97,108,105,122,97,116,105,111,110,72,111,108,100,101,114,9,2,0,0, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# coding: utf-8 | |
# Basic socket usage to grab a banner. | |
# @author Kent 'picat' Gruber | |
require 'socket' | |
# Grab the banner of a given +ip+ address and +port+ | |
# to attempt to connect to. | |
# | |
# @param ip [String] Target IP address. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
require 'json' | |
require 'sinatra' | |
require 'violent_ruby' | |
post '/crack_passwords' do | |
content_type :json | |
config = { | |
file: params['file'][:tempfile], | |
dictionary: params['dictionary'][:tempfile] | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <linux/module.h> | |
#include <linux/printk.h> | |
#include <linux/fs.h> | |
#include <linux/sched.h> | |
#include <asm/unistd.h> | |
#include <asm/pgtable_types.h> | |
#include <linux/highmem.h> | |
#include "hook_function_ptr.h" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
obj-m += afw.o | |
afw-objs := afw_main.o locate_sct.o ttgl.o | |
ccflags-y := -std=gnu99 -O2 | |
all: | |
make -C /lib/modules/$(shell uname -r)/build M=$(PWD) modules | |
clean: | |
make -C /lib/modules/$(shell uname -r)/build M=$(PWD) clean |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
quick: | |
$ echo $((0x15a)) | |
346 | |
$ printf '%d\n' 0x15a | |
346 | |
$ perl -e 'printf ("%d\n", 0x15a)' | |
346 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#kmods and stuff | |
#grep -o '[^\/]*$' /lib/modules/$(uname -r)/modules.builtin > /tmp/mods.builtin ; find /lib/modules/$(uname -r)/kernel -type f -printf '%f\n'|grep -v -f /tmp/mods.builtin|cut -d\. -f1|while read; do modinfo $REPLY;done | |
#grep -H '' /sys/module/*/parameters/* | |
for i in `find /sys/ -name modalias -exec cat {} \;`; do | |
/sbin/modprobe --config /dev/null --show-depends $i ; | |
done | rev | cut -f 1 -d '/' | rev | sort -u | |
find /lib/modules/$(uname -r)/kernel -type f -printf '%f\n' | sort | while read mod;do [ $(lsmod | grep -c ${mod/.ko/}) -ge 1 ] && echo "$mod (loaded)" || echo "$mod";done | tee /tmp/modules.out |