I hereby claim:
- I am stamparm on github.
- I am stamparm (https://keybase.io/stamparm) on keybase.
- I have a public key whose fingerprint is 93D8 F2DD 0948 7028 EAB1 D51E DF02 F6DE B539 7B1B
To claim this, I am signing this object:
import os | |
import socket | |
import sys | |
import threading | |
import time | |
import traceback | |
import urllib2 | |
production = True |
# This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do | |
# Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz | |
# http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/ | |
import string | |
import zlib | |
import sys | |
import random | |
charset = string.letters + string.digits + "%/+=" |
$ python sqlmap.py -u "http://192.168.21.128/sqlmap/mysql/get_int.php?id=1" -z "ign,flu,bat" --banner -f | |
sqlmap/1.0-dev-7614c81 - automatic SQL injection and database takeover tool | |
http://sqlmap.org | |
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program | |
[*] starting at 10:30:49 | |
[10:30:49] [INFO] testing connection to the target url |
$ python panoptic.py -u "http://192.168.21.128/lfi.php?file=default" -a -w | |
.-',--.`-. | |
<_ | () | _> | |
`-`=='-' | |
Panoptic v0.1-93e0cf0 (https://github.com/lightos/Panoptic/) | |
[i] Starting scan at: 11:46:21 |
// Generic Zeus malware unpacker (ResumeThread) | |
// by Miroslav Stampar (@stamparm) | |
// http://about.me/stamparm | |
VAR ResumeThread | |
VAR msg | |
VAR xname | |
VAR xloc | |
VAR xsize |
<?php | |
/* | |
+---------------------------------------------------------------------------+ | |
| OpenX v${RELEASE_MAJOR_MINOR} | | |
| =======${RELEASE_MAJOR_MINOR_DOUBLE_UNDERLINE} | | |
| | | |
| Copyright (c) 2003-2009 OpenX Limited | | |
| For contact details, see: http://www.openx.org/ | | |
| | |
sons.console.cf | |
advisory.terranovaroofingandsiding.com | |
alberta.croftonliving.com | |
corn.liziarossi.com | |
dave.ddhowdoyoulikemenow.com | |
do.liziarossi.com | |
doug.liziarossi.com | |
electronics.reelhighmedia.com | |
embassy.ddhowdoyoulikemenow.com | |
emphasis.croftonliving.com |
666666:666666 | |
888888:888888 | |
admin:1111 | |
admin:1111111 | |
admin:1234 | |
admin:12345 | |
admin:123456 | |
admin1:password | |
admin:4321 | |
admin:7ujMko0admin |
I hereby claim:
To claim this, I am signing this object:
Windows Registry Editor Version 5.00 | |
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script Host\Settings] | |
"Enabled"="0" |