The following script will perform a port scanning on localhost target.
https://portswigger.net/research/exposing-intranets-with-reliable-browser-based-port-scanning
| #!/usr/bin/env python | |
| from pexpect import pxssh | |
| import optparse | |
| import time | |
| from threading import * | |
| maxConnections = 5 | |
| connection_lock = BoundedSemaphore(value=maxConnections) | |
| Found = False | |
| PasswordFound = '' | |
| Fails = 0 |
| #!/usr/bin/env python | |
| import pexpect | |
| import optparse | |
| import os | |
| from threading import * | |
| maxConnections = 5 | |
| connection_lock = BoundedSemaphore(value=maxConnections) | |
| Stop = False | |
| Fails = 0 |
| /* TCP server with Backdoor */ | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <string.h> | |
| #include <sys/types.h> | |
| #include <sys/socket.h> | |
| #include <netinet/in.h> | |
| #include <arpa/inet.h> | |
| #include <errno.h> |
| /* | |
| * example.conf by Daniel Hawton AKA Osiris ([email protected]). | |
| * $Id: example.conf,v 1.1.1.1.2.24 2009/04/13 11:03:55 syzop Exp $ | |
| * | |
| * Works for Unreal3.2 and up | |
| * | |
| * Okay guys. This is the new example.conf. Its look is much like C++, kinda. | |
| * Anyway it is time to go over this. It's hard to pick up at first, but | |
| * with some pratice and reading you'll understand. | |
| * |
The following script will perform a port scanning on localhost target.
https://portswigger.net/research/exposing-intranets-with-reliable-browser-based-port-scanning
| package main | |
| import ( | |
| "fmt" | |
| "net" | |
| "os" | |
| "os/exec" | |
| ) | |
| func main() { |
| package main | |
| import ( | |
| "bytes" | |
| "log" | |
| "net" | |
| "os" | |
| ) | |
| // Connection handler |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env python3 | |
| import base64 | |
| import datetime | |
| import hmac | |
| import os | |
| import struct | |
| import time | |
| import sys |
| #!/usr/bin/env python3 | |
| """ | |
| Script: eml_4n6.py | |
| Description: Extract attachments and log metadata from EML files. | |
| Author: tsumarios | |
| Date: 21/12/2023 | |
| Note: This script is based on https://github.com/diogo-alves/eml-extractor and extends it with logging and other forensics features. | |
| Usage: |