Skip to content

Instantly share code, notes, and snippets.

View vijayanandrp's full-sized avatar
👑

Vijay Anand Pandian vijayanandrp

👑
View GitHub Profile
@vijayanandrp
vijayanandrp / ngrams.py
Last active May 20, 2017 14:54 — forked from benhoyt/ngrams.py
Print most frequent N-grams in given file
"""Print most frequent N-grams in given file.
Usage: python ngrams.py filename
Problem description: Build a tool which receives a corpus of text,
analyses it and reports the top 10 most frequent bigrams, trigrams,
four-grams (i.e. most frequently occurring two, three and four word
consecutive combinations).
NOTES
@vijayanandrp
vijayanandrp / Scrapy.sh
Last active June 19, 2017 08:41 — forked from redapple/in_container_console_logs.txt
Installing scrapy 1.1 on Ubuntu 16.04 on Python 3, using virtualenvwrapper
# When the cache is clear, pip is working again.
hash -r
1. sudo apt-get install python3 python-dev python3-dev build-essential libssl-dev libffi-dev libxml2-dev libxslt-dev python3-pip
2. sudo pip3 install virtualenvwrapper
3. workon [try this command in terminal if it not works go to point 4]
4. source /usr/local/bin/virtualenvwrapper.sh (or) source ~/.local/bin/virtualenvwrapper.sh
@vijayanandrp
vijayanandrp / RSA-Decipher.py
Created June 14, 2017 20:33
RSA Decipher using Fast Exponentiation Algorithms Example - 250 writeup - (Zeromutarts.de 2013)
#!/usr/bin/env python
## using SAGE RSA
n = 80646413
p = floor(sqrt(80646413))
### Finding Factor p*q = n
while(true):
@vijayanandrp
vijayanandrp / crypt_getpass_pwd.py
Created June 14, 2017 20:38
crypt, pwd, getpass - Understand by quick example
#!/usr/bin/python
import crypt, getpass, pwd
def main():
print "##### This programs helps to understand the username/password storage in Operating System #######\n"
username = raw_input('Python login:')
try:
cryptedpasswd = pwd.getpwnam(username).pw_passwd
except KeyError:
@vijayanandrp
vijayanandrp / pwd_example.py
Created June 14, 2017 20:39
pwd quick example
#!/usr/bin/python
import pwd
from tabulate import tabulate
def main():
pwd_headers = ["pw_name", "pw_passwd", "pw_uid", "pw_gid", "pw_gecos", "pw_dir", "pw_shell"]
passwd_entries = pwd.getpwall()
pwd_list = []
for (pw_name, pw_passwd, pw_uid, pw_gid, pw_gecos, pw_dir, pw_shell) in passwd_entries:
>>> pwd.struct_pwent(['root', 'toor', '502', '20', 'Vijay', '/var/root/', '/bin/sh'])
pwd.struct_passwd(pw_name='root', pw_passwd='toor', pw_uid='502', pw_gid='20', pw_gecos='Vijay', pw_dir='/var/root/', pw_shell='/bin/sh')
>>> pwd.struct_passwd(['root', 'toor', '502', '20', 'Vijay', '/var/root/', '/bin/sh'])
pwd.struct_passwd(pw_name='root', pw_passwd='toor', pw_uid='502', pw_gid='20', pw_gecos='Vijay', pw_dir='/var/root/', pw_shell='/bin/sh')
@vijayanandrp
vijayanandrp / Simple_Port_scanner_in_python.py
Created June 14, 2017 20:55
10 line code to create Port Scanner using Python
#!/usr/bin/python
import socket
def main():
ip = raw_input("ENTER THE TARGET IP ADDRESS: ")
for port in range(1, 65535):
s = socket.socket
try:
s = s(socket.AF_INET, socket.SOCK_STREAM)
@vijayanandrp
vijayanandrp / read_captured_pcap_file_using_python.py
Created June 14, 2017 20:59
Simple way to parse captured pcap file using python
#!/usr/bin/env python
import dpkt
import sys
import socket
import urlparse
captured_pcap = file("captured.pcap", 'rb')
fpcap = dpkt.pcap.Reader(captured_pcap)
@vijayanandrp
vijayanandrp / hello.c
Created June 14, 2017 21:07
Simple C Program
#include<stdio.h>
#include<conio.h>
int main(int argc, char *argv[])
{
if (argc < 2)
{
printf("%s \n", "Pass your name as the argument");
return 0;
}
@vijayanandrp
vijayanandrp / metasploit_framework.sh
Created June 14, 2017 21:10
Learn the basics of Metasploit Framework in 5 minutes !!
#To explore the metasploit framework
cd /usr/share/metasploit-framework/
#To explore the modules
cd modules/
#To explore the available exploits
cd exploits/
#Before using the metasploit start the Postgres SQL database which will use to track what you do