This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import base64 | |
import smtplib | |
import time | |
import argparse | |
import dns.resolver | |
from email.mime.text import MIMEText | |
from email.mime.multipart import MIMEMultipart | |
# Configuration | |
CHUNK_SIZE = 63 # Size of each data chunk in bytes |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Filename: allow_uk_block_others.sh | |
# Step 1: Download UK IP ranges | |
echo "Downloading UK IP ranges..." | |
wget -q http://www.ipdeny.com/ipblocks/data/countries/gb.zone -O uk_ips.txt | |
# Check if the download was successful | |
if [ ! -f uk_ips.txt ]; then |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import os | |
import argparse | |
import hashlib | |
import json | |
from itertools import islice | |
def file_to_hex(filename): | |
"""Convert file content to a hex string.""" | |
with open(filename, 'rb') as file: | |
content = file.read() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# A hunter script from John & Dave's Data- Bouncing project https://thecontractor.io/data-bouncing/ | |
# This script will find candidates for smuggling data / coms / whatever starting as HTTP/S requests to domains, ending up in your DNS reciever to be rebuilt/read whatever | |
# dont forget to add your own OOB server, that could be interactsh or collaborator, or something esle, if you dont know what you're doing, go read the posts :) | |
# have fun, dont be a dick. | |
# Pre-flight check to verify and install necessary utilities | |
for utility in curl parallel bc; do | |
if ! command -v $utility &> /dev/null; then |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import os | |
import argparse | |
import hashlib | |
def file_to_hex(filename): | |
"""Convert file content to a hex string.""" | |
with open(filename, 'rb') as file: | |
content = file.read() | |
return content.hex(), content |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Function to check if a command exists | |
command_exists() { | |
type "$1" &> /dev/null | |
} | |
# Preflight check for necessary commands (curl and sed) | |
if ! command_exists curl; then | |
echo "Error: curl is not installed. Please install curl and try again." |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Pain in the ass to set up, need rust, cargo for quiche-client | |
# Define the path to the text file containing the list of target domains | |
domain_list_file="domains.txt" | |
# Define an array of headers | |
headers=( | |
"X-Forwarded-For: xff.OOB_LISTENER.com" | |
"X-Wap-Profile: wafp.OOB_LISTENER.com" | |
"CF-Connecting_IP: cfcon.OOB_LISTENER.com" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Dependency check | |
if ! command -v jq &> /dev/null; then | |
echo "jq is not installed. Would you like to install it? (y/n)" | |
read -r answer | |
if [[ $answer == "y" || $answer == "Y" ]]; then | |
sudo apt-get install jq | |
else | |
echo "jq is required for this script to run." |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# A hunter script from John & Dave's Data- Bouncing project https://thecontractor.io/data-bouncing/ | |
# This script will find candidates for smuggling data / coms / whatever starting as HTTP/S requests to domains, ending up in your DNS reciever to be rebuilt/read whatever | |
# dont forget to add your own OOB server, that could be interactsh or collaborator, or something esle, if you dont know what you're doing, go read the posts :) | |
# have fun, dont be a dick. | |
# Pre-flight check to verify and install necessary utilities | |
for utility in curl parallel bc; do | |
if ! command -v $utility &> /dev/null; then |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import argparse | |
import hashlib | |
import os | |
import base64 | |
import random | |
import requests | |
import uuid | |
from cryptography.fernet import Fernet | |
from cryptography.hazmat.primitives import hashes | |
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC |
NewerOlder