Skip to content

Instantly share code, notes, and snippets.

@4d4c
4d4c / thread_brute.py
Created November 22, 2020 16:05
ThreadPool Brute
#!/usr/bin/env python3
import subprocess
import traceback
from concurrent.futures import ThreadPoolExecutor
from tqdm import tqdm
def passwords(wordlist: str) -> list:
@4d4c
4d4c / maze.py
Last active January 3, 2020 12:23
import copy
import os
import time
MAZE = [
["#", "#", "#", "#", "#"],
[" ", " ", " ", "#", " "],
[" ", "#", " ", "#", " "],
[" ", " ", " ", " ", " "],
["E", "#", "#", "#", "#"],
@4d4c
4d4c / mini-reverse-listener.ps1
Last active December 26, 2019 21:23 — forked from staaldraad/mini-reverse-listener.ps1
A reverse shell listener in powershell
$socket = new-object System.Net.Sockets.TcpListener('127.0.0.1', 413);
if($socket -eq $null){
exit 1
}
$socket.start()
$client = $socket.AcceptTcpClient()
write-output "[*] Connection!"
$stream = $client.GetStream();
$writer = new-object System.IO.StreamWriter($stream);
$buffer = new-object System.Byte[] 2048;