Skip to content

Instantly share code, notes, and snippets.

Brennan Lee Turner BLTSEC

Block or report user

Report or block BLTSEC

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
#!/usr/bin/env python3
from scapy.all import *
from netfilterqueue import NetfilterQueue
import os
def modify(packet):
domain = b'bltsec'
pkt = IP(packet.get_payload()) #converts the raw packet to a scapy compatible string
#!/usr/bin/env python3
# pip3 install beautifulsoup4
# pip3 install lxml
# pip install --upgrade certifi #SSL: CERTIFICATE_VERIFY_FAILED
# SELECT path FROM blogs WHERE deleted = 0 AND archived = 0;
# used to bypass Cloudflare's anti-bot page
from bs4 import BeautifulSoup as bs
import argparse
import cfscrape
import sys
View go-run-windowscmd.go
package main
import (
func main() {
Last active Sep 28, 2017
bind_destroyer - Python listening port scanner and destroyer
# bind_destroyer - Python listening port scanner and destroyer
# Written by: Brennan Turner (@BLTSEC)
# Usage: python
# Usage: python3

Keybase proof

I hereby claim:

  • I am bltsec on github.
  • I am bltsec ( on keybase.
  • I have a public key whose fingerprint is 2260 3A23 DAA7 E826 3098 5171 FC04 2705 5373 A7D2

To claim this, I am signing this object:

You can’t perform that action at this time.