wget -c wget -c https://github.com/inversepath/usbarmory-debian-base_image/releases/download/20170518/usbarmory-debian_jessie-base_image-20170518.raw.zip
fdisk -l
#!/usr/bin/env ruby | |
# list databases on MySQL servers. Must have login credential | |
Nmap::Program.scan do |task| | |
task.ports = 443 | |
task.script = 'smb-security-mode' | |
# check the script params | |
# https://nmap.org/nsedoc/scripts/smb-security-mode.html | |
# https://nmap.org/nsedoc/lib/smb.html#script-args | |
# https://nmap.org/nsedoc/lib/smbauth.html#script-args |
#!/usr/bin/env python | |
""" | |
KING SABRI | @KINGSABRI | |
An example of sqlmap tamper script to inject the payload in query | |
""" | |
from lib.core.data import kb | |
from lib.core.enums import PRIORITY | |
import string | |
import re |
# Onliner Web Proxy Server in Ruby | |
ruby -r webrick/httpproxy -e 's = WEBrick::HTTPProxyServer.new(:Port => 8080, :RequestCallback => Proc.new {|req,res| puts req.request_line, req.raw_header}); trap("INT"){s.shutdown}; s.start' |
<?xml version="1.0" encoding="utf-8"?> | |
<document nipperstudio="2.5.5.5804" xmlversion="2" xmlrevision="3"> | |
<information> | |
<title>Audit Report</title> | |
<author>Nipper Studio</author> | |
<date>Tuesday, August 8, 2017</date> | |
<generator> | |
<product>Nipper Studio</product> | |
<manufacturer>Titania</manufacturer> | |
<website>www.titania.com</website> |
#!/usr/bin/env ruby | |
# | |
# KING SABRI | @KINGSABRI | |
# script to inverse a given printable string to zeroing out registers (Useful in Buffer Overflow). | |
# | |
class String | |
# inverse inverse a given printable string to zeroing out registers | |
# (Useful in Buffer Overflow). |
require 'net/http' | |
require 'uri' | |
host = "localhost" | |
port = 5125 | |
path = "/api/hoge/hoge/hoge" | |
body = URI.encode_www_form({'number'=>0, 'mode'=>'gauge'}) | |
# 1) | |
@client = Net::HTTP.new(host, port) | |
# @client.set_debug_output(STDOUT) |
#!/usr/bin/env ruby | |
require 'rexec' | |
CLIENT = <<EOF | |
$connection.run do |path| | |
listing = [] | |
IO.popen("ls -la " + path.dump, "r+") do |ls| |