Skip to content

Instantly share code, notes, and snippets.

View Mister2Tone's full-sized avatar

Pisit Tansri Mister2Tone

  • BKK
View GitHub Profile
usb_codes = {
0x04:"aA", 0x05:"bB", 0x06:"cC", 0x07:"dD", 0x08:"eE", 0x09:"fF",
0x0A:"gG", 0x0B:"hH", 0x0C:"iI", 0x0D:"jJ", 0x0E:"kK", 0x0F:"lL",
0x10:"mM", 0x11:"nN", 0x12:"oO", 0x13:"pP", 0x14:"qQ", 0x15:"rR",
0x16:"sS", 0x17:"tT", 0x18:"uU", 0x19:"vV", 0x1A:"wW", 0x1B:"xX",
0x1C:"yY", 0x1D:"zZ", 0x1E:"1!", 0x1F:"2@", 0x20:"3#", 0x21:"4$",
0x22:"5%", 0x23:"6^", 0x24:"7&", 0x25:"8*", 0x26:"9(", 0x27:"0)",
0x2C:" ", 0x2D:"-_", 0x2E:"=+", 0x2F:"[{", 0x30:"]}", 0x32:"#~",
0x33:";:", 0x34:"'\"", 0x36:",<", 0x37:".>", 0x4f:">", 0x50:"<"
}
@Mister2Tone
Mister2Tone / ctp_quiz8_decoder.py
Last active August 29, 2019 17:05
decoder the payload that got from pcap files
#!/usr/bin/python2.7
import string
import random
from base64 import b64encode, b64decode
FLAG = 'flag{xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx}'
enc_ciphers = ['rot13', 'b64e', 'caesar']
dec_ciphers = ['rot13', 'b64d', 'caesard']
@Mister2Tone
Mister2Tone / dns_exfiltration_decryptor.py
Created August 21, 2019 18:09
DNS Exfiltration RC4 Decryptor
#!/usr/bin/python2.7
# -*- coding: utf8 -*-
from base64 import b64decode, b32decode
#========================================================================================================#
# Modify DNSExfiltrator.py (ref:https://github.com/Arno0x/DNSExfiltrator/blob/master/dnsexfiltrator.py) #
#========================================================================================================#
#------------------------------------------------------------------------
@Mister2Tone
Mister2Tone / tmux-cheatsheet.markdown
Created August 18, 2019 02:18 — forked from MohamedAlaa/tmux-cheatsheet.markdown
tmux shortcuts & cheatsheet

tmux shortcuts & cheatsheet

start new:

tmux

start new with session name:

tmux new -s myname
@Mister2Tone
Mister2Tone / unix-environment-preparing.txt
Last active November 6, 2021 14:43
remind how to install thai language on kali
# Install VirtualBox Kali Guest for Clipboard / Drag&Drop features
https://www.kali.org/docs/virtualization/install-virtualbox-kali-guest/
# Change Software repositories to Thailan KU Mirror
root@kali$ nano /etc/apt/sources.list
## commend previous Mirror and add list below to sources.list files
deb https://mirror.kku.ac.th/kali/ kali-rolling main contrib non-free
deb-src https://mirror.kku.ac.th/kali/ kali-rolling main contrib non-free
# install Font-thai on Kali Linux
version: '3'
services:
db:
image: mysql:5.7
volumes:
- ./db_data:/var/lib/mysql
restart: always
environment:
MYSQL_ROOT_PASSWORD: somewordpress
@Mister2Tone
Mister2Tone / modules.js
Created November 2, 2017 15:18
discuss about decrease running times in iteration
router.get('/', async(req,res) =>{
var modulesAll = await moduleApi.getExploitModules()
.then((result) => {
return result.modules
})
var modules = {}
for(let i=0;i<modulesAll.length;i++){
modules[i] = await moduleApi.getModuleInfo('exploit',modulesAll[i])
.then( (result) => {
start_list = [5, 3, 1, 2, 4]
square_list = []
for temp in start_list:
square_list.append(temp**2)
square_list.sort()
print square_list
@Mister2Tone
Mister2Tone / eternalblue7_exploit.py
Created May 28, 2017 09:57 — forked from worawit/eternalblue7_exploit.py
Eternalblue exploit for Windows 7/2008
#!/usr/bin/python
from impacket import smb
from struct import pack
import os
import sys
import socket
'''
EternalBlue exploit for Windows 7/2008 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)
@Mister2Tone
Mister2Tone / eternalblue8_exploit.py
Created May 28, 2017 09:57 — forked from worawit/eternalblue8_exploit.py
Eternalblue exploit for Windows 8/2012
#!/usr/bin/python
from impacket import smb
from struct import pack
import os
import sys
import socket
'''
EternalBlue exploit for Windows 8 and 2012 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)