start new:
tmux
start new with session name:
tmux new -s myname
usb_codes = { | |
0x04:"aA", 0x05:"bB", 0x06:"cC", 0x07:"dD", 0x08:"eE", 0x09:"fF", | |
0x0A:"gG", 0x0B:"hH", 0x0C:"iI", 0x0D:"jJ", 0x0E:"kK", 0x0F:"lL", | |
0x10:"mM", 0x11:"nN", 0x12:"oO", 0x13:"pP", 0x14:"qQ", 0x15:"rR", | |
0x16:"sS", 0x17:"tT", 0x18:"uU", 0x19:"vV", 0x1A:"wW", 0x1B:"xX", | |
0x1C:"yY", 0x1D:"zZ", 0x1E:"1!", 0x1F:"2@", 0x20:"3#", 0x21:"4$", | |
0x22:"5%", 0x23:"6^", 0x24:"7&", 0x25:"8*", 0x26:"9(", 0x27:"0)", | |
0x2C:" ", 0x2D:"-_", 0x2E:"=+", 0x2F:"[{", 0x30:"]}", 0x32:"#~", | |
0x33:";:", 0x34:"'\"", 0x36:",<", 0x37:".>", 0x4f:">", 0x50:"<" | |
} |
#!/usr/bin/python2.7 | |
import string | |
import random | |
from base64 import b64encode, b64decode | |
FLAG = 'flag{xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx}' | |
enc_ciphers = ['rot13', 'b64e', 'caesar'] | |
dec_ciphers = ['rot13', 'b64d', 'caesard'] |
#!/usr/bin/python2.7 | |
# -*- coding: utf8 -*- | |
from base64 import b64decode, b32decode | |
#========================================================================================================# | |
# Modify DNSExfiltrator.py (ref:https://github.com/Arno0x/DNSExfiltrator/blob/master/dnsexfiltrator.py) # | |
#========================================================================================================# | |
#------------------------------------------------------------------------ |
# Install VirtualBox Kali Guest for Clipboard / Drag&Drop features | |
https://www.kali.org/docs/virtualization/install-virtualbox-kali-guest/ | |
# Change Software repositories to Thailan KU Mirror | |
root@kali$ nano /etc/apt/sources.list | |
## commend previous Mirror and add list below to sources.list files | |
deb https://mirror.kku.ac.th/kali/ kali-rolling main contrib non-free | |
deb-src https://mirror.kku.ac.th/kali/ kali-rolling main contrib non-free | |
# install Font-thai on Kali Linux |
version: '3' | |
services: | |
db: | |
image: mysql:5.7 | |
volumes: | |
- ./db_data:/var/lib/mysql | |
restart: always | |
environment: | |
MYSQL_ROOT_PASSWORD: somewordpress |
router.get('/', async(req,res) =>{ | |
var modulesAll = await moduleApi.getExploitModules() | |
.then((result) => { | |
return result.modules | |
}) | |
var modules = {} | |
for(let i=0;i<modulesAll.length;i++){ | |
modules[i] = await moduleApi.getModuleInfo('exploit',modulesAll[i]) | |
.then( (result) => { |
start_list = [5, 3, 1, 2, 4] | |
square_list = [] | |
for temp in start_list: | |
square_list.append(temp**2) | |
square_list.sort() | |
print square_list |
#!/usr/bin/python | |
from impacket import smb | |
from struct import pack | |
import os | |
import sys | |
import socket | |
''' | |
EternalBlue exploit for Windows 7/2008 by sleepya | |
The exploit might FAIL and CRASH a target system (depended on what is overwritten) |
#!/usr/bin/python | |
from impacket import smb | |
from struct import pack | |
import os | |
import sys | |
import socket | |
''' | |
EternalBlue exploit for Windows 8 and 2012 by sleepya | |
The exploit might FAIL and CRASH a target system (depended on what is overwritten) |