Skip to content

Instantly share code, notes, and snippets.

View Tester2009's full-sized avatar
💭
breathing

Мухаммад Алифф Муаззам Tester2009

💭
breathing
View GitHub Profile
@Tester2009
Tester2009 / Text2hex.sh
Last active November 7, 2016 21:31
Convert Text to Hexadecimal
# this code is written in terminal
# basically in .sh
# just chmod this file
# usage:
# chmod +x Text2hex.sh
# ./Text2hex.sh "this is my hexa"
# 74 68 69 73 20 69 73 20 6d 79 20 68 65 78 61
#
# source: http://stackoverflow.com/questions/6791798/convert-string-to-hexadecimal-on-command-line
# this is tool list that i've installed in my linux machine
foremost - for recovery
bless - hexa editor (currently got bug "Error saving file due not enough free space on the device" )
wxhexeditor - hexa editor (bug too :( )
hexcurse - hexa editor (cli mode)
ghex - hexa editor
jp2a - convert image to ascii art
screenfetch - linux mini detail
git - for git
@Tester2009
Tester2009 / ela.py
Created November 15, 2016 07:32 — forked from ewencp/ela.py
Quick, simple implementation of Error Level Analysis
#!/usr/bin/env python
# This is a really simple implementation of ELA as described in
# http://blackhat.com/presentations/bh-dc-08/Krawetz/Whitepaper/bh-dc-08-krawetz-WP.pdf
# You shouldn't actually use it, or at least read the paper carefully
# and implement more of the techniques before drawing any conclusions.
from PIL import Image, ImageChops, ImageEnhance
import sys, os.path
@Tester2009
Tester2009 / freeramcache.sh
Created April 3, 2017 12:32
Free RAM and Swap
# source: http://www.tecmint.com/clear-ram-memory-cache-buffer-and-swap-space-on-linux/
# Clear PageCache, dentries, and inodes
# Sync will flush the filesystem buffer.
# Chmod this file to 755
sync; echo 3 > /proc/sys/vm/drop_caches
echo "Syncing..."
# Clear Swap Space
@Tester2009
Tester2009 / data_extractor.py
Last active May 4, 2017 05:28
simple way to extract data by using python
# Simple Data Extractor
# Made by Tester2009. https://github.com/alepcat1710
# May 4, 2017
# Ver 1.2
import getopt, sys, os, json, urllib2
from urlparse import urlparse
def main():
try:
opts, args = getopt.getopt(sys.argv[1:], "hu:v", ["url=", "version", "help"])
except getopt.GetoptError as err:
#!/usr/bin/python
from impacket import smb
from struct import pack
import os
import sys
import socket
'''
EternalBlue exploit for Windows 7/2008 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)
@Tester2009
Tester2009 / eternalblue8_exploit.py
Created May 18, 2017 08:21 — forked from worawit/eternalblue8_exploit.py
Eternalblue exploit for Windows 8/2012
#!/usr/bin/python
from impacket import smb
from struct import pack
import os
import sys
import socket
'''
EternalBlue exploit for Windows 8 and 2012 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)
@Tester2009
Tester2009 / check.py
Last active May 20, 2017 19:24
Communicate with authorized user only
# Made by fb.com/Tester2009 [ Hakase ]
# github: https://github.com/alepcat1710
# May 17, 2017
#
# Use this code to build a better world
# Simply credit to me @tester2009.
#
import telebot
API_TOKEN = ''
@Tester2009
Tester2009 / currency_symbols.php
Created June 9, 2017 17:32 — forked from aliuadepoju/currency_symbols.php
An array of currency symbols as HTML entities
<?php
$currency_symbols = array(
'AED' => '&#1583;.&#1573;', // ?
'AFN' => '&#65;&#102;',
'ALL' => '&#76;&#101;&#107;',
'AMD' => '',
'ANG' => '&#402;',
'AOA' => '&#75;&#122;', // ?
'ARS' => '&#36;',
'AUD' => '&#36;',
@Tester2009
Tester2009 / annotations.xml
Created June 10, 2017 14:33 — forked from Neo23x0/annotations.xml
Sources for APT Groups and Operations Search Engine
<?xml version="1.0" encoding="UTF-8" ?>
<Annotations start="0" num="126" total="126">
<Annotation about="blog.malwaremustdie.org/*" timestamp="0x0005408aeb576862" href="ChlibG9nLm1hbHdhcmVtdXN0ZGllLm9yZy8qEOLQ3dqukdAC">
<Label name="_cse_turlh5vi4xc" />
<AdditionalData attribute="original_url" value="http://blog.malwaremustdie.org/" />
</Annotation>
<Annotation about="blog.airbuscybersecurity.com/*" timestamp="0x0005408aea73fd53" href="Ch5ibG9nLmFpcmJ1c2N5YmVyc2VjdXJpdHkuY29tLyoQ0_rP066R0AI">
<Label name="_cse_turlh5vi4xc" />
<AdditionalData attribute="original_url" value="http://blog.airbuscybersecurity.com/" />
</Annotation>