Skip to content

Instantly share code, notes, and snippets.


Brennan Lee Turner BLTSEC

View GitHub Profile
#!/usr/bin/env python3
from scapy.all import *
from netfilterqueue import NetfilterQueue
import os
def modify(packet):
domain = b'bltsec'
pkt = IP(packet.get_payload()) #converts the raw packet to a scapy compatible string
#!/usr/bin/env python3
# pip3 install beautifulsoup4
# pip3 install lxml
# pip install --upgrade certifi #SSL: CERTIFICATE_VERIFY_FAILED
# SELECT path FROM blogs WHERE deleted = 0 AND archived = 0;
# used to bypass Cloudflare's anti-bot page
from bs4 import BeautifulSoup as bs
import argparse
import cfscrape
import sys
View go-run-windowscmd.go
package main
import (
func main() {
Last active Sep 28, 2017
bind_destroyer - Python listening port scanner and destroyer
# bind_destroyer - Python listening port scanner and destroyer
# Written by: Brennan Turner (@BLTSEC)
# Usage: python
# Usage: python3

Keybase proof

I hereby claim:

  • I am bltsec on github.
  • I am bltsec ( on keybase.
  • I have a public key whose fingerprint is 2260 3A23 DAA7 E826 3098 5171 FC04 2705 5373 A7D2

To claim this, I am signing this object: