I hereby claim:
- I am bltsec on github.
- I am bltsec (https://keybase.io/bltsec) on keybase.
- I have a public key whose fingerprint is 2260 3A23 DAA7 E826 3098 5171 FC04 2705 5373 A7D2
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/python3 | |
# | |
# bind_destroyer - Python listening port scanner and destroyer | |
# | |
# Written by: Brennan Turner (@BLTSEC) | |
# | |
# Usage: python bind_destroyer.py | |
# Usage: python3 bind_destroyer.py | |
# | |
# |
package main | |
import ( | |
"fmt" | |
"os/exec" | |
"path/filepath" | |
"strings" | |
) | |
func main() { |
#!/usr/bin/env python3 | |
# pip3 install beautifulsoup4 | |
# pip3 install lxml | |
# pip install --upgrade certifi #SSL: CERTIFICATE_VERIFY_FAILED | |
# SELECT path FROM blogs WHERE deleted = 0 AND archived = 0; | |
# used https://github.com/Anorov/cloudflare-scrape to bypass Cloudflare's anti-bot page | |
from bs4 import BeautifulSoup as bs | |
import argparse | |
import cfscrape | |
import sys |
#!/usr/bin/env python3 | |
from scapy.all import * | |
from netfilterqueue import NetfilterQueue | |
import os | |
def modify(packet): | |
domain = b'bltsec' | |
pkt = IP(packet.get_payload()) #converts the raw packet to a scapy compatible string |