Skip to content

Instantly share code, notes, and snippets.

from __future__ import print_function
import os , random , json
w = set()
stop_file = json.load(open("pt.json")) # 1
for f in os.listdir('p03ms') :
fo = open("p03ms/"+f).read()
fo = fo.split(" ")
for s in fo :
w.add(s) # 2
w0rds = list(w)
#Edit Me!
#Introduction to scripting: https://github.com/zorgiepoo/Bit-Slicer/wiki/Introduction-to-Scripting
from bitslicer import VirtualMemoryError, DebuggerError
import keycode, keymod
class Script(object):
def __init__(self):
self.currentLifeAddress = None
debug.log('Initialization..')
debug.registerHotkey(keycode.A, keymod.CONTROL, self.killShip)
# -*- coding: utf-8 -*-
import subprocess
'''
NET OWNER 0.1v
Only works with OS X
run with sudo
'''
x = "0E 00 03 2B 04 1A 2D 1C 2A 2D 1C 3D 08 1A 19 28 01 0D 1B 00 1A 2D 0C 30 22
1C 16 00 1A 1B 28 1C 31 1B 3A 19 00 00 38 3E 0A 11 12 1B 30 23 00 1D 2B 00 04 02
1A 2D 3E 0E 3D 11 15 1D 2C 30 0F 2B 03 1B 17 01 2B 29 30 12 00 06 0E 12 0B 0B 1
8 0C 0A 1B 0E 2C 13 0A 3D 15 15 02 2F 0A 03 2B 15 08 00 0E 00 21 0E 0B 12 2B 1B
38 02 1B 18 11 06 5E 30 32 2D 06 11 3E 17 00 3F 1D 0B 06 0C 08 5E 30 32 2D 06 11
3E 04 1D 28 1C 1D 15 49 36 1F 0E 36 3F 30 0B 0F 07 0A 2A 1A 1C 15 0B AA D5 0E 7
3 13 02 03 08 07 30 24 01 1F 01 0C 0C 06 1A 3B 29 43 3D 0C 15 06 3E 30 09 01 00
1B 00 0E 73 13 02 03 08 07 30 25 00 1C 06 0A 1B 5C 30 1A 3F 1B 03 3E 11 30 2C 30
1C 15 1F 08 1D 30 3B 2D 30 0E 0E 01 0C 38 1D 0F 2B 00 1A 06 0E 2D 13 1B 0D 0C 1
5 01 29 00 31 17 0A 07 06 0E 00 28 00 11 3E 1C 00 20 0A 00 07 4B"
from subprocess import check_output
brute_list = open("top1000.txt").read().split("\n")
cipher_types = ["-aes-128-cbc","-aes-128-cfb","-aes-128-cfb1","-aes-128-cfb8","-aes-128-ecb","-aes-128-ofb",
"-aes-192-cbc","-aes-192-cfb","-aes-192-cfb1","-aes-192-cfb8","-aes-192-ecb","-aes-192-ofb","-aes-256-cbc","-aes-256-cfb",
"-aes-256-cfb1","-aes-256-cfb8","-aes-256-ecb","-aes-256-ofb","-aes128","-aes192","-aes256","-bf","-bf-cbc",
"-bf-cfb","-bf-ecb","-bf-ofb","-blowfish","-cast","-cast-cbc","-cast5-cbc","-cast5-cfb","-cast5-ecb",
"-cast5-ofb","-des","-des-cbc","-des-cfb","-des-cfb1","-des-cfb8","-des-ecb","-des-ede","-des-ede-cbc",
"-des-ede-cfb","-des-ede-ofb","-des-ede3",
void setup () {
size(500,500) ;
frameRate(300) ;
background(0);
smooth();
}
void draw() {
background(0) ;
for ( int i = 0 ; i < 360 ; i += 1) {
<?php print "<?php phpinfo();?>" ;?>
from bitslicer import VirtualMemoryError, DebuggerError
import keycode, keymod
class Script(object):
def __init__(self):
self.currentLifeAddress = None # variable to store where the enemy's life address is
debug.registerHotkey(keycode.A, keymod.CONTROL, self.killShip) # Add a hotkey to call the self.killShip function
debug.addBreakpoint(vm.base() + 0xDC642, self.shipDamaged) # Make a breakpoint every time that mov [rdi+0x70], eax is reached and call self.shipDamaged , vm.base() is the pagination of the memory , this changes every time it loads
def killShip(self,hotkeyID) :
def zk_open_the_fucking_door(self,cmd,ss):
command = cmd
command_string = ss
chksum = 0
session_id = self.session_id
reply_id = unpack('HHHH', self.data_recv[:8])[3]
buf = self.createHeader(command, chksum, session_id,
reply_id, command_string)
self.zkclient.sendto(buf, self.address)

Keybase proof

I hereby claim:

  • I am caioluders on github.
  • I am caioluders (https://keybase.io/caioluders) on keybase.
  • I have a public key whose fingerprint is E36E 7964 0CDF AA23 08E8 CBBB 3B14 CD07 C1DC A57D

To claim this, I am signing this object: