I hereby claim:
- I am caioluders on github.
- I am caioluders (https://keybase.io/caioluders) on keybase.
- I have a public key whose fingerprint is E36E 7964 0CDF AA23 08E8 CBBB 3B14 CD07 C1DC A57D
To claim this, I am signing this object:
from __future__ import print_function | |
import os , random , json | |
w = set() | |
stop_file = json.load(open("pt.json")) # 1 | |
for f in os.listdir('p03ms') : | |
fo = open("p03ms/"+f).read() | |
fo = fo.split(" ") | |
for s in fo : | |
w.add(s) # 2 | |
w0rds = list(w) |
#Edit Me! | |
#Introduction to scripting: https://github.com/zorgiepoo/Bit-Slicer/wiki/Introduction-to-Scripting | |
from bitslicer import VirtualMemoryError, DebuggerError | |
import keycode, keymod | |
class Script(object): | |
def __init__(self): | |
self.currentLifeAddress = None | |
debug.log('Initialization..') | |
debug.registerHotkey(keycode.A, keymod.CONTROL, self.killShip) |
# -*- coding: utf-8 -*- | |
import subprocess | |
''' | |
NET OWNER 0.1v | |
Only works with OS X | |
run with sudo | |
''' |
x = "0E 00 03 2B 04 1A 2D 1C 2A 2D 1C 3D 08 1A 19 28 01 0D 1B 00 1A 2D 0C 30 22 | |
1C 16 00 1A 1B 28 1C 31 1B 3A 19 00 00 38 3E 0A 11 12 1B 30 23 00 1D 2B 00 04 02 | |
1A 2D 3E 0E 3D 11 15 1D 2C 30 0F 2B 03 1B 17 01 2B 29 30 12 00 06 0E 12 0B 0B 1 | |
8 0C 0A 1B 0E 2C 13 0A 3D 15 15 02 2F 0A 03 2B 15 08 00 0E 00 21 0E 0B 12 2B 1B | |
38 02 1B 18 11 06 5E 30 32 2D 06 11 3E 17 00 3F 1D 0B 06 0C 08 5E 30 32 2D 06 11 | |
3E 04 1D 28 1C 1D 15 49 36 1F 0E 36 3F 30 0B 0F 07 0A 2A 1A 1C 15 0B AA D5 0E 7 | |
3 13 02 03 08 07 30 24 01 1F 01 0C 0C 06 1A 3B 29 43 3D 0C 15 06 3E 30 09 01 00 | |
1B 00 0E 73 13 02 03 08 07 30 25 00 1C 06 0A 1B 5C 30 1A 3F 1B 03 3E 11 30 2C 30 | |
1C 15 1F 08 1D 30 3B 2D 30 0E 0E 01 0C 38 1D 0F 2B 00 1A 06 0E 2D 13 1B 0D 0C 1 | |
5 01 29 00 31 17 0A 07 06 0E 00 28 00 11 3E 1C 00 20 0A 00 07 4B" |
from subprocess import check_output | |
brute_list = open("top1000.txt").read().split("\n") | |
cipher_types = ["-aes-128-cbc","-aes-128-cfb","-aes-128-cfb1","-aes-128-cfb8","-aes-128-ecb","-aes-128-ofb", | |
"-aes-192-cbc","-aes-192-cfb","-aes-192-cfb1","-aes-192-cfb8","-aes-192-ecb","-aes-192-ofb","-aes-256-cbc","-aes-256-cfb", | |
"-aes-256-cfb1","-aes-256-cfb8","-aes-256-ecb","-aes-256-ofb","-aes128","-aes192","-aes256","-bf","-bf-cbc", | |
"-bf-cfb","-bf-ecb","-bf-ofb","-blowfish","-cast","-cast-cbc","-cast5-cbc","-cast5-cfb","-cast5-ecb", | |
"-cast5-ofb","-des","-des-cbc","-des-cfb","-des-cfb1","-des-cfb8","-des-ecb","-des-ede","-des-ede-cbc", | |
"-des-ede-cfb","-des-ede-ofb","-des-ede3", |
void setup () { | |
size(500,500) ; | |
frameRate(300) ; | |
background(0); | |
smooth(); | |
} | |
void draw() { | |
background(0) ; | |
for ( int i = 0 ; i < 360 ; i += 1) { |
<?php print "<?php phpinfo();?>" ;?> |
from bitslicer import VirtualMemoryError, DebuggerError | |
import keycode, keymod | |
class Script(object): | |
def __init__(self): | |
self.currentLifeAddress = None # variable to store where the enemy's life address is | |
debug.registerHotkey(keycode.A, keymod.CONTROL, self.killShip) # Add a hotkey to call the self.killShip function | |
debug.addBreakpoint(vm.base() + 0xDC642, self.shipDamaged) # Make a breakpoint every time that mov [rdi+0x70], eax is reached and call self.shipDamaged , vm.base() is the pagination of the memory , this changes every time it loads | |
def killShip(self,hotkeyID) : |
def zk_open_the_fucking_door(self,cmd,ss): | |
command = cmd | |
command_string = ss | |
chksum = 0 | |
session_id = self.session_id | |
reply_id = unpack('HHHH', self.data_recv[:8])[3] | |
buf = self.createHeader(command, chksum, session_id, | |
reply_id, command_string) | |
self.zkclient.sendto(buf, self.address) |
I hereby claim:
To claim this, I am signing this object: