Skip to content

Instantly share code, notes, and snippets.

@grizmin
grizmin / netwave.py
Created July 10, 2017 20:24
netwave.py (logging)
#!/usr/bin/python
#
# by Grizmin, used spiritnull(at)sigaint.org exploit
# python3 and python2 compatible
import sys
import os
import time
import tailer
@mak
mak / wcr.py
Last active October 28, 2018 21:09
Extract everything from WannaCry
import re
import os,sys
import pefile
import struct
import zipfile
import hashlib
import StringIO
from Crypto import Random
from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_v1_5,AES
@worawit
worawit / eternalblue7_exploit.py
Last active July 11, 2024 13:36
Eternalblue exploit for Windows 7/2008
#!/usr/bin/python
# This file has no update anymore. Please see https://github.com/worawit/MS17-010
from impacket import smb
from struct import pack
import sys
import socket
'''
EternalBlue exploit for Windows 7/2008 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)
anonymous
anonymous / dump.csv
Created April 8, 2017 21:24
Parsed out compromised hosts from #ShadowBrokers
ID Host IP Address Year Month Day Implant Version OS
PITCHIMPAIR ns1.youngdong.ac.kr 202.30.58.5 1969 12 31 INCISION 1.1.2.1 hppa2.0w-hp-hpux11.00
INTONATION tx.micro.net.pk 203.135.2.194 2000 8 17 JACKLADDER 2.0 sparc-sun-solaris2.7
INTONATION hakuba.janis.or.jp 210.232.42.3 2000 8 22 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION mail.interq.or.jp 210.157.0.87 2000 8 24 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION mx1.freemail.ne.jp 210.235.164.21 2000 8 28 JACKLADDER ? i386-pc-solaris2.7
INTONATION webnetra.entelnet.bo 166.114.10.28 2000 8 30 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION opcwdns.opcw.nl 195.193.177.150 2000 9 6 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION rayo.pereira.multi.net.co 206.49.164.2 2000 9 20 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION most.cob.net.ba 195.222.48.5 2000 9 21 JACKLADDER 2.0 sparc-sun-solaris2.6
@cre8tions
cre8tions / dahua-backdoor.py
Created April 5, 2017 18:29
dahua exploit poc
#!/usr/bin/python2.7
#
# Dahua backdoor Generation 2 and 3
# Author: bashis <mcw noemail eu> March 2017
#
# Credentials: No credentials needed (Anonymous)
#Jacked from git history
#
import string
@ethackal
ethackal / shodan-mp.py
Created February 9, 2017 05:25
Monkey patch wrapper around official shodan-python CLI to support a proxy
#!/usr/local/opt/python/bin/python2.7
import imp
import os
import shodan
import shodan.cli.helpers
def mp_init(self, key):
self._original___init__(key)
self.base_url=os.environ.get('SHODAN_API_PROXY', 'https://api.shodan.io')
self.base_exploits_url=os.environ.get('SHODAN_EXPLOITS_API_PROXY', 'https://exploits.shodan.io')
#!/usr/bin/python
import string
import mechanize
import socket
import Queue
import threading
import time
import sys
@achillean
achillean / dlink-products.csv
Created June 30, 2016 20:35
Ranking of D-Link Products Sold (source: https://www.shodan.io)
@achillean
achillean / http-components.csv
Last active June 29, 2021 08:31
Sample output from the Shodan CLI running: shodan stats --facets http.component:100,port:20 http-components http
Query http
http.component port
jQuery 1250676 80 56553138
Zepto 483672 7547 50655465
PHP 266668 443 26476433
Twitter Bootstrap 255045 4567 11633390
Google Font API 211921 8080 8631875
WordPress 139645 1900 4540344
Font Awesome 133483 49152 3028740
#!/usr/bin/env python
import shodan
import sys
# Configuration
API_KEY = "apikey"
# Input validation
if len(sys.argv) == 1: