Skip to content

Instantly share code, notes, and snippets.

View wtf
arp =
"? (192.168.1.117) at 00:92:d4:06:01:32 [ether] on enp2s0\n" +
"? (192.168.1.112) at <incomplete> on enp2s0\n" +
"? (192.168.1.127) at <incomplete> on enp2s0\n" +
"? (192.168.1.122) at <incomplete> on enp2s0\n" +
"? (192.168.1.121) at <incomplete> on enp2s0\n" +
"? (192.168.1.4) at <incomplete> on enp2s0\n" +
"? (192.168.1.3) at <incomplete> on enp2s0\n" +
"? (192.168.1.14) at <incomplete> on enp2s0\n" +
"? (192.168.1.13) at <incomplete> on enp2s0\n" +
@evilsocket
evilsocket / wp2swg.php
Created Apr 6, 2011
A script to import wordpress xml dumps to swg txt files
View wp2swg.php
<?php
$source = 'wp.xml';
$siteurl = "http://www.evilsocket.net";
$doc = new DOMDocument();
$doc->load( $source );
$items = $doc->getElementsByTagName( "item" );
View keybase.md

Keybase proof

I hereby claim:

  • I am evilsocket on github.
  • I am evilsocket (https://keybase.io/evilsocket) on keybase.
  • I have a public key whose fingerprint is 7F1A D5FA 2A51 87DF DD53 DDA9 1564 D7F3 0393 A456

To claim this, I am signing this object:

View keybase.md

Keybase proof

I hereby claim:

  • I am evilsocket on github.
  • I am evilsocket (https://keybase.io/evilsocket) on keybase.
  • I have a public key whose fingerprint is E242 9918 770E 94AD 9412 BFDC E244 814B C591 3655

To claim this, I am signing this object:

@evilsocket
evilsocket / example.rb
Created Jan 22, 2017
BetterCAP example UDP Proxy Module
View example.rb
class Example < BetterCap::Proxy::UDP::Module
meta(
'Name' => 'Example',
'Description' => 'Example UDP proxy module.',
'Version' => '1.0.0',
'Author' => "Simone 'evilsocket' Margaritelli",
'License' => 'GPL3'
)
# Received when the victim is sending data to the upstream server.
View gist:735587fbb1075af6394f9b634d224459
Verifying that "evilsocket.id" is my Blockstack ID. https://onename.com/evilsocket
View keybase.md

Keybase proof

I hereby claim:

  • I am evilsocket on github.
  • I am evilsocket (https://keybase.io/evilsocket) on keybase.
  • I have a public key whose fingerprint is 7F1A D5FA 2A51 87DF DD53 DDA9 1564 D7F3 0393 A456

To claim this, I am signing this object:

View jsinterface.java
public class WebViewGUI extends Activity {
WebView mWebView;
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
mWebView=new WebView(this);
mWebView.getSettings().setJavaScriptEnabled(true);
mWebView.addJavascriptInterface(new JavaScriptInterface(), "jsinterface");
mWebView.loadUrl("file:///android_asset/www/index.html");
setContentView(mWebView);
}
@evilsocket
evilsocket / hack_title.rb
Last active May 16, 2018
BetterCAP example HTTP(S) Proxy Module
View hack_title.rb
class HackTitle < BetterCap::Proxy::HTTP::Module
meta(
'Name' => 'HackTitle',
'Description' => 'Adds a "!!! HACKED !!!" string to every webpage title.',
'Version' => '1.0.0',
'Author' => "Simone 'evilsocket' Margaritelli",
'License' => 'GPL3'
)
# called before the request is performed
@evilsocket
evilsocket / dns.conf
Created Mar 16, 2016
BetterCAP example DNS server redirection file.
View dns.conf
# Empty lines or lines starting with # will be ignored.
# redirect *.google.com to the attacker ip address
local .*google\.com
# redirect *.microsoft.com to 10.10.10.10
10.10.10.10 .*microsoft\.com