Skip to content

Instantly share code, notes, and snippets.

View felmoltor's full-sized avatar
🍊
Is this real life?

Felipe Molina felmoltor

🍊
Is this real life?
View GitHub Profile
@felmoltor
felmoltor / get.uniform.sample.py
Created June 1, 2015 16:26
It gets a uniform sample of big files
#!/usr/bin/python
import os,sys
if len(sys.argv) < 3:
print "Usage: %s <source file> <percentage>" % sys.argv[0]
exit(1)
if not os.path.exists(sys.argv[1]):
print "Provide a file from wich to extract the sample"
@felmoltor
felmoltor / top200.aff.leak.txt
Created June 1, 2015 17:47
Top 200 domains of AFF leak
1549773 yahoo.com
1261928 hotmail.com
881650 gmail.com
228439 aol.com
91586 live.com
57248 breakthru.com
49750 msn.com
45566 comcast.net
45228 ymail.com
34887 hotmail.fr
@felmoltor
felmoltor / ibex53.domains.csv
Created June 1, 2015 18:18
ibex 35 domains
We can make this file beautiful and searchable if this error is corrected: No commas found in this CSV file in line 0.
Abengoa;abengoa.com
Abertis;abertis.com
Acciona;acciona.com
ACS;grupoacs.com
Amadeus;amadeus.com
ArcelorMittal;arcelormittal.com
Banco Popular;bancopopular.es
Banco Sabadell;bancsabadell.com
Banco Santander;bancosantander.es
Bankia;bankia.com
@felmoltor
felmoltor / find.facebook.usernames.sh
Created June 1, 2015 18:38
AFF nicks find in facebook and twitter
#!/bin/bash
if [[ $1 == "" ]];then
echo "Provide a file with the usernames"
exit
fi
if [[ $2 == "" ]];then
echo "Provide a file with the facebook cookie"
exit
@felmoltor
felmoltor / wordpress.scan.detected.txt
Created August 4, 2015 07:30
[IDS] Detected wordpress vulnerability scans
03/12/2015 37.187.238.74 403 /$wp-content$/plugins/wp-filemanager/incl/libfile.php?&path=../../&filename=wp-config.php&action=download
03/12/2015 37.187.238.74 403 /$wp-content$/plugins/wp-filemanager/incl/libfile.php?&path=../../&filename=wp-config.php&action=download
03/12/2015 37.187.238.74 403 /$wp-content$/plugins/wp-filemanager/incl/libfile.php?&path=../../&filename=wp-config.php&action=download
03/12/2015 37.187.238.74 403 /$wp-content$/themes/parallelus-mingle/framework/utilities/download/getfile.php?file=../../../../../../wp-config.php
03/12/2015 37.187.238.74 403 /$wp-content$/themes/parallelus-mingle/framework/utilities/download/getfile.php?file=../../../../../../wp-config.php
03/12/2015 37.187.238.74 403 /$wp-content$/themes/parallelus-mingle/framework/utilities/download/getfile.php?file=../../../../../../wp-config.php
03/12/2015 37.187.238.74 403 /$wp-content$/themes/parallelus-salutation/framework/utilities/download/getfile.php?file=../../../../../../wp-config.php
03/12/2015 37.187.238.74 403 /$
@felmoltor
felmoltor / CGI scripts being scanned
Created December 16, 2014 16:47
CGI scripts being scanned in the wild. Maybe shellshock vulnerable?
/admin.cgi
/administrator.cgi
/agora.cgi
/aktivate/cgi-bin/catgy.cgi
/analyse.cgi
/apps/web/vs_diag.cgi
/axis-cgi/buffer/command.cgi
/bandwidth/index.cgi
/bigconf.cgi
/cartcart.cgi
@felmoltor
felmoltor / Honeypot Statistics
Created April 2, 2016 15:39
Honeypot - Top scanners,countries and user/passwords used
====================
= Top 15 source IP =
====================
103.41.124.12:6480 (Hong Kong)
103.41.124.53:6363 (Hong Kong)
103.41.124.19:5809 (Hong Kong)
112.171.173.137:1691 (Korea, Republic of)
222.186.21.82:1596 (China)
117.27.249.4:1470 (China)
222.186.56.171:1302 (China)
@felmoltor
felmoltor / 2013.old.spotify.dump.analisys
Last active April 26, 2016 18:58
(Old) Spotify dump analisys
________________ __________ ____ _______
\_ _____/ _ \\______ \ ___ _/_ | \ _ \
| __)/ /_\ \| ___/ \ \/ /| | / /_\ \
| | / | \ | \ / | | \ \_/ \
\__ | \____|__ /____| \_/ |___| /\ \_____ /
\/ \/ \/ \/
Author: @felmoltor
License: GPLv3
Summary: This tool analyzes password dump. The dump can be of this three kinds (option -F):
@felmoltor
felmoltor / 20160306.spotify.leak.analisys
Created April 26, 2016 18:59
20160306 Spotify Leak Analisys
________________ __________ ____ _______
\_ _____/ _ \\______ \ ___ _/_ | \ _ \
| __)/ /_\ \| ___/ \ \/ /| | / /_\ \
| | / | \ | \ / | | \ \_/ \
\__ | \____|__ /____| \_/ |___| /\ \_____ /
\/ \/ \/ \/
Author: @felmoltor
License: GPLv3
Summary: This tool analyzes password dump. The dump can be of this three kinds (option -F):
@felmoltor
felmoltor / negotiate_bruteforce.sh
Last active August 3, 2016 18:01
Negotiate Content Scanner (RFC 2616)
#!/bin/bash
#################
# CONFIG COLORS #
#################
# Text color variables
txtund=$(tput sgr 0 1) # Underline
txtbld=$(tput bold) # Bold
bldred=${txtbld}$(tput setaf 1) # red