This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
echo "°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°" | |
echo "° Sh@d0w v1.0 - b33f °" | |
echo "° ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ °" | |
echo "° -Don't panic, i'm only a shadow- °" | |
echo "°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°" | |
echo -n "° Select the Interface to use: " | |
read -e iface | |
echo "°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
use HTTP::Request; | |
use LWP::UserAgent; | |
system('cls'); | |
system('title Admin CP Finder '); | |
system "color 0a"; | |
print"\n"; | |
print "\t>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>\n"; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Joomla Administrator Login BruteForcer for v1.0 and v1.5 | |
# Feel free to do whatever you want with this code! | |
# Share the c0de! | |
# Darkc0de Team | |
# www.darkc0de.com | |
# rsauron[at]gmail[dot]com |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Usage = ./wpsnitch -t 192.168.1.1-255 -s mysession | |
# Thanks TAPE for letting me use your colors, Thanks n1tr0 for testing the script in Kali! | |
STD=$(echo -e "\e[0;0;0m") #Revert fonts to standard colour/format | |
RED=$(echo -e "\e[1;31m") #Alter fonts to red bold | |
REDN=$(echo -e "\e[0;31m") #Alter fonts to red normal | |
GRN=$(echo -e "\e[1;32m") #Alter fonts to green bold | |
GRNN=$(echo -e "\e[0;32m") #Alter fonts to green normal | |
BLU=$(echo -e "\e[1;36m") #Alter fonts to blue bold |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Kali Linux ISO recipe for : Evil Access Point | |
######################################################################################### | |
# Desktop : None | |
# Metapackages : None | |
# ISO size : 1.36 GB | |
# Special notes : Boots into an Access Point. | |
# : ppp0 and wlan0 hardcoded. | |
# Background : http://www.offensive-security.com/kali-linux/kali-linux-recipes/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /usr/bin/perl | |
##### autosploit.pl written by JimmyC | |
##### Uses your path to run NMap and | |
##### Metasploit (msfcli) for automatic | |
##### exploitation of hosts | |
##### licensed under the GPL license | |
##### LICENSE | |
##### This program is free software: you can redistribute it and/or modify |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<? | |
@set_time_limit(0) | |
@error_reporting(0) | |
if(count($argv)<=2) | |
{ | |
print(" | |
__ _ _ | |
__ __/ _\ ___ ___ _ _ _ __(_) |_ _ _ | |
\ \/ /\ \ / _ \/ __| | | | '__| | __| | | | | |
> < _\ \ __/ (__| |_| | | | | |_| |_| | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* { | |
* Exploit-DB Searcher :) | |
* Coded By xSecurity | |
* Homepage : sec4ever.com - is-sec.com | |
* email : b0x@hotmail.com | |
* Skype : b0x-sa | |
* Special Thanks To : Mr.Dm4r | |
* Greets 2 : Lov3rDNS - b0x - RAB3OUN - FoX HaCkEr - No-QRQR - DeeF - abolalh - DameneDz - r0kin - All Members :) | |
* } | |
*/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<? | |
/* | |
* Coded By : xSecurity | |
* Homepage : Sec4ever.Com | |
* Blog : drkroooz.wordpress.com | |
* Mail : b0x@hotmail.com | |
* Greets 2 : b0x - Lov3rDNS - FoX HaCkEr - DeeF - NoQRQR - R.B.G - N.K - DamaneDz - Asmar | |
*/ | |
set_time_limit(0); | |
$target = $_POST["target"]; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
echo "+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+" | |
echo "+- @@@@@@@ @@@@@@@ @@@@@@ @@@@@@@ @@@@@@ @@@ @@@-+" | |
echo "+- @@! @@@ @@! @@@ @@! @@@ !@@ @@! @@@ @@!@!@@@-+" | |
echo "+- @!@ !@! @!@!!@! @!@!@!@! !@! @!@!@ @!@ !@! @!@@!!@!-+" | |
echo "+- !!: !!! !!: :!! !!: !!! :!! !!: !!: !!! !!: !!!-+" | |
echo "+- :: : : : : : : : : :: :: : : :. : :: : -+" | |
echo "+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+" | |
echo "+- @@@@@@@ @@@@@@ @@@@@@@ @@@ @@@@@@@@ @@@@@@ -+" | |
echo "+- @@! @@! @@@ @@! @@@ @@! @@! !@@ -+" |