Skip to content

Instantly share code, notes, and snippets.

View itsecurityco's full-sized avatar

Juan Escobar itsecurityco

View GitHub Profile
@itsecurityco
itsecurityco / BrutePWGen.py
Created September 10, 2014 01:03
Password generator for brute force attacks
"""
Bruteforce Password Generator
Author: @itsecurityco
Use: python BrutePWGen.py --merge-words --h4x0r keywords.txt
"""
import sys
from time import time
class wgen:
@itsecurityco
itsecurityco / telnet_bruteforce.py
Created June 9, 2016 17:46
Telnet bruteforce
"""
Telnet bruteforce
Author: Juan Escobar
Twitter: @itsecurityco
"""
import sys
import os
import telnetlib
@itsecurityco
itsecurityco / tomcat_bruteforce.py
Last active March 27, 2023 07:51
Tomcat manager console bruteforce
"""
Tomcat bruteforce
Author: @itsecurityco
"""
import os
import sys
import getopt
import base64
import requests
@itsecurityco
itsecurityco / plc.py
Last active November 12, 2021 05:30
Main CTF Ekoparty 2021 - PLC
# import socket programming library
# @itsecurityco (Juan)
import socket
# import thread module
from _thread import *
door_closed = b"""
______________
|\ ___________ /|
@itsecurityco
itsecurityco / http_client.rb
Last active September 15, 2021 06:10
Metasploit remote HTTP client template
# https://github.com/rapid7/metasploit-framework/wiki/How-to-Send-an-HTTP-Request-Using-HTTPClient
require 'msf/core'
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(
update_info(
@itsecurityco
itsecurityco / MainActivity.kt
Last active September 7, 2021 23:27
Simple Kotlin application to communicate with a PLC via Modbus
/* @author: Juan Escobar (juan.escobar@dreamlab.net) */
package net.dreamlab.modbuscoils
import androidx.appcompat.app.AppCompatActivity
import android.os.Bundle
import android.os.StrictMode
import android.util.Log
import android.view.View
import io.ktor.network.selector.*
import io.ktor.network.sockets.*
startup_message off
hardstatus alwayslastline
hardstatus string '%{= kG}[ %{G}%H %{g}][%= %{=kw}%?%-Lw%?%{r}(%{W}%n*%f%t%?(%u)%?%{r})%{w}%?%+Lw%?%?%= %{g}][%{B}%Y-%m-%d %{W}%c %{g}]%{w} %l'
# Allow scrollwheel to scroll back the terminal output rather than forwarding it
# to the process (e.g. scroll through bash history or vim output).
termcapinfo xterm* ti@:te@
altscreen on
@itsecurityco
itsecurityco / pep8.sh
Created April 11, 2019 16:36
pep8 example: ./pep8.sh W504
curl -s https://lintlyci.github.io/Flake8Rules/api/rules/$1/ | jq '.links'
@itsecurityco
itsecurityco / steghidebf.sh
Created January 16, 2017 02:54
Script to brute force a file treated with Steghide software
#!/bin/bash
# Usage: steghidebf.sh stegofile wordlist
stegofile=$1;
dict=$2;
printf "Steghide Bruteforce (c) 2017 by Juan Escobar\n";
printf "stegofile: %s\n" "$stegofile";
printf "wordlist: %s\n\n" "$dict";
@itsecurityco
itsecurityco / nessus_merge.py
Last active August 28, 2018 12:38 — forked from btoews/merger.py
Merging Nessus files (only critical & high vulnerabilities)
#! /usr/bin/env python
# Based off: (mastahyeti/merger.py) https://gist.github.com/mastahyeti/2720173
# Modified: @itsecurityco
import xml.etree.ElementTree as etree
import shutil
import os
# Severify of vulnerability
SEVERITY_INFO = 0