I hereby claim:
- I am killswitch-gui on github.
- I am killswitchgui (https://keybase.io/killswitchgui) on keybase.
- I have a public key whose fingerprint is 7F6A A2E0 2FC2 9D10 4327 B138 CB86 0113 C1B6 9F03
To claim this, I am signing this object:
import zlib | |
import struct | |
import sys | |
# 4 byte header | |
# crc32 uLong | |
# | |
# 0 1 | |
# +---+---+ | |
# |CMF|FLG| |
#!/usr/env python | |
############################################################################################################### | |
## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script | |
## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift | |
##------------------------------------------------------------------------------------------------------------- | |
## [Details]: | |
## This script is intended to be executed locally on a Linux box to enumerate basic system info and | |
## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text | |
## passwords and applicable exploits. |
#!/usr/bin/python | |
# Pure Python Tiny Packet Snifer | |
# Author: Alexander Rymdeko-Harvey | |
# Twitter: @Killswitch-GUI | |
import socket, time | |
from datetime import datetime | |
import struct | |
def outputPcapPFile(fileName): |
# 255 min host group | |
# min rate 1000 should be fine for internal | |
# Full Port Scan / --open | |
nmap -Pn -n -sS -p- -sV --min-hostgroup 255 --min-rtt-timeout 25ms --max-rtt-timeout 100ms --max-retries 1 --max-scan-delay 0 --min-rate 1000 -oA <customer-#> -vvv --open -iL <IPLIST> |
I hereby claim:
To claim this, I am signing this object: