Skip to content

Instantly share code, notes, and snippets.

View killswitch-GUI's full-sized avatar

⭕Alexander Rymdeko-Harvey killswitch-GUI

View GitHub Profile
import zlib
import struct
import sys
# 4 byte header
# crc32 uLong
#
# 0 1
# +---+---+
# |CMF|FLG|
#!/usr/env python
###############################################################################################################
## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script
## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift
##-------------------------------------------------------------------------------------------------------------
## [Details]:
## This script is intended to be executed locally on a Linux box to enumerate basic system info and
## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text
## passwords and applicable exploits.
#!/usr/bin/python
# Pure Python Tiny Packet Snifer
# Author: Alexander Rymdeko-Harvey
# Twitter: @Killswitch-GUI
import socket, time
from datetime import datetime
import struct
def outputPcapPFile(fileName):
# 255 min host group
# min rate 1000 should be fine for internal
# Full Port Scan / --open
nmap -Pn -n -sS -p- -sV --min-hostgroup 255 --min-rtt-timeout 25ms --max-rtt-timeout 100ms --max-retries 1 --max-scan-delay 0 --min-rate 1000 -oA <customer-#> -vvv --open -iL <IPLIST>

Keybase proof

I hereby claim:

  • I am killswitch-gui on github.
  • I am killswitchgui (https://keybase.io/killswitchgui) on keybase.
  • I have a public key whose fingerprint is 7F6A A2E0 2FC2 9D10 4327 B138 CB86 0113 C1B6 9F03

To claim this, I am signing this object: