This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
wordlist created from original 41G stash via: | |
grep -rohP '(?<=:).*$' | uniq > breachcompilation.txt | |
Then, compressed with: | |
7z a breachcompilation.txt.7z breachcompilation.txt | |
Size: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do | |
# Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz | |
# http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/ | |
import string | |
import zlib | |
import sys | |
import random | |
charset = string.letters + string.digits + "%/+=" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
:: process-permissions.bat | |
:: ======================= | |
:: Batch Script for process permission analysis | |
:: by Thom Hastings ©2012 New BSD License | |
:: | |
:: for reference- | |
:: http://travisaltman.com/windows-privilege-escalation-via-weak-service-permissions/ | |
:: TODO: http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html | |
@echo off | |
title %username%@%userdomain% on %logonserver%\%computername% via %comspec% ~c0nS0Le |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import base64 | |
import sys | |
def main(): | |
if len(sys.argv) < 3: | |
sys.exit('Usage (2 arguments): %s "%s" %s' % (sys.argv[0],"malicious file","outfile")) | |
else: | |
f = open(sys.argv[1],"rb") | |
con = f.read() | |
f.close() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
for LINE in `curl http://git.kali.org/gitweb/?a=project_index | sort` | |
do | |
if [ ! -e "kali/`echo $LINE | awk -F. '{print $1}'`" ] | |
then | |
git clone git://git.kali.org/$LINE `echo $LINE | awk -F. '{print $1}'` | |
else | |
cd $LINE | |
git pull | |
cd .. | |
fi |