Skip to content

Instantly share code, notes, and snippets.

View netspooky's full-sized avatar
🍙
Meditating

【☆ ゆう ☆ 】 netspooky

🍙
Meditating
View GitHub Profile
import time
import urllib.request
l0 = '8b........d8...............................................................................................................88..88....................................................................................................88.....................................................................................88..88.................................................................................................................................88..88..................................................................................................................................88......................................................................................'
l1 = '.Y8,....,8P................................................................................................................88..""....................................................................................................88....................................................................
@netspooky
netspooky / twitch2shell.bash_history.txt
Created May 2, 2020 21:46
Bash History for Twitch2Shell, May 2nd 2020
$ python3 t2s.py
Initializing Twitch2Shell v0.1!
Connecting to irc.chat.twitch.tv on port 6667...
Joining #hardchat
Listening for commands...
2020-05-02 20:33:57 | hardchat: !! ls
2020-05-02 20:34:01 | aukkras: !! cat bins.txt
2020-05-02 20:34:06 | 0xdade: !! curl -fsSLd http://get.docker.com -o- http://get-docker.sh | bash
2020-05-02 20:34:12 | cryllicx: !! sudo -l
2020-05-02 20:34:15 | hardchat: !! ^C
@netspooky
netspooky / debaser.py
Last active February 27, 2022 00:54
Quickly create permutations of fragmented base64
import sys, base64, hexdump, textwrap
from itertools import permutations
# pip3 install textwrap hexdump
# Create file full of base64 fragments, each one on a new line
# Usage:
# python3 debaser.py <file>
def getLines():
with open(sys.argv[1],"r") as f:
import urllib.request, json, sys, textwrap
# Run like
# python3 pubsploit.py CVE-2017-0143
def cveSearch(cve):
with urllib.request.urlopen('http://cve.circl.lu/api/cve/'+cve) as url:
data = json.loads(url.read().decode())
try:
if data['cvss']:
print("{} | CVSS {}".format(cve,data['cvss']))
@netspooky
netspooky / bye.asm
Last active June 23, 2021 01:06
For write up
; 84 byte LINUX_REBOOT_CMD_POWER_OFF Binary Golf
BITS 64
org 0x100000000
;---------------------+------+------------+------------------------------------------+-----------------------------+----------+
; CODE LISTING | OFFS | ASSEMBLY | CODE COMMENT | ELF HEADER STRUCT | PHDR |
;---------------------+------+------------+------------------------------------------+-----------------------------+----------+
db 0x7F, "ELF" ; 0x0 | 7f454c46 | PROTIP: Can use magic as a constant ;) | ELF Magic | |
_start: ;------|------------|------------------------------------------|-----------------------------|----------|
mov edx, 0x4321fedc ; 0x04 | badcfe2143 | Moving magic values... | ei_class,ei_data,ei_version | |
mov esi, 0x28121969 ; 0x09 | be69191228 | into their respective places | unused | |
@netspooky
netspooky / exit.asm
Last active June 23, 2021 01:10
For writeup
BITS 64
org 0x100000000 ; Where to load this into memory
;----------------------+------+-------------+----------+------------------------
; ELF Header struct | OFFS | ELFHDR | PHDR | ASSEMBLY OUTPUT
;----------------------+------+-------------+----------+------------------------
db 0x7F, "ELF" ; 0x00 | e_ident | | 7f 45 4c 46
_start: mov al,0x3c ; 0x04 | ei_class | | b0
; 0x05 | ei_data | | 3c

Keybase proof

I hereby claim:

  • I am yuudev on github.
  • I am yuu (https://keybase.io/yuu) on keybase.
  • I have a public key ASDQIydjpVlQx_E5naVLU96qDEUSlQvDim0CIZeSl4atnwo

To claim this, I am signing this object:

This is a collection of NFO templates from various PSP Crack / Warez Groups
--- 4Fun
▄▀ ▄▄█▓▄ ____________________ __________ ▄▓█▄▄ ▀▄
▐█ ███▀██▓▄ / | \_ _____/ | \ \@TiLK ▄▓██▀███ █▌
▓██▀ ░▐█▓▓ / | || __) | | / | \ ▓▓█▌░ ▀██▓
▀█▓ ░▐█▓▌ / ^ / \ | | / | \ ▐▓█▌░ ▓█▀
▀▀ ▄██▓ \____ |\___ / |______/\____|__ / ▓██▄ ▀▀
▄██▓▀ ▄▀ |__| \/ \/ ▀▄ ▀▓██▄
Super work in progress. These are 80 column wide text effects from old
pirate groups, BBS's, and elsewhere.
Marked with --- at the beginning marks visually similar or related elements
---[ Ratings ]
[■■■■■■■■■■] 10/10
░░░░░░░▒▒▒ 7/10
[■■■■■■----]
import subprocess
import sys
import os
archive = sys.argv[2]
passfile = sys.argv[1]
f = open(passfile, "r")
for line in iter(f):
trypass = line.strip('\n')