I hereby claim:
- I am nv1t on github.
- I am nv1t (https://keybase.io/nv1t) on keybase.
- I have a public key whose fingerprint is 083F 9BF3 7C3B 3262 62AF 397D 09CF F87B 70EC 6E70
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/usr/env python | |
############################################################################################################### | |
## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script | |
## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift | |
##------------------------------------------------------------------------------------------------------------- | |
## [Details]: | |
## This script is intended to be executed locally on a Linux box to enumerate basic system info and | |
## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text | |
## passwords and applicable exploits. |
import sys | |
import time | |
import usb.core | |
import usb.util | |
class pyMouse(object): | |
def __init__(self,vendor,product): | |
self.device = usb.core.find(idVendor=vendor, idProduct=product) | |
if self.device is None: | |
raise Exception("Couldn't find device %sx%s" %(vendor,product)) |
#!/bin/bash | |
URL="http://shop.ritter-sport.de/b2c/schokolade/social-media-limited-edition/einhorn.html" | |
SITE=$(curl -s "${URL}") | |
if echo "${SITE}" | grep "out-of-stock" > /dev/null 2> /dev/null; then | |
echo "OK: Sckokolade ist immer noch ausverkauft"; | |
exit 0; | |
fi; |
import numpy as np | |
import sys | |
import os | |
import cv2 | |
import shutil | |
log = open('log.txt','a') | |
img = cv2.imread(sys.argv[1],1) | |
origimg = img | |
height, width, channels = img.shape |
import sys | |
import os | |
import requests | |
import subprocess | |
import urllib3 | |
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) | |
param=sys.argv[1] | |
baseUrl = "https://media.niu.de/magazines/%s" % (param) |
import socket | |
import sys | |
class DNSQuery: | |
def __init__(self, data): | |
self.data=data | |
self.domain='' | |
typ = (ord(data[2]) >> 3) & 15 # Opcode bits | |
if typ == 0: # Standard query |
# output: | |
# [2.88, 2.88, 2.88, 2.88, 3.2, 3.2, 3.2, 3.2, 3.2, 3.52] | |
# [2.88, 2.88, 2.88, 3.2, 3.2, 3.2, 3.2, 3.52] | |
# [2.88, 2.88, 2.88, 0, 3.2, 3.2, 3.2, 3.2, 0, 3.52] | |
a = [2.88,2.88,2.88,2.88,3.2,3.2,3.2,3.2,3.2,3.52] | |
b = [2.88,2.88,2.88,3.2,3.2,3.2,3.2,3.52] | |
def zero_pad_gen(a, b, _sentinel=object()): | |
a = iter(a) |
#!/usr/bin/env python | |
import re | |
import sys | |
def print_memory_of_pid(pid, only_writable=True): | |
""" | |
Run as root, take an integer PID and return the contents of memory to STDOUT | |
""" | |
memory_permissions = 'rw' if only_writable else 'r' |
<html> | |
<head> | |
<style> | |
body { | |
font-family: 'Open Sans', Helvetica, Arial; | |
font-size: 12pt; | |
color: #666; | |
margin-top: 40px; | |
text-align: center; | |
} |