Skip to content

Instantly share code, notes, and snippets.

@ogrisel
Created June 27, 2010 12:13
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save ogrisel/454859 to your computer and use it in GitHub Desktop.
Save ogrisel/454859 to your computer and use it in GitHub Desktop.
Random security terms generator
asynchronous buffer forging
anonymous identity injection
asynchronous SQL skewing
synchronous buffer analysis
reverse jail fuzzing
tainted state inspection
multi-modal integrity recovery
deep state engineering
social state breaking
monotonic state forging
synchronous packet inspection
stochastic integrity recovery
multi-modal buffer skewing
deep integrity inspection
fast flux clock analysis
asynchronous jail forging
parallel clock skewing
parallel DNS skewing
shallow SQL forging
asynchronous integrity inspection
social integrity inspection
identity forging
monotonic DNS recovery
reverse clock analysis
stochastic identity skewing
anonymous packet overflow
social jail forging
monotonic SQL injection
stochastic DNS recovery
multi-modal SQL poisoning
fast flux identity breaking
stochastic packet poisoning
reverse state corruption
stochastic DNS recovery
parallel SQL recovery
anonymous buffer injection
anonymous integrity recovery
synchronous DNS forging
fast flux DNS injection
reverse clock poisoning
shallow integrity fuzzing
parallel SQL seeding
synchronous state corruption
deep DNS recovery
social packet engineering
fast flux identity forging
fast flux integrity injection
shallow state recovery
synchronous buffer corruption
synchronous identity poisoning
import random
import sys
modalities = [
'',
'social',
'asynchronous',
'synchronous',
'deep',
'shallow',
'reverse',
'stochastic',
'multi-modal',
'tainted',
'monotonic',
'parallel',
'anonymous',
'fast-flux',
]
targets = [
'packet',
'clock',
'buffer',
'identity',
'state',
'integrity',
'jail',
'DNS',
'SQL',
'lock',
'key',
'browser',
'header',
]
operations = [
'forging',
'overflow',
'inspection',
'analysis',
'skewing',
'seeding',
'recovery',
'poisoning',
'corruption',
'engineering',
'injection',
'breaking',
'fuzzing',
'spoofing',
'bumping',
'pharming',
'phishing',
'fingerprinting'
]
def next_exploit(rng):
return " ".join((rng.choice(modalities),
rng.choice(targets),
rng.choice(operations))).strip()
if __name__ == "__main__":
seed = hash(sys.argv[1]) if len(sys.argv) > 1 else None
rng = random.Random(seed)
for i in range(50):
print next_exploit(rng)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment