Skip to content

Instantly share code, notes, and snippets.

View scramblr's full-sized avatar
🎯
Focusing

scramblr scramblr

🎯
Focusing
View GitHub Profile
@scramblr
scramblr / testing.for.spoofing.without.caida
Last active April 9, 2024 01:23
Testing for IPHM (IP Header Modification) AKA IP Spoofing WITHOUT CAIDA
------------------[ Requirements to test for IP Spoofing ]------------------
1.) Server (Throw-Away) That Simply needs to run tcpdump.
2.) Server that you suspect/hope can IP Spoof AKA has IPHM IP Header Modification turned on.
On both servers we'll be running:
apt-get update
apt-get install net-tools bind9-dnsutils inetutils-tools tcpdump graphviz python3-scapy -y
apt-get install python3-scapy -y
- OR -
yum update
@scramblr
scramblr / public.torrent.trackers.april.2024.txt
Created April 5, 2024 16:51
Large.List.Of.Public.Trackers
udp://tracker.dler.com:6969/announce
udp://exodus.desync.com:6969/announce
http://t.acg.rip:6699/announce
http://tracker.files.fm:6969/announce
https://tracker.tamersunion.org:443/announce
https://trackers.mlsub.net:443/announce
udp://ipv6.fuuuuuck.com:6969/announce
udp://ec2-18-191-163-220.us-east-2.compute.amazonaws.com:6969/announce
udp://tracker.0x7c0.com:6969/announce
udp://tracker.fnix.net:6969/announce
@scramblr
scramblr / index.php
Last active March 29, 2024 08:13
code for IP echo service like ip.urls.is
<?php
$http_client_ip = '';
$http_x_forwarded_for = '';
$remote_addr = $_SERVER['REMOTE_ADDR'] ?? '';
$remote_host = '';
$remote_port = $_SERVER['REMOTE_PORT'] ?? '';
$remote_user = '';
$redirect_remote_user = '';
$http_user_agent = $_SERVER['HTTP_USER_AGENT'] ?? '';
open -na "Google Chrome Canary" --args --user-data-dir=/Users/dave/.burp-chrome --allow-insecure-localhost --allow-running-insecure-content --disable-add-to-shelf --disable-background-networking --disable-bundled-ppapi-flash --disable-captive-portal-bypass-proxy --disable-clear-browsing-data-counters --disable-client-side-phishing-detection --disable-cloud-import --disable-component-cloud-policy --disable-component-extensions-with-background-pages --disable-component-update --disable-contextual-search --disable-datasaver-prompt --disable-default-apps --disable-device-discovery-notifications --disable-dinosaur-easter-egg --disable-domain-reliability --disable-eol-notification --disable-extensions-http-throttling --disable-http2 --disable-logging --disable-login-animations --disable-network-portal-notification --disable-ntp-popular-sites --disable-offer-upload-credit-cards --disable-office-editing-component-extension --disable-offline-auto-reload --disable-offline-auto-reload-visible-only --disable-password-gen
#!/bin/sh
#
# This is a small Twilio Lookup Script by me, SCRAMBLR. It's a work in progress
# and I'll be adding more functionality soon. The first major thing I'll be adding
# is the ability to pick and choose which features you deploy on each request, as
# some are way more expensive than others.
#
# This started out as a small sideproject/script for myself, but I figure the community
# might find it useful. If not, fuck you! ;)
#
#!/usr/bin/python
#
# This is a small, simple script to test your server's abilities to spoof IPv4 packets or not.
# You should use this instead of things like caida project's tool, because they're rumored to
# collect data or hand it off to others who harass the server/network owners until they re-configure
# their networks and discontinue allowing spoofed packets.
#
# By default, this script sends spoofed packets to fuzzme.packet.tel - but it can be configured to
# send them anywhere. You can download a constantly running pcap by typing:
# wget http://fuzzme.packet.tel/fuzzme.packet.tel.last10minutes.pcap