Skip to content

Instantly share code, notes, and snippets.

View slayerlab's full-sized avatar
🐞

Slayer slayerlab

🐞
View GitHub Profile
@slayerlab
slayerlab / solved.txt.s
Last active August 29, 2015 14:21
overthewire.org / Leviathan - Solved (http://overthewire.org/wargames/leviathan/)
LEVEL 0
leviathan.labs.overthewire.org
Username: leviathan0
Passowrd: leviathan0
leviathan0@melinda:~/.backup$ cat bookmarks.html | grep pass
<DT><A HREF="http://leviathan.labs.overthewire.org/passwordus.html | This will be fixed later, the password for leviathan1 is rioGegei8m" ADD_DATE="1155384634" LAST_CHARSET="ISO-8859-1" ID="rdf:#$2wIU71">password to leviathan1</A>
leviathan0@melinda:~/.backup$
@slayerlab
slayerlab / xor_encryption.c
Last active October 4, 2015 20:52
Simulator - XOR Encryption / Decryption
/***********************************************************************************
* Developed by: SLAYER OWNER | sl4y3r 0wn3r
*
* This is a simple script for simulator XOR Encryption/Decryption
* and for being an "simple script", remember that I not responsible
* any lack of security ;)
*
* For more information, read this:
* https://slayerowner.blogspot.com.br/2015/08/xor-cipher-playin-in-morning.html
*
@slayerlab
slayerlab / edbck.py
Last active May 12, 2016 05:04
Ferramenta quem faz checagem dos últimos exploits postados no Exploit-DB.
#!/usr/bin/env python
#coding: utf-8
'''
Ferramenta quem faz checagem dos últimos exploits postados no Exploit-DB.
Developed by: Leonardo Sena
a.k.a Slayer Owner | sl4y3r 0wn3r
http://slayerowner.blogspot.com.br/2014/08/python3-xml-parse-usando-minidom.html
'''
import re, urllib.request
from xml.dom.minidom import parseString
@slayerlab
slayerlab / up.sh
Created October 11, 2016 21:50
fix the broken packages
#!/bin/bash
# Fix the broken packages
for package in $(cat broken_pkg | cut -d"'" -f2);
do apt-get install --reinstall "$package" -y;
done
@slayerlab
slayerlab / parameter_expansion.sh
Last active January 18, 2017 16:26
bash/sh: "parameter expansion" testing
research@blockbit:~/Documents$ set -- jesus te ama
research@blockbit:~/Documents$ echo ${1:2:1}${1:1:1}${1:0:1}${3:0:1}${3:1:1}$' '${3:2:1}${2:0:1}${2:1:1}${1:3:1}${1:4:1}
sejam ateus
@slayerlab
slayerlab / .vimrc
Created March 8, 2017 21:53
custom ~/.vimrc
syntax on
colorscheme murphy
set background=dark
set ruler " show the line number on the bar
set more " use more prompt
set autoread " watch for file changes
set number " line numbers
set hidden
set cul " Highlight current line
set noautowrite " don't automagically write on :next
@slayerlab
slayerlab / main.c
Last active December 25, 2017 06:41
1st Windows PoC: Set 0 REG_DWORD value (through RegSetValueEx) into EnableLUA key for UAC definitively disable.
#include <stdio.h>
#include <windows.h>
#if defined(_WIN64)
# define REGKEY_BIT KEY_WOW64_32KEY
#else
# define REGKEY_BIT KEY_WOW64_64KEY
int main(int argc, char *argv[])
{
HKEY hKey;
@slayerlab
slayerlab / simple8bit.asm
Last active January 27, 2018 19:00
8-bits assembly code. It can be simulated for execution in: http://schweigi.github.io/assembler-simulator/index.html
JMP main ; jump to "main" label.
write: ; label "write".
DB "k33p h4ck1ng!" ; DB stands for "define byte" and allocates 1 byte.
DB 0 ; you NEED to declare another DB to put the null terminator \
; into the final string that goes on stdout.
main: ; label "main" - The "main" label is declared to be \
; the entry point
MOV C, write ; copies the buffer assigned in DB from "write" label to C register.
@slayerlab
slayerlab / CVE-2017-11779-modified.xml
Last active March 3, 2018 22:56
CVE ID - Example of fix "false negative" ("Windows Server 2012" added) bug on NVD/CVE Feeds: CPE 2.3 based on https://nvd.nist.gov/products/cpe & Platform affected on https://portal.msrc.microsoft.com/en-US/security-guidance
<entry id="CVE-2017-11779">
<vuln:vulnerable-configuration id="http://nvd.nist.gov/">
<cpe-lang:logical-test operator="OR" negate="false">
<cpe-lang:fact-ref name="cpe:/o:microsoft:windows_10:-"/>
<cpe-lang:fact-ref name="cpe:/o:microsoft:windows_10:1511"/>
<cpe-lang:fact-ref name="cpe:/o:microsoft:windows_10:1607"/>
<cpe-lang:fact-ref name="cpe:/o:microsoft:windows_10:1703"/>
<cpe-lang:fact-ref name="cpe:/o:microsoft:windows_8.1"/>
<cpe-lang:fact-ref name="cpe:/o:microsoft:windows_rt_8.1"/>
<cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2012"/>
@slayerlab
slayerlab / icmp_revshell.rules
Created March 24, 2018 22:34
SNORT rules: useful for trigger reverse shell attempt over icmp protocol.
alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"Unexpected data was detected on ICMP packet into Data Segment"; itype:0; icode:0; icmp_id:1; dsize:>0; classtype:tunneling; reference:url,github.com/inquisb/icmpsh; sid:123456; rev:0)
event_filter gen_id 1, sig_id 123456, type limit, track by_src, count 1, seconds 60