Skip to content

Instantly share code, notes, and snippets.

@stamparm
stamparm / level8.py
Created August 30, 2012 22:10
Stripe CTF 2.0 Level 8 (.py)
import os
import socket
import sys
import threading
import time
import traceback
import urllib2
production = True
@stamparm
stamparm / crime.py
Created September 11, 2012 13:19 — forked from koto/crime.py
It's not a crime to build a CRIME
# This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do
# Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz
# http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/
import string
import zlib
import sys
import random
charset = string.letters + string.digits + "%/+="
@stamparm
stamparm / output.txt
Last active March 5, 2019 21:44
Sample sqlmap run
$ python sqlmap.py -u "http://192.168.21.128/sqlmap/mysql/get_int.php?id=1" -z "ign,flu,bat" --banner -f
sqlmap/1.0-dev-7614c81 - automatic SQL injection and database takeover tool
http://sqlmap.org
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting at 10:30:49
[10:30:49] [INFO] testing connection to the target url
@stamparm
stamparm / gist:5335273
Last active July 8, 2022 23:13
Sample Panoptic run
$ python panoptic.py -u "http://192.168.21.128/lfi.php?file=default" -a -w
.-',--.`-.
<_ | () | _>
`-`=='-'
Panoptic v0.1-93e0cf0 (https://github.com/lightos/Panoptic/)
[i] Starting scan at: 11:46:21
@stamparm
stamparm / zeus.osc
Last active November 9, 2017 02:29
ODbgScript for unpacking Zeus malware (ResumeThread)
// Generic Zeus malware unpacker (ResumeThread)
// by Miroslav Stampar (@stamparm)
// http://about.me/stamparm
VAR ResumeThread
VAR msg
VAR xname
VAR xloc
VAR xsize
@stamparm
stamparm / gist:df9a0dcdd18f36662363
Created May 5, 2015 11:54
OpenX/Revive malicious/compromised oxCacheFile.delivery.php
<?php
/*
+---------------------------------------------------------------------------+
| OpenX v${RELEASE_MAJOR_MINOR} |
| =======${RELEASE_MAJOR_MINOR_DOUBLE_UNDERLINE} |
| |
| Copyright (c) 2003-2009 OpenX Limited |
| For contact details, see: http://www.openx.org/ |
| |
sons.console.cf
advisory.terranovaroofingandsiding.com
alberta.croftonliving.com
corn.liziarossi.com
dave.ddhowdoyoulikemenow.com
do.liziarossi.com
doug.liziarossi.com
electronics.reelhighmedia.com
embassy.ddhowdoyoulikemenow.com
emphasis.croftonliving.com
@stamparm
stamparm / creds.txt
Last active March 25, 2017 22:12
Honeypot collected telnet brute-force credentials
666666:666666
888888:888888
admin:1111
admin:1111111
admin:1234
admin:12345
admin:123456
admin1:password
admin:4321
admin:7ujMko0admin

Keybase proof

I hereby claim:

  • I am stamparm on github.
  • I am stamparm (https://keybase.io/stamparm) on keybase.
  • I have a public key whose fingerprint is 93D8 F2DD 0948 7028 EAB1 D51E DF02 F6DE B539 7B1B

To claim this, I am signing this object:

@stamparm
stamparm / disable_wsh.reg
Last active February 6, 2024 09:08
Disable Windows Script Host (for prevention of recent ransomware phishing attacks)
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script Host\Settings]
"Enabled"="0"