Skip to content

Instantly share code, notes, and snippets.

We Live In A Society

Miroslav Stampar stamparm

We Live In A Society
Block or report user

Report or block stamparm

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
stamparm /
Created Aug 30, 2012
Stripe CTF 2.0 Level 8 (.py)
import os
import socket
import sys
import threading
import time
import traceback
import urllib2
production = True
stamparm /
Created Sep 11, 2012 — forked from koto/
It's not a crime to build a CRIME
# This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do
# Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz
import string
import zlib
import sys
import random
charset = string.letters + string.digits + "%/+="
stamparm / output.txt
Last active Mar 5, 2019
Sample sqlmap run
View output.txt
$ python -u "" -z "ign,flu,bat" --banner -f
sqlmap/1.0-dev-7614c81 - automatic SQL injection and database takeover tool
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting at 10:30:49
[10:30:49] [INFO] testing connection to the target url
stamparm / gist:5335273
Last active Apr 24, 2018
Sample Panoptic run
View gist:5335273
$ python -u "" -a -w
<_ | () | _>
Panoptic v0.1-93e0cf0 (
[i] Starting scan at: 11:46:21
stamparm / zeus.osc
Last active Nov 9, 2017
ODbgScript for unpacking Zeus malware (ResumeThread)
View zeus.osc
// Generic Zeus malware unpacker (ResumeThread)
// by Miroslav Stampar (@stamparm)
VAR ResumeThread
VAR msg
VAR xname
VAR xloc
VAR xsize
stamparm / gist:df9a0dcdd18f36662363
Created May 5, 2015
OpenX/Revive malicious/compromised
View gist:df9a0dcdd18f36662363
| |
| Copyright (c) 2003-2009 OpenX Limited |
| For contact details, see: |
| |
View gist:e4cf68f422d5c4f612db
stamparm / creds.txt
Last active Mar 25, 2017
Honeypot collected telnet brute-force credentials
View creds.txt

Keybase proof

I hereby claim:

  • I am stamparm on github.
  • I am stamparm ( on keybase.
  • I have a public key whose fingerprint is 93D8 F2DD 0948 7028 EAB1 D51E DF02 F6DE B539 7B1B

To claim this, I am signing this object:

stamparm / disable_wsh.reg
Last active Jul 24, 2016
Disable Windows Script Host (for prevention of recent ransomware phishing attacks)
View disable_wsh.reg
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script Host\Settings]
You can’t perform that action at this time.