Skip to content

Instantly share code, notes, and snippets.

Paolo Perego thesp0nge

Block or report user

Report or block thesp0nge

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
thesp0nge /
Created Apr 19, 2019
bind shell shellcode encoded with SUB EAX technique
#!/usr/bin/env python
# Please install shellerate>=0.4.2 before: pip install shellerate
import sys
import string
import logging
import secrets
from shellerate import strings;
from shellerate import asm_x86;
from shellerate.bind_shellcode import BindShellcode;
thesp0nge /
Last active Mar 15, 2019
A Skeleton for my remote exploit stuff
#!/usr/bin/env python
import sys
import socket
def exploit(target, port):
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((target, port))
#/usr/bin/env python
import socket
import os
import sys
import select
import string
import random
thesp0nge / LICENSE
Last active Aug 21, 2019
A useless script to calculate the network address with the CIDR /xx notation in pure bash.
Copyright (c) 2019 - Paolo Perego -
Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation
files (the "Software"), to deal in the Software without
restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the
Software is furnished to do so, subject to the following
thesp0nge / apt-security-check
Last active Jun 18, 2019
A slightly hacked version of apt-check that takes care only about security packages that need an update.
View apt-security-check
# apt-security-check -
# A slightly hacked version of apt-check that takes care only about security
# packages that need an update.
# Tested on Ubuntu 16.04.5 LTS, 18.04.1 LTS
thesp0nge / get_cookie.js
Created Oct 6, 2017
Get Single Cookie function
View get_cookie.js
#!/usr/bin/env python
import sys, socket, requests, urllib
if len(sys.argv) < 2:
print "\nUsage: " + sys.argv[0] + " <HOST>\n"
PING=`which ping`
for i in `seq 254`; do $PING -c 1 -W 1 $SUBNET$i | grep 'from' | cut -d' ' -f 4 | tr -d ':'; done
View Kali owasp_zap bin modified
#for kali rolling, the startup script is very simple
cd /usr/share/zaproxy/
exec ./ $@
View w_gli_hacker.c
int test(char *s) {
printf("%s\n", s);
int main(int argc, char **argv) {
char *s;
You can’t perform that action at this time.