Skip to content

Instantly share code, notes, and snippets.

ticarpi ticarpi

Block or report user

Report or block ticarpi

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View jwttool_custom_jwks.json
{
"keys":[
{
"kty":"RSA",
"kid":"jwt_tool",
"use":"sig",
"e":"AQAB",
"n":"s0mTA54Ig5DHK2d-ex0Rmrn1sz_BSVtUKScOUJCE92eoC3Ed2qcuR4KKPW3T0AzzcE9XCMEx92vNHhVWgHwoxjSnruyKxa_2-LpMfLv6IxQlFgrkzfjOBwpicPhGZGR0_r5B6F_ka9RlTxEChZ8HxMulihy7gnrGbEllkxyJZFycsk-fKwS4IeYHObmoKudlx9Mvd-tiezZMwZyfJ3EzD7tv_NtbuBz5kRMy0gFHXyk7aRyCAsnMvSwZuVjS6ngJXbP-uo0A19E1N4dGLp_-gkPIBYWvwsBnfIY_GO90uxsg5nfi2La7Z1NrNLWfcDMbHF4pYm8sD_xMohaZGCZzDQ"
}
]
View libssh_exploit_CVE-2018-10933.py
#!/usr/bin/env python3
############################################################
# A LibSSH RCE tool by @ticarpi #
# Cloned/carved/tweaked from multiple sources #
# This checks an SSH port to see if it's vulnerable to #
# CVE-2018-10933 #
# If it is it will prompt you for commands to run remotely #
# Usage: #
# $ python libssh_exploit_CVE-2018-10933.py <ip> <port> #
View revshellme.sh
#! /bin/bash
ip_addr=`ip addr | grep "inet 192" | cut -d" " -f6 | cut -d"/" -f1`
rand_port=`head -n10 /dev/urandom | tr -dc "1-9" | tail -c4`
echo "#############################################################"
echo "# RevShellMe - a script for lazy Reverse Shells by @ticarpi #"
echo "# [Payloads loving stolen from @pentestmonkey] #"
echo "#############################################################"
echo
View keybase.md

Keybase proof

I hereby claim:

  • I am ticarpi on github.
  • I am ticarpi (https://keybase.io/ticarpi) on keybase.
  • I have a public key whose fingerprint is F2BB 7E45 E957 33BD 67F3 CAAB B22F 33DF D72F 28D7

To claim this, I am signing this object:

You can’t perform that action at this time.