Skip to content

Instantly share code, notes, and snippets.

Spencer McIntyre zeroSteiner

Block or report user

Report or block zeroSteiner

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
zeroSteiner /
Last active Apr 8, 2018
Python logging.Handler for use in external Metasploit modules.
import logging
import metasploit.module as module
class MetasploitLogHandler(logging.Handler):
def emit(self, record):
log_entry = self.format(record)
level = 'debug'
if record.levelno >= logging.ERROR:
level = 'error'
elif record.levelno >= logging.WARNING:
View net_ssh_tests.rb
$LOAD_PATH.unshift(File.dirname(__FILE__) + '/net-ssh/lib')
require 'net/ssh'
require 'socket'
if ARGV.length > 1
server = 2000
loop do
client = server.accept
puts 'client connected'
zeroSteiner / crontab
Created Sep 21, 2015
crontab one time payload execution template
View crontab
# /etc/crontab: system-wide crontab
# Unlike any other crontab you don't have to run the `crontab'
# command to install the new version when you edit this file
# and files in /etc/cron.d. These files also have username fields,
# that none of the other crontabs do.
# m h dom mon dow user command
zeroSteiner /
Last active Sep 4, 2015
Python Bluetooth shell with PTY support
#!/usr/bin/env python
# -*- coding: utf-8 -*-
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
zeroSteiner / meterpreter_transport.rb
Created Jul 1, 2015
Metasploit meterpreter transport test module
View meterpreter_transport.rb
require 'msf/core'
require 'rex'
lib = File.join(Msf::Config.install_root, "test", "lib")
$:.push(lib) unless $:.include?(lib)
require 'module_test'
class Metasploit4 < Msf::Post

Keybase proof

I hereby claim:

  • I am zeroSteiner on github.
  • I am zerosteiner ( on keybase.
  • I have a public key whose fingerprint is BD67 B5AC B947 C9D7 3035 9ECD C00D 6B6A A5E1 5412

To claim this, I am signing this object:

zeroSteiner / x86_kernel_ret.asm
Created Feb 10, 2015
x86 Kernel Return to nt!KiSystemServicePostCall
View x86_kernel_ret.asm
[BITS 32]
; This shellcode is meant to be executed in the kernel just after the token has
; been stolen. It walks up the stack looking for the first frame which returns
; to userland and returns into the one just before it. This is presumably
; nt!KiSystemServicePostCall which will clean up the operation before returning
; to userland.
; This shell code clobbers ecx, ebx and sets eax to 0 for the return value.
zeroSteiner /
Last active Feb 4, 2016
King Phisher CLI Mail Utility
#!/usr/bin/env python
# -*- coding: utf-8 -*-
# tools/
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
# * Redistributions of source code must retain the above copyright
zeroSteiner / module_suggestor.rb
Created Dec 18, 2014
Suggest local exploit modules
View module_suggestor.rb
require "json"
require "rex/ui"
module Msf
class Plugin::ModuleSuggestor < Msf::Plugin
class ModuleSuggestorCommandDispatcher
include Msf::Ui::Console::CommandDispatcher
def name
"Module Suggestor"
zeroSteiner /
Created Dec 16, 2014
Safe Exception Handler Analysis Tool
#!/usr/bin/env python
# -*- coding: utf-8 -*-
# Copyright 2014 Spencer McIntyre
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
You can’t perform that action at this time.