This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Overview

PYTHON-EXPLOITATION

This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Networking

tcp_clinet.py

The tcp_clinet.py script is used to push data to a server in the event that you are not able to use the typical networking tools. In the script we:

  • Create a socket object (line 8): the AF_INET parameter indicates we will use a standard IPv4 address or hostname, and SOCK_STREAM indicates that this will be a TCP client.
  • Connect to the client server (line 11): note that, since we are using a TCP client, we must first connect to our server (via the TCP handshake) to send data to it.
  • Send the server some data in bytes (line 14)
  • Recieve data back from the server and print out the response (line 17)

    Note that this script makes numerous assumptions about the server we are engaging with:

  • It assumes that our connection will always succeed as it does not have a fallback function in the event that the server rejects our connection.
  • It assumes that the server expects us to send data first. Sometimes, the server will want to send us data first - this is especially true if the server is being guarded by a firewall of some kind.
  • The script assumes that the server will always return data to us in a timely fashion.

    The assumptions are made for simplicity's sake. All things considered, sometimes less is more.

    udp_client.py

    Our udp_client.py script is much different from our tcp script, only that it it configured to send data via the user datagram protocol (but that much was obvious):

    • We change the socket type to SOCK_DGRAM to indicate that we will be using sending data via the UDP (line 6).
    • Also, notice that there is no connect() method beforehand, since we do not need to connect to a server beforehand using UDP. This is because UDP is a connectionaless protocol.
    • The last step is to call the recvfrom() method to receive UDP data back. This returns both the data and the details of the remote host and port (line 9).

    tcp_server.py

    The tcp_server.py is just that, a multi-threaded python TCP server that we can use in the event we want to write a command shell or craft a proxy.

    • Firstly, we pass in the IP address and port we want the server to listen on (line 9).
    • Next, we tell the server to simply start listening with a max backlog of connections set to 5 (line 10). Now ther server waits for a connection.
    • Once the clinet connects, we get the client socket in the client variable and the remote connection details in teh address variable.
    • We tehn start the thread to handle the client connection (line 17).
    • The handle_client function performs rec() and then sens a simple message back to the client.
  • Owner
    Nathan Galindo
    Hi, my name is Nathan Galindo and I am a cybersecurity student at Baylor University!
    Nathan Galindo
    Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228

    log4j-honeypot-flask Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228 This can be

    Binary Defense 144 Nov 19, 2022
    POC using subprocess lib in Python 🐍

    POC subprocess ☞ POC using the subprocess library with Python. References: https://github.com/GuillaumeFalourd/poc-subprocess https://geekflare.com/le

    Guillaume Falourd 2 Nov 28, 2022
    A simple Outline Server Access Key Copy and Paste Web Interface

    Outline Keychain A simple Outline Server Access Key Copy and Paste Web Interface Developed for key and password export and copy & paste for other Shad

    Zhe 1 Dec 28, 2021
    Mad Spammer is a python webhook spammer which is very easy and safe to use.

    Mad Spammer 👿 Pre-Setup: Open your terminal/console and type: pip install module colorama python MadSpammer.py Setup: After doing that, you should be

    1 Nov 26, 2021
    DCSync - DCSync Attack from Outside using Impacket

    Adding DCSync Permissions Mostly copypasta from https://github.com/tothi/rbcd-at

    n00py 77 Dec 16, 2022
    Credit Card And SK Checker Written In Python

    💳 Credit Card Checker (CC Checker) & Mass SK Checker & Generator 💳

    Rimuru Tempest 53 Dec 31, 2022
    A python script to brute-force guess the passwords to Instagram accounts

    Instagram-Brute-Force The purpose of this script is to brute-force guess the passwords to Instagram accounts. Specifics: Comes with 2 separate modes i

    Moondog 2 Nov 16, 2021
    This repository detects a system vulnerable to CVE-2022-21907 and protects against this vulnerability if desired

    This repository detects a system vulnerable to CVE-2022-21907 and protects against this vulnerability if desired

    26 Dec 26, 2022
    'Our Drowsinessdetector detects drivers eyes if they are closed for more than 2 seconds and alerts driver'

    Data analysis Document here the project: DriverDrowsinessDetector Description: Project Description Data Source: Type of analysis: Please document the

    3 Jul 03, 2022
    Dependency injection in python with autoconfiguration

    The base is a DynamicContainer to autoconfigure services using the decorators @services for regular services and @command_handler for using command pattern.

    Sergio Gómez 2 Jan 17, 2022
    An interactive python script that enables root access on the T-Mobile (Wingtech) TMOHS1, as well as providing several useful utilites to change the configuration of the device.

    TMOHS1 Root Utility Description An interactive python script that enables root access on the T-Mobile (Wingtech) TMOHS1, as well as providing several

    40 Dec 29, 2022
    A tool combined with the advantages of masscan and nmap

    A tool combined with the advantages of masscan and nmap

    59 Dec 24, 2022
    CVE-2022-22965 : about spring core rce

    CVE-2022-22965: Spring-Core-Rce EXP 特性: 漏洞探测(不写入 webshell,简单字符串输出) 自定义写入 webshell 文件名称及路径 不会追加写入到同一文件中,每次检测写入到不同名称 webshell 文件 支持写入 冰蝎 webshell 代理支持,可

    东方有鱼名为咸 53 Nov 09, 2022
    This project is all about building an amazing application that will help users manage their passwords and even generate new passwords for them

    An amazing application that will help us manage our passwords and even generate new passwords for us.

    1 Jan 23, 2022
    A Radare2 based Python module for Binary Analysis and Reverse Engineering.

    Zepu1chr3 A Radare2 based Python module for Binary Analysis and Reverse Engineering. Installation You can simply run this command. pip3 install zepu1c

    Mehmet Ali KERİMOĞLU 5 Aug 25, 2022
    MSDorkDump is a Google Dork File Finder that queries a specified domain name and variety of file extensions

    MSDorkDump is a Google Dork File Finder that queries a specified domain name and variety of file extensions (pdf, doc, docx, etc), and downloads them.

    Joe Helle 150 Jan 03, 2023
    Lite - Lite cracker tool for python

    Wellcome to tools Results Install Tools

    Jeeck X Nano 23 Dec 17, 2022
    A small Python Script To get all levels of subdomains from a list

    getlevels A small Python Script To get all levels of subdomains Easily get 1st level, 2nd level, 3rd level, 4th level .... nth level subdomains Usag

    9 Feb 15, 2022
    Crypto Meta Extractor

    Crypto Meta Extractor This repository contains the code which extracts some metadata of all the cryptocurrencies listed (9K) on CoinMarketCap. Coding

    Samyak Jain 3 Jul 03, 2022
    Automatic SQL injection and database takeover tool

    sqlmap sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of

    sqlmapproject 25.7k Jan 08, 2023