This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Overview

PYTHON-EXPLOITATION

This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Networking

tcp_clinet.py

The tcp_clinet.py script is used to push data to a server in the event that you are not able to use the typical networking tools. In the script we:

  • Create a socket object (line 8): the AF_INET parameter indicates we will use a standard IPv4 address or hostname, and SOCK_STREAM indicates that this will be a TCP client.
  • Connect to the client server (line 11): note that, since we are using a TCP client, we must first connect to our server (via the TCP handshake) to send data to it.
  • Send the server some data in bytes (line 14)
  • Recieve data back from the server and print out the response (line 17)

    Note that this script makes numerous assumptions about the server we are engaging with:

  • It assumes that our connection will always succeed as it does not have a fallback function in the event that the server rejects our connection.
  • It assumes that the server expects us to send data first. Sometimes, the server will want to send us data first - this is especially true if the server is being guarded by a firewall of some kind.
  • The script assumes that the server will always return data to us in a timely fashion.

    The assumptions are made for simplicity's sake. All things considered, sometimes less is more.

    udp_client.py

    Our udp_client.py script is much different from our tcp script, only that it it configured to send data via the user datagram protocol (but that much was obvious):

    • We change the socket type to SOCK_DGRAM to indicate that we will be using sending data via the UDP (line 6).
    • Also, notice that there is no connect() method beforehand, since we do not need to connect to a server beforehand using UDP. This is because UDP is a connectionaless protocol.
    • The last step is to call the recvfrom() method to receive UDP data back. This returns both the data and the details of the remote host and port (line 9).

    tcp_server.py

    The tcp_server.py is just that, a multi-threaded python TCP server that we can use in the event we want to write a command shell or craft a proxy.

    • Firstly, we pass in the IP address and port we want the server to listen on (line 9).
    • Next, we tell the server to simply start listening with a max backlog of connections set to 5 (line 10). Now ther server waits for a connection.
    • Once the clinet connects, we get the client socket in the client variable and the remote connection details in teh address variable.
    • We tehn start the thread to handle the client connection (line 17).
    • The handle_client function performs rec() and then sens a simple message back to the client.
  • Owner
    Nathan Galindo
    Hi, my name is Nathan Galindo and I am a cybersecurity student at Baylor University!
    Nathan Galindo
    Bandit is a tool designed to find common security issues in Python code.

    A security linter from PyCQA Free software: Apache license Documentation: https://bandit.readthedocs.io/en/latest/ Source: https://github.com/PyCQA/ba

    Python Code Quality Authority 4.8k Dec 31, 2022
    💣 Bomb Crypto Bot 💣

    💣 Bomb Crypto Bot 💣 ⚠️ Warning I am not responsible for any penalties incurred by those who use the bot, use it at your own risk. 📄 Documentation -

    Matheus Benites 4 Apr 27, 2022
    TLaunch: Launch Programs on Multiple Hosts

    TLaunch: Launch Programs on Multiple Hosts Introduction Deepmind launchpad is a library that helps writing distributed program in a simple way. But cu

    Tsinghua AI Research Team for Reinforcement Learning 11 Nov 11, 2022
    Seamless deployment and management of cybersecurity solutions 🏗️

    Description 🖼️ Background 👴🏼 Vision 📜 Concepts 💬 Solutions' Lifecycle. Operations ⭕ Functionalities 🚀 Supported Cybersecurity Solutions 📦 Insta

    MutableSecurity 36 Nov 10, 2022
    This project is all about building an amazing application that will help users manage their passwords and even generate new passwords for them

    An amazing application that will help us manage our passwords and even generate new passwords for us.

    1 Jan 23, 2022
    Privacy-respecting metasearch engine

    Privacy-respecting, hackable metasearch engine / pronunciation səːks. If you are looking for running instances, ready to use, then visit searx.space.

    Searx engine 12.4k Jan 08, 2023
    A Python Scanner for log4j

    log4j-Scanner scanner for log4j cat web-urls.txt | python3 log4j.py ID.burpcollaborator.net web-urls.txt http://127.0.0.1:8080 https://www.google.c

    Ihebski 5 Jun 26, 2022
    PoC encrypted diary in Python 3

    Encrypted diary Sample program to store confidential data. Provides encryption in the form of AES-256 with bcrypt KDF. Does not provide authentication

    1 Dec 25, 2021
    MS-FSRVP coercion abuse PoC

    ShadowCoerce MS-FSRVP coercion abuse PoC Credits: Gilles LIONEL (a.k.a. Topotam)

    Shutdown 219 Dec 28, 2022
    Brute-forcing (or not!) deck builder for Pokemon Trading Card Game.

    PokeBot Deck Builder Brute-forcing (or not!) deck builder for Pokemon Trading Card Game. Warning: intensely not optimized and spaghetti coded Credits

    Hocky Harijanto 0 Jan 10, 2022
    Osint-Tool - Information collection tool in python

    Osint-Tool Herramienta para la recolección de información Pronto más opciones In

    3 Apr 09, 2022
    CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE

    CVE-2022-1388 CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE. POST /mgmt/tm/util/bash HTTP/1.1 Host: Accept-Encoding: gzip, deflate Accept: */

    M4rtin Hsu 81 Dec 12, 2022
    Python & JavaScript Obfuscator made in Python 3.

    Python Code Obfuscator A script that converts code into full on random numerical expressions. Simple Scripts: Python Mode... Input: Function that deco

    rzx. 1 Dec 29, 2021
    Course: Information Security with Python

    Curso: Segurança da Informação com Python Curso realizado atravès da Plataforma da Digital Innovation One Prof: Bruno Dias Conteúdo: Introdução aos co

    Elizeu Barbosa Abreu 1 Nov 28, 2021
    CVE-2022-22536 - SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536

    CVE-2022-22536 SAP memory pipes desynchronization vulnerability(MPI) CVE-2022-22

    antx 49 Nov 09, 2022
    Undetectable Keylogger that reports to Discord

    FUD Keylogger That Reports To Discord This python script will capture all of the keystrokes within a given time frame and report them to a Discord Ser

    Dimitris Kalopisis 36 Dec 20, 2022
    AmiEviL - This program uses the Virus Total API to determine if your suspicious file is malicious or not

    AmiEviL - This program uses the Virus Total API to determine if your suspicious file is malicious or not. The program requests the hash of the file and outputs information (if any). This version will

    Kirk 1 Jan 03, 2022
    Security offerings for AWS Control Tower

    Caylent Security Catalyst Reference Architecture Examples This repository contains solutions for Caylent's Security Catalyst. The Security Catalyst is

    Steven Connolly 1 Oct 22, 2021
    Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found

    dora Features Blazing fast as we are using ripgrep in backend Exploit/PoC steps for many of the API key, allowing to write a good report for bug bount

    Siddharth Dushantha 243 Dec 27, 2022
    python写的一款免杀工具(shellcode加载器)BypassAV,国内杀软全过(windows denfend)

    python写的一款免杀工具(shellcode加载器)BypassAV,国内杀软全过(windows denfend)

    1frame 266 Jan 02, 2023