This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Overview

PYTHON-EXPLOITATION

This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Networking

tcp_clinet.py

The tcp_clinet.py script is used to push data to a server in the event that you are not able to use the typical networking tools. In the script we:

  • Create a socket object (line 8): the AF_INET parameter indicates we will use a standard IPv4 address or hostname, and SOCK_STREAM indicates that this will be a TCP client.
  • Connect to the client server (line 11): note that, since we are using a TCP client, we must first connect to our server (via the TCP handshake) to send data to it.
  • Send the server some data in bytes (line 14)
  • Recieve data back from the server and print out the response (line 17)

    Note that this script makes numerous assumptions about the server we are engaging with:

  • It assumes that our connection will always succeed as it does not have a fallback function in the event that the server rejects our connection.
  • It assumes that the server expects us to send data first. Sometimes, the server will want to send us data first - this is especially true if the server is being guarded by a firewall of some kind.
  • The script assumes that the server will always return data to us in a timely fashion.

    The assumptions are made for simplicity's sake. All things considered, sometimes less is more.

    udp_client.py

    Our udp_client.py script is much different from our tcp script, only that it it configured to send data via the user datagram protocol (but that much was obvious):

    • We change the socket type to SOCK_DGRAM to indicate that we will be using sending data via the UDP (line 6).
    • Also, notice that there is no connect() method beforehand, since we do not need to connect to a server beforehand using UDP. This is because UDP is a connectionaless protocol.
    • The last step is to call the recvfrom() method to receive UDP data back. This returns both the data and the details of the remote host and port (line 9).

    tcp_server.py

    The tcp_server.py is just that, a multi-threaded python TCP server that we can use in the event we want to write a command shell or craft a proxy.

    • Firstly, we pass in the IP address and port we want the server to listen on (line 9).
    • Next, we tell the server to simply start listening with a max backlog of connections set to 5 (line 10). Now ther server waits for a connection.
    • Once the clinet connects, we get the client socket in the client variable and the remote connection details in teh address variable.
    • We tehn start the thread to handle the client connection (line 17).
    • The handle_client function performs rec() and then sens a simple message back to the client.
  • Owner
    Nathan Galindo
    Hi, my name is Nathan Galindo and I am a cybersecurity student at Baylor University!
    Nathan Galindo
    DomainMonitor is a web project that has a RESTful API to get a domain's subdomains and whois data.

    DomainMonitor is a web project that has a RESTful API to get a domain's subdomains and whois data.

    2 Feb 05, 2022
    Small Python library that adds password hashing methods to ORM objects

    Password Mixin Mixin that adds some useful methods to ORM objects Compatible with Python 3.5 = 3.9 Install pip install password-mixin Setup first cre

    Joe Gasewicz 5 Nov 22, 2022
    All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭

    All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭

    Cracker 331 Jan 01, 2023
    Moodle community-based vulnerability scanner

    badmoodle Moodle community-based vulnerability scanner Description badmoodle is an unofficial community-based vulnerability scanner for moodle that sc

    Michele Di Bonaventura 11 Dec 22, 2022
    The RDT protocol (RDT3.0,GBN,SR) implementation and performance evaluation code using socket

    소켓을 이용한 RDT protocols (RDT3.0,GBN,SR) 구현 및 성능 평가 코드 입니다. 코드를 실행할때 리시버를 먼저 실행하세요. 성능 평가 코드는 패킷 전송 과정을 제외하고 시간당 전송률을 출력합니다. RDT3.0 GBN SR(버그 발견으로 구현중 입니

    kimtaeyong98 0 Dec 20, 2021
    CVE-2022-22536 - SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536

    CVE-2022-22536 SAP memory pipes desynchronization vulnerability(MPI) CVE-2022-22

    antx 49 Nov 09, 2022
    Valeria stealer- - (4Feb 2022) program detects wifi saved passwords in your ROM

    Valeria_stealer- Requirements : python 3.9.2 and higher (4Feb 2022) program dete

    Mikhail Yolkin 3 May 05, 2022
    HashDB API hash lookup plugin for IDA Pro

    HashDB IDA Plugin Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service. Adding New Hash Algorithms

    OALabs 237 Dec 21, 2022
    A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability

    log4j-shell-poc A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. Recently there was a new vulnerability in log4j, a java loggin

    koz 1.5k Jan 04, 2023
    CodeTest信息收集和漏洞利用工具

    CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。

    23 Mar 18, 2021
    Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses 🕵️

    Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses. This program also alerts you to the presence of a data leak for

    1.1k Aug 24, 2021
    EyeJo是一款自动化资产风险评估平台,可以协助甲方安全人员或乙方安全人员对授权的资产中进行排查,快速发现存在的薄弱点和攻击面。

    EyeJo EyeJo是一款自动化资产风险评估平台,可以协助甲方安全人员或乙方安全人员对授权的资产中进行排查,快速发现存在的薄弱点和攻击面。 免责声明 本平台集成了大量的互联网公开工具,主要是方便安全人员整理、排查资产、安全测试等,切勿用于非法用途。使用者存在危害网络安全等任何非法行为,后果自负,作

    429 Dec 31, 2022
    Python Password Generator

    This is a console-based version of a password generator written with Python. The program generates a password based on numbers of letters, numbers, and symbols specified by the user. This is a simple

    p.katekomol 1 Jan 24, 2022
    Binary check tool to identify command injection and format string vulnerabilities in blackbox binaries

    Binary check tool to identify command injection and format string vulnerabilities in blackbox binaries. Using xrefs to commonly injected and format string'd files, it will scan binaries faster than F

    Christopher Roberts 3 Nov 16, 2021
    Open Source Tool - Cybersecurity Graph Database in Neo4j

    GraphKer Open Source Tool - Cybersecurity Graph Database in Neo4j |G|r|a|p|h|K|e|r| { open source tool for a cybersecurity graph database in neo4j } W

    Adamantios - Marios Berzovitis 27 Dec 06, 2022
    Hack computer in the form of RAR files from all types of clients, even Linux

    Program Features 📌 Hide malware 📌 Vulnerability software vulnerabilities RAR 📌 Creating malware 📌 Access client files 📌 Client Hacking 📌 Link Do

    hack4lx 5 Nov 25, 2022
    Cloud One Container Security Runtime Events Forwarder

    Example on how to query events by a RESTful API, compose CEF event format and send the events to an UDP receiver.

    Markus Winkler 3 Feb 10, 2022
    RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.

    RedDrop Exfil Server Check out the accompanying MaverisLabs Blog Post Here! RedDrop Exfil Server is a Python Flask Web Server for Penetration Testers,

    53 Nov 01, 2022
    Use scrapli to retrieve security zone information from a Juniper SRX firewall

    Get Security Zones with Scrapli Overview This example will show how to retrieve security zone information on Juniper's SRX firewalls. In addition to t

    Calvin Remsburg 2 Jun 19, 2022
    A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.

    A simple python script to dump remote files through a local file read or local file inclusion web vulnerability. Features Dump a single file w

    Podalirius 48 Dec 03, 2022