This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Overview

PYTHON-EXPLOITATION

This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Networking

tcp_clinet.py

The tcp_clinet.py script is used to push data to a server in the event that you are not able to use the typical networking tools. In the script we:

  • Create a socket object (line 8): the AF_INET parameter indicates we will use a standard IPv4 address or hostname, and SOCK_STREAM indicates that this will be a TCP client.
  • Connect to the client server (line 11): note that, since we are using a TCP client, we must first connect to our server (via the TCP handshake) to send data to it.
  • Send the server some data in bytes (line 14)
  • Recieve data back from the server and print out the response (line 17)

    Note that this script makes numerous assumptions about the server we are engaging with:

  • It assumes that our connection will always succeed as it does not have a fallback function in the event that the server rejects our connection.
  • It assumes that the server expects us to send data first. Sometimes, the server will want to send us data first - this is especially true if the server is being guarded by a firewall of some kind.
  • The script assumes that the server will always return data to us in a timely fashion.

    The assumptions are made for simplicity's sake. All things considered, sometimes less is more.

    udp_client.py

    Our udp_client.py script is much different from our tcp script, only that it it configured to send data via the user datagram protocol (but that much was obvious):

    • We change the socket type to SOCK_DGRAM to indicate that we will be using sending data via the UDP (line 6).
    • Also, notice that there is no connect() method beforehand, since we do not need to connect to a server beforehand using UDP. This is because UDP is a connectionaless protocol.
    • The last step is to call the recvfrom() method to receive UDP data back. This returns both the data and the details of the remote host and port (line 9).

    tcp_server.py

    The tcp_server.py is just that, a multi-threaded python TCP server that we can use in the event we want to write a command shell or craft a proxy.

    • Firstly, we pass in the IP address and port we want the server to listen on (line 9).
    • Next, we tell the server to simply start listening with a max backlog of connections set to 5 (line 10). Now ther server waits for a connection.
    • Once the clinet connects, we get the client socket in the client variable and the remote connection details in teh address variable.
    • We tehn start the thread to handle the client connection (line 17).
    • The handle_client function performs rec() and then sens a simple message back to the client.
  • Owner
    Nathan Galindo
    Hi, my name is Nathan Galindo and I am a cybersecurity student at Baylor University!
    Nathan Galindo
    A simple way to store your passwords without requiring third party applications

    SimplePasswordManager A simple way to store your passwords without requiring third party applications Simple To Use. Store Your Passwords For Each Web

    Leone Odinga 1 Dec 23, 2021
    Source code for "A Two-Stream AMR-enhanced Model for Document-level Event Argument Extraction" @ NAACL 2022

    TSAR Source code for NAACL 2022 paper: A Two-Stream AMR-enhanced Model for Document-level Event Argument Extraction. 🔥 Introduction We focus on extra

    21 Sep 24, 2022
    Caretaker 2 Jun 06, 2022
    Lightweight and beneficial Dependency Injection plugin for apscheduler

    Implementation of dependency injection for apscheduler Prerequisites: apscheduler-di solves the problem since apscheduler doesn't support Dependency I

    Glib 11 Dec 07, 2022
    The First Python Compatible Camera Hacking Tool

    ZCam Hack webcam using python by sending malicious link. FEATURES : [+] Real-time Camera hacking [+] Python compatible [+] URL Shortener using bitly [

    Sanketh J 109 Dec 28, 2022
    This is python script that will extract the functions call in all used DLL in an executable and then provide a mapping of those functions to the attack classes defined and curated malapi.io.

    F2Amapper This is python script that will extract the functions call in all used DLL in an executable and then provide a mapping of those functions to

    Ajit Kumar 3 Sep 03, 2022
    A token logger for discord + steals Brave/Chrome passwords and usernames

    Backdoor Machine - ❗ For educational purposes only ❗ A program made in python for stealing passwords and usernames from Google Chrome/Brave and tokenl

    36 Jul 18, 2021
    You can manage your password with this program.

    You must have Python compilers in order to run this program. First of all, download the compiler in the link.

    Mustafa Bahadır Doğrusöz 6 Aug 07, 2021
    Lite version of my Gatekeeper backdoor for public use.

    MayorSec Backdoor Fully functioning bind-type backdoor This backdoor is a fully functioning bind shell and lite version of my full functioning Gatekee

    Joe Helle 56 Mar 25, 2022
    SonicWALL SSL-VPN Web Server Vulnerable Exploit

    SonicWALL SSL-VPN Web Server Vulnerable Exploit

    44 Nov 15, 2022
    #whois it? Let's find out!

    whois_bot #whois it? Let's find out! Currently in development: a gatekeeper bot for a community (https://t.me/IT_antalya) of 250+ expat IT pros of Ant

    Kirill Nikolaev 14 Jun 24, 2022
    windows电脑查看全部连接过的WiFi密码

    python WIFI历史密码查看器 WIFI密码查看器 原理 win+R,输入cmd打开命令行窗口 #这个命令可以列出你所有连接过的wifi netsh wlan show profiles #替换你要查找的WiFi名称,就可以显示出这个wifi的所有信息,包括密码 netsh wlan show

    GMYXDS 15 Dec 22, 2022
    Early days of an Asset Discovery tool.

    Please star this project! Written in Python Report Bug . Request Feature DISCLAIMER This project is in its early days, everything you see here is almo

    grag1337 3 Dec 20, 2022
    A signature parser for hikari's command handler tanjun.

    tanchi A signature parser for hikari's command handler tanjun. Finally be able to define your commands without those bloody decorator chains! Example

    sadru 11 Nov 17, 2022
    An easy-to-use wrapper for NTFS-3G on macOS

    ezNTFS ezNTFS is an easy-to-use wrapper for NTFS-3G on macOS. ezNTFS can be used as a menu bar app, or via the CLI in the terminal. Installation To us

    Matthew Go 34 Dec 01, 2022
    Spring Cloud Gateway < 3.0.7 & < 3.1.1 Code Injection (RCE)

    Spring Cloud Gateway 3.0.7 & 3.1.1 Code Injection (RCE) CVE: CVE-2022-22947 CVSS: 10.0 (Vmware - https://tanzu.vmware.com/security/cve-2022-22947)

    Carlos Vieira 35 Dec 28, 2022
    JumpServer远程代码执行漏洞检测利用脚本

    Jumpserver-EXP JumpServer远程代码执行漏洞检测利用脚本

    Veraxy 181 Dec 20, 2022
    Unsafe Twig processing of static pages leading to RCE in Grav CMS 1.7.10

    CVE-2021-29440 Unsafe Twig processing of static pages leading to RCE in Grav CMS 1.7.10 Grav is a file based Web-platform. Twig processing of static p

    Enox 6 Oct 10, 2022
    Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io

    Cowrie Welcome to the Cowrie GitHub repository This is the official repository for the Cowrie SSH and Telnet Honeypot effort. What is Cowrie Cowrie is

    Cowrie 4.1k Jan 09, 2023