This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Overview

PYTHON-EXPLOITATION

This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

Networking

tcp_clinet.py

The tcp_clinet.py script is used to push data to a server in the event that you are not able to use the typical networking tools. In the script we:

  • Create a socket object (line 8): the AF_INET parameter indicates we will use a standard IPv4 address or hostname, and SOCK_STREAM indicates that this will be a TCP client.
  • Connect to the client server (line 11): note that, since we are using a TCP client, we must first connect to our server (via the TCP handshake) to send data to it.
  • Send the server some data in bytes (line 14)
  • Recieve data back from the server and print out the response (line 17)

    Note that this script makes numerous assumptions about the server we are engaging with:

  • It assumes that our connection will always succeed as it does not have a fallback function in the event that the server rejects our connection.
  • It assumes that the server expects us to send data first. Sometimes, the server will want to send us data first - this is especially true if the server is being guarded by a firewall of some kind.
  • The script assumes that the server will always return data to us in a timely fashion.

    The assumptions are made for simplicity's sake. All things considered, sometimes less is more.

    udp_client.py

    Our udp_client.py script is much different from our tcp script, only that it it configured to send data via the user datagram protocol (but that much was obvious):

    • We change the socket type to SOCK_DGRAM to indicate that we will be using sending data via the UDP (line 6).
    • Also, notice that there is no connect() method beforehand, since we do not need to connect to a server beforehand using UDP. This is because UDP is a connectionaless protocol.
    • The last step is to call the recvfrom() method to receive UDP data back. This returns both the data and the details of the remote host and port (line 9).

    tcp_server.py

    The tcp_server.py is just that, a multi-threaded python TCP server that we can use in the event we want to write a command shell or craft a proxy.

    • Firstly, we pass in the IP address and port we want the server to listen on (line 9).
    • Next, we tell the server to simply start listening with a max backlog of connections set to 5 (line 10). Now ther server waits for a connection.
    • Once the clinet connects, we get the client socket in the client variable and the remote connection details in teh address variable.
    • We tehn start the thread to handle the client connection (line 17).
    • The handle_client function performs rec() and then sens a simple message back to the client.
  • Owner
    Nathan Galindo
    Hi, my name is Nathan Galindo and I am a cybersecurity student at Baylor University!
    Nathan Galindo
    VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit

    Vortex VPN Overall Reconnaissance, Testing, Enumeration and Exploitation Toolkit Overview A very simple Python framework, inspired by SprayingToolkit,

    315 Dec 28, 2022
    Password list generator for password spraying - prebaked with goodies

    Generates permutations of Months, Seasons, Years, Sports Teams (NFL, NBA, MLB, NHL), Sports Scores, "Password", and even Iterable Keyspaces of a specified size.

    Casey Erdmann 65 Dec 22, 2022
    this keylogger is only for pc not for android but it will only work on those pc who have python installed it is made for all linux,windows and macos

    Keylogger this keylogger is only for pc not for android but it will only work on those pc who have python installed it is made for all linux,windows a

    Titan_Exodous 1 Nov 04, 2021
    ThePhish: an automated phishing email analysis tool

    ThePhish ThePhish is an automated phishing email analysis tool based on TheHive, Cortex and MISP. It is a web application written in Python 3 and base

    675 Jan 03, 2023
    AutoScan 有多个目标时,调用xray+rad进行自动扫描

    Usage: 在高级版Xray和rad同目录下运行 python3 X-AutoXray.py xxxx.txt 写的蛮人性化的哦,os,linux,windows通用 生成的xray报告会在当前目录的/result下面 Ctrl+c 打断脚本运行时还可以结算扫描进度,生成已扫描和未扫描的进度文件,

    斯文 73 Jan 01, 2023
    HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907

    CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. create by antx at 2022-01-17. Detail HTTP

    赛欧思网络安全研究实验室 365 Nov 30, 2022
    This program will brute force any Instagram account you send it its way given a list of proxies.

    Instagram Bruter This program will brute force any Instagram account you send it its way given a list of proxies. NOTICE I'm no longer maintaining thi

    1 Nov 15, 2021
    Orthrus is a macOS agent that uses Apple's MDM to backdoor a device using a malicious profile.

    Orthrus is a macOS agent that uses Apple's MDM to backdoor a device using a malicious profile. It effectively runs its own MDM server and allows the operator to interface with it using Mythic.

    Mythic Agents 37 Dec 06, 2022
    Format SSSD Raw Kerberos Payloads into CCACHE files for use on Windows systems

    KCMTicketFormatter This tools takes the output from https://github.com/fireeye/SSSDKCMExtractor and turns it into properly formatted CCACHE files for

    Black Lantern Security 35 Oct 25, 2022
    This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit

    CVE-2021-40444 builders This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit. This repo is just for testing, re

    ASL IT Security 168 Nov 09, 2022
    LittleBrother is a simple parental control application monitoring specific processes on Linux hosts to monitor and limit the play time of children.

    Parental Control Application LittleBrother Overview LittleBrother is a simple parental control application monitoring specific processes (read "games"

    40 Dec 21, 2022
    A windows post exploitation tool that contains a lot of features for information gathering and more.

    Crowbar - A windows post exploitation tool Status - ✔️ This project is now considered finished. Any updates from now on will most likely be new script

    29 Nov 20, 2022
    Strapi Framework Vulnerable to Remote Code Execution

    CVE-2019-19609 Strapi Framework Vulnerable to Remote Code Execution well, I didnt found any exploit for CVE-2019-19609 so I wrote one. :/ Usage pytho

    Dasith Vidanage 7 Mar 08, 2022
    BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.

    Follow us on Twitter! BoobSnail BoobSnail allows generating XLM (Excel 4.0) macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro gen

    STM Cyber 232 Nov 21, 2022
    A malware to encrypt all the .txt and .jpg files in target computer using RSA algorithms

    A malware to encrypt all the .txt and .jpg files in target computer using RSA algorithms. Change the Blackgound image of targets' computer. and decrypt the targets' encrypted files in our own compute

    Li Ka Lok 2 Dec 02, 2022
    Generate malicious files using recently published bidi-attack (CVE-2021-42574)

    CVE-2021-42574 - Code generator Generate malicious files using recently published bidi-attack vulnerability, which was discovered in Unicode Specifica

    js-on 7 Nov 09, 2022
    Python tool for dumping flash via uboot reliably

    Reliable Uboot Flash Dumper is a Python tool for dumping flash via uboot reliably. If you've ever had to dump flash via uboot and a serial connection and became frustrated about doing it several time

    SecurityJon 25 May 10, 2022
    Infection Monkey - An automated pentest tool

    Infection Monkey Data center Security Testing Tool Welcome to the Infection Monkey! The Infection Monkey is an open source security tool for testing a

    Guardicore Ltd. 6k Jan 09, 2023
    SSH Tool For OSINT and then Cracking.

    sshmap SSH Tool For OSINT and then Cracking. Linux Systems Only Usage: Scanner Syntax: scanner start/stop/status - Sarts/stops/sho

    Miss Bliss 5 Apr 04, 2022
    Get related domains / subdomains by looking at Google Analytics IDs

    DomainRelationShips ██╗ ██╗ █████╗ ██╗██████╗ ██║ ██║██╔══██╗ ██║██╔══██╗ ██║ ██║█████

    Josué Encinar 161 Jan 02, 2023