id
int64 0
458k
| file_name
stringlengths 4
119
| file_path
stringlengths 14
227
| content
stringlengths 24
9.96M
| size
int64 24
9.96M
| language
stringclasses 1
value | extension
stringclasses 14
values | total_lines
int64 1
219k
| avg_line_length
float64 2.52
4.63M
| max_line_length
int64 5
9.91M
| alphanum_fraction
float64 0
1
| repo_name
stringlengths 7
101
| repo_stars
int64 100
139k
| repo_forks
int64 0
26.4k
| repo_open_issues
int64 0
2.27k
| repo_license
stringclasses 12
values | repo_extraction_date
stringclasses 433
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
19,300
|
.pydevproject.svn-base
|
pwnieexpress_raspberry_pwn/src/pentest/fasttrack/.svn/text-base/.pydevproject.svn-base
|
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<?eclipse-pydev version="1.0"?>
<pydev_project>
<pydev_property name="org.python.pydev.PYTHON_PROJECT_INTERPRETER">Default</pydev_property>
<pydev_property name="org.python.pydev.PYTHON_PROJECT_VERSION">python 2.5</pydev_property>
<pydev_pathproperty name="org.python.pydev.PROJECT_SOURCE_PATH">
<path>/fasttrack</path>
<path>/fasttrack/bin</path>
</pydev_pathproperty>
</pydev_project>
| 443
|
Python
|
.py
| 10
| 43.2
| 91
| 0.773148
|
pwnieexpress/raspberry_pwn
| 1,024
| 184
| 8
|
GPL-3.0
|
9/5/2024, 5:12:22 PM (Europe/Amsterdam)
|
19,301
|
depend.py
|
pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/depend.py
|
#!/usr/bin/env python
import os
count=0
# Perform Dependency check
print "\n\n\n\n\n***********************************************\n******* Performing dependency checks... *******\n***********************************************\n"
try:
import _mssql
print "*** FreeTDS and PYMMSQL are installed. (Check) ***"
count=count+1
except ImportError:
print "!!! *ERROR* FreeTDS and PYMMSQL are NOT installed. *ERROR* !!!"
answer1=raw_input("Would you like to install it now? yes or no: ")
if answer1=='yes' or answer1=='y':
print "Installing FreeTDS and PYMMSQL"
slack1=os.system("wget http://ibiblio.org/pub/Linux/ALPHA/freetds/stable/freetds-stable.tgz")
slack2=os.system("wget http://downloads.sourceforge.net/pymssql/pymssql-0.8.0.tar.gz")
slack3=os.system("tar -zxvf freetds-stable.tgz;tar -zxvf pymssql-0.8.0.tar.gz;cd freetds-0.*;./configure --enable-msdblib --with-tdsver=8.0 && make && make install; cd ..;cd pymssql-0.8.0;ln -s /usr/local/lib/libsysbdb.so.5 /usr/lib;python setup.py install;cd ..;rm -rf freetds*;rm -rf pymssql*")
print 'Running ldconfig....'
ldconfig=os.system("ldconfig")
print "FreeTDS and PYMMSQL Installed..."
print "Re-checking dependency..."
try:
import _mssql #@UnusedImport
print "Installed successfully...This module is now functioning."
count=count+1
except ImportError:
print "Something went wrong during the installation process, try installing FreeTDS and PYMMSQL manually..."
except KeyboardInterrupt:
print "\nExiting Fast-Track...\n\n"
try:
import pexpect
print "*** PExpect is installed. (Check) ***"
except ImportError:
print "!!! *ERROR* PExpect is NOT installed. *ERROR* !!!"
answer1=raw_input("Would you like to install it now? yes or no: ")
if answer1=='yes' or answer1=='y':
print 'Installing Module for Python Called "PExpect"'
pexpect0=os.system('wget http://downloads.sourceforge.net/pexpect/pexpect-2.3.tar.gz;tar -zxvf pexpect-2.3.tar.gz;cd pexpect-2.3;python setup.py install;cd ..;rm -rf pexpect-2.3;rm pexpect-2.3.tar.gz')
print "PExpect Installed..."
print "Re-checking dependency..."
try:
import pexpect #@UnusedImport
print "Installed successfully...This module is now functioning."
count=count+1
except ImportError:
print "Something went wrong during the installation process, try installing FreeTDS and PYMMSQL manually..."
except KeyboardInterrupt:
print "\nExiting Fast-Track...\n\n"
try:
import ClientForm
print "*** ClientForm is installed. (Check) ***"
count=count+1
except ImportError:
print "!!! *ERROR* ClientForm is NOT installed. *ERROR* !!!"
answer1=raw_input("Would you like to install it now? yes or no: ")
if answer1=='yes' or answer1=='y':
print "Installing ClientForm Python Module"
installclientform=os.system("svn co http://codespeak.net/svn/wwwsearch/ClientForm/trunk ClientForm;cd ClientForm;python setup.py install;cd ..;rm -rf ClientForm")
print "ClientForm Installed."
print "Re-checking dependency"
try:
import ClientForm #@UnusedImport
print "Installed successfully...This module is now functioning."
count=count+1
except ImportError:
print "Something went wrong during the installation process, try installing ClientForm manually..."
except KeyboardInterrupt:
print "\nExiting Fast-Track...\n\n"
try:
import psyco
psyco.full()
print "*** Psyco is installed. (Check) ***"
# count=count+1
except ImportError:
pass
try:
from BeautifulSoup import BeautifulSoup
print "*** Beautiful Soup is installed. (Check) ***"
count=count+1
except ImportError:
print "!!! *ERROR* Beautiful Soup is NOT installed...This is needed for SQLPwnage. *ERROR* !!!"
answer1=raw_input("Would you like to install it now? yes or no: ")
if answer1=='yes' or answer1=='y':
print "Installing BeautifulSoup Python Module"
installbeatsoup=os.system("wget http://www.crummy.com/software/BeautifulSoup/download/BeautifulSoup.tar.gz;tar -zxvf BeautifulSoup.tar.gz;cd BeautifulSoup*;python setup.py install;cd ..;rm -rf BeautifulSoup*")
print "BeautifulSoup Installed."
print "Re-checking dependency"
try:
from BeautifulSoup import BeautifulSoup #@UnusedImport
print "Installed successfully...This module is now functioning."
count=count+1
except ImportError:
print "BeautifulSoup is installed but you will need to restart Fast-Track in order for it to work properly."
except KeyboardInterrupt:
print "\nExiting Fast-Track...\n\n"
try:
import pymills
print "*** PyMills is installed. (Check) ***"
count=count+1
except ImportError:
print "!!! *ERROR* PyMills is NOT installed...This is needed for SQLPwnage. *ERROR* !!!"
answer1=raw_input("Would you like to install it now? yes or no: ")
if answer1=='yes' or answer1=='y':
print "Installing PyMills Python Module, this may take a few mins"
grabsetuptools=os.system("svn co http://svn.python.org/projects/sandbox/branches/setuptools-0.6/ pym;cd pym;python setup.py install;cd ..;rm -rf pym")
installpymills=os.system('wget http://pypi.inqbus.de/pymills/pymills-3.4.tar.gz;tar -zxvf pymills-3.4.tar.gz;mv pymills-3.4 pymills;cd pymills/;python setup.py install;cd ..;rm -rf pymills*')
print "PyMills Installed.."
print "Re-checking dependancy"
try:
import pymills #@UnusedImport
print "Installed successfully...This module is now functioning."
count=count+1
except ImportError:
print "PyMills is installed but you will need to restart Fast-Track in order for it to work properly."
except KeyboardInterrupt:
print "\nExiting Fast-Track...\n\n"
print "\nAlso ensure ProFTP, WinEXE, and SQLite3 is installed from\nthe Updates/Installation menu."
if count ==4:
print "\nYour system has all requirements needed to run Fast-Track!"
if count !=4:
print "*WARNING* Your system is missing some components required for Fast-Track.. *WARNING*"
| 6,335
|
Python
|
.py
| 121
| 45.504132
| 304
| 0.67215
|
pwnieexpress/raspberry_pwn
| 1,024
| 184
| 8
|
GPL-3.0
|
9/5/2024, 5:12:22 PM (Europe/Amsterdam)
|
19,302
|
nsecommon.py
|
pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/nsecommon.py
|
#!/usr/bin/env python
'''Created on Sep 18, 2010
@author: Joey Furr (j0fer)'''
import os
from bin.include import print_banner
from time import sleep
# For NSE integration
def runnse(command):
print_banner()
os.system(command)
raw_input("\nPress <enter> to return...\n")
def get_target(counter,self_banner):
""" get user input, check for valid input, and
loop back through if invalid input is entered. """
tries = counter
target_input = raw_input("""
NOTE: A single host or a network/block can be specified for testing.
examples: 192.168.1.21
192.168.1.0/24
Enter the host or range to be checked: """)
if counter == 3:
print_banner()
print self_banner
sleep(1)
print " Just so you know...I can go on like this all day...."
sleep(1)
tries = 0
get_target(tries,self_banner)
if target_input == "" or len(target_input.split(".")) != 4:
print_banner()
print self_banner
print " *** YOU MUST ENTER A VALID HOST OR RANGE TO CHECK **"
tries+=1
get_target(tries,self_banner)
else:
return(target_input)
| 1,209
|
Python
|
.py
| 36
| 26.777778
| 72
| 0.615785
|
pwnieexpress/raspberry_pwn
| 1,024
| 184
| 8
|
GPL-3.0
|
9/5/2024, 5:12:22 PM (Europe/Amsterdam)
|
19,303
|
include.py
|
pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/include.py
|
#!/usr/bin/env python
import os
def get_version():
readversion=file("bin/version/version","r")
for line in readversion:
version=line.rstrip()
return version
def print_banner():
# os.system("clear")
print ''' *****************************************************************
** **
** Fast-Track - A new beginning... **
** Version: 4.0.1 **
** Written by: David Kennedy (ReL1K) **
** Lead Developer: Joey Furr (j0fer) **
** http://www.secmaniac.com **
** **
*****************************************************************'''
| 845
|
Python
|
.py
| 18
| 43.888889
| 79
| 0.309002
|
pwnieexpress/raspberry_pwn
| 1,024
| 184
| 8
|
GPL-3.0
|
9/5/2024, 5:12:22 PM (Europe/Amsterdam)
|
19,304
|
nmapsmbcheckvulns.py
|
pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/nmapsmbcheckvulns.py
|
#!/usr/bin/env python
from bin.include import print_banner
from bin.nsecommon import get_target,runnse
def nmapsmbcheckvulns_run():
""" Main execution logic: reuse common
nse modules for this nse script """
self_banner = """ ** Nmap Scripting Engine: Script - smb-check-vulns **
** **
** Checks a host or network MS08-067 **
** for vulnerability to: Conficker infection **
** regsvc DoS: (When enabled) **
** SMBv2 DoS: (When enabled) **
*****************************************************************
"""
# BEGIN MAIN EXECUTION
counter = 0
print_banner()
print self_banner
print " <ctrl>-c at any time to Cancel"
# get the host or network to operate on
target = get_target(counter,self_banner)
# enable or disable this scripts arguments
aggressive = raw_input("""\n Do you want to enable aggressive testing (regsvc, SMBv2 DoS)?
WARNING: these checks can cause a Denial of Service! [y|n]: """)
# check answer on aggressive mode
if aggressive == "y" or aggressive == "yes":
command = "nmap --script smb-check-vulns --script-args=unsafe=1 -p445 %s" % target
runnse(command)
if aggressive == "n" or aggressive == "no":
command = "nmap --script smb-check-vulns -p445 %s" % target
runnse(command)
if __name__ == "__main__": # Allow this module to be run as a standalone script
nmapsmbcheckvulns_run()
| 1,640
|
Python
|
.py
| 33
| 44.090909
| 97
| 0.556898
|
pwnieexpress/raspberry_pwn
| 1,024
| 184
| 8
|
GPL-3.0
|
9/5/2024, 5:12:22 PM (Europe/Amsterdam)
|
19,305
|
exploitmenu.py
|
pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/exploitmenu.py
|
#!/usr/bin/env python
import os,sys,time,subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
sys.path.append("%s/bin/exploits/" % (definepath))
while 1==1:
try:
include.print_banner()
exploit1=raw_input("""
This section will attempt to compile some exploits coded in python, generally
these exploits are from Muts, but may add others in time.
Select your exploit:
1. HP OpenView Network Node Manager CGI Buffer Overflow
2. IBM Tivoli Storage Manager Express CAD Service Buffer Overflow
3. HP Openview NNM 7.5.1 OVAS.EXE Pre Authentication SEH Overflow
4. Quicktime 7.3 RTSP SEH Buffer Overflow
5. Goodtech SSH Server 6.4 Buffer Overflow
6. MS08-067 Microsoft Server Service Remote Buffer Overflow
7. mIRC 6.34 Remote Buffer Overflow Exploit
8. TFTP Server for Windows V1.4 ST
9. Internet Explorer XML Corruption Buffer Overflow
10. MS Internet Explorer 7 Memory Corruption Exploit (MS09-002)
11. MS Internet Explorer 7 DirectShow (msvidctl.dll) Heap Spray
12. FireFox 3.5 Heap Spray Vulnerability
(q)uit
Enter number: """)
if exploit1 == '1' :
try:
reload(hpopenview)
except Exception: pass
import hpopenview
if exploit1 == '2' :
try: reload(ibmcad)
except Exception: pass
import ibmcad
if exploit1 == '3' :
try: reload(hpopenviewnnm)
except Exception: pass
import hpopenviewnnm
if exploit1 == '4' :
try: reload(quicktime)
except Exception: pass
import quicktime
if exploit1 == '5' :
try: reload(goodtech)
except Exception: pass
import goodtech
if exploit1 == '6' :
try: reload(ms08067run)
except Exception: pass
import ms08067run
if exploit1 == '7' :
try: reload(mirc)
except Exception: pass
import mirc
if exploit1 == '8' :
try: reload(tftp)
except Exception: pass
import tftp
if exploit1 == '9' :
try: reload(xmlcorruptionbo)
except Exception: pass
import xmlcorruptionbo
if exploit1 == '10' :
try: reload(ms09002)
except Exception: pass
import ms09002
if exploit1 == '11' :
try: reload(ie0day_activex)
except Exception: pass
import ie0day_activex
if exploit1 == '12' :
try: reload(firefox35)
except Exception: pass
import firefox35
if exploit1 == 'q' :
print "\nReturning to previous menu...\n"
break
except Exception, e:
print "\n\n The system may not be vulnerable. Printing Error: "+str(e)+"\n"
print e
| 2,914
|
Python
|
.py
| 88
| 25.659091
| 84
| 0.630999
|
pwnieexpress/raspberry_pwn
| 1,024
| 184
| 8
|
GPL-3.0
|
9/5/2024, 5:12:22 PM (Europe/Amsterdam)
|
19,306
|
tutorialsmenu.py
|
pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/tutorialsmenu.py
|
#!/usr/bin/env python
import sys,os
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
# method to display the tutorial text
def show_tutorial(tutorial_file):
include.print_banner()
print '\n'
display = open(tutorial_file, 'r')
try:
for line in display:
sys.stdout.write(line)
finally:
display.close()
pause=raw_input("\nPress enter to return to menu")
while 1==1:
include.print_banner()
tutmenu1=raw_input('''\nFast-Track Tutorials Menu:
1. General Functionality and Movement in Fast-Track
2. How to update Fast-Track
3. MetaSploit AutoPwn
4. SQL 1433 Hacking
5. SQL Injection HOWTO
6. FTP Brute Forcer
7. Spawning a Shell
8. Exploits
9. Mass Client-Side Attacks
10. Binary to Hex Payload Generator
(q)uit
Enter number: ''')
####################################################################
if tutmenu1 == '1':
tutorial_file="bin/ftsrc/tutorials/general_functionality.txt"
show_tutorial(tutorial_file)
if tutmenu1 == '2':
tutorial_file="bin/ftsrc/tutorials/updating_fasttrack.txt"
show_tutorial(tutorial_file)
if tutmenu1 == '3':
tutorial_file="bin/ftsrc/tutorials/metasploit_autopwn.txt"
show_tutorial(tutorial_file)
if tutmenu1 == '4':
tutorial_file="bin/ftsrc/tutorials/sql_1433_hacking.txt"
show_tutorial(tutorial_file)
if tutmenu1 == '5':
tutorial_file="bin/ftsrc/tutorials/sql_injection_howto.txt"
show_tutorial(tutorial_file)
if tutmenu1 == '6':
tutorial_file="bin/ftsrc/tutorials/ftp_brute_forcer.txt"
show_tutorial(tutorial_file)
if tutmenu1 == '7':
tutorial_file="bin/ftsrc/tutorials/spawn_command_shell.txt"
show_tutorial(tutorial_file)
if tutmenu1 == '8':
tutorial_file="bin/ftsrc/tutorials/exploits_menu.txt"
show_tutorial(tutorial_file)
if tutmenu1 == '9':
tutorial_file="bin/ftsrc/tutorials/mass_clientside_attack.txt"
show_tutorial(tutorial_file)
if tutmenu1 == '10':
tutorial_file="bin/ftsrc/tutorials/binary_hex_payload.txt"
show_tutorial(tutorial_file)
if tutmenu1 == 'q':
print '\n\nReturning to main menu...\n'
break
| 2,275
|
Python
|
.py
| 65
| 29.553846
| 68
| 0.664528
|
pwnieexpress/raspberry_pwn
| 1,024
| 184
| 8
|
GPL-3.0
|
9/5/2024, 5:12:22 PM (Europe/Amsterdam)
|
19,307
|
sqlinjector.py
|
pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/sqlinjector.py
|
#!/usr/bin/env python
import os,sys,time
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
while 1==1:
include.print_banner()
menu=raw_input("""
Enter which SQL Injector you want to use:
1. SQL Injector - Query String Parameter Attack
2. SQL Injector - POST Parameter Attack
3. SQL Injector - GET FTP Payload Attack
4. SQL Injector - GET Manual Setup Binary Payload Attack
(q)uit
Enter your choice: """)
if menu == 'quit' or menu == 'q': break
# Start query string attack
if menu == '1':
try:
reload(sqlbinarypayload)
except Exception:
pass
import sqlbinarypayload
# POST ATTACK
if menu == '2':
try:
reload(sqlbinarypayloadpost)
except Exception:
pass
import sqlbinarypayloadpost
# Reverse FTP
if menu == '3':
try:
reload(sqlftppayload)
except Exception:
pass
import sqlftppayload
# manual setup
if menu == '4':
try:
reload(sqlmanual)
except Exception:
pass
import sqlmanual
| 1,116
|
Python
|
.py
| 44
| 19.704545
| 60
| 0.638577
|
pwnieexpress/raspberry_pwn
| 1,024
| 184
| 8
|
GPL-3.0
|
9/5/2024, 5:12:22 PM (Europe/Amsterdam)
|
19,308
|
main.pyc
|
pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/main.pyc
|
Ñò
šƒkOc j @ s¤ d d k Z d d k Z d d k Z d d k Z d d k Z y d d k Z e i ƒ Wn e j
o n Xe i ƒ Z e i
i d e ƒ d d k Z e i
i d e ƒ d d k
Z
d Z e d d ƒ Z x e D] Z e i ƒ Z qÔ Wy†xd d j oqe i ƒ e d ƒ Z e d j o[y/e d
d ƒ i ƒ Z xP e D]H Z e i d e ƒ Z e o) e i ƒ Z e i d ƒ Z e d Z q?q?We d j o4 y e e ƒ Wn e j
o n Xd d k Z n e d
j o4 y e e ƒ Wn e j
o n Xd d k Z n e d j o4 y e e ƒ Wn e j
o n Xd d k Z n Wq{e j
o d GHe i d ƒ q{Xn e d j ot yH e i
i d e ƒ y e e! ƒ Wn e j
o n Xd d k! Z! Wqüe j
o d GHe i d ƒ qüXn e d j o` y4 y e e" ƒ Wn e j
o n Xd d k" Z" Wqie j
o d GHe i d ƒ qiXn e d j o` y4 y e e# ƒ Wn e j
o n Xd d k# Z# WqÖe j
o d GHe i d ƒ qÖXn e d j ot yH e i
i d e ƒ y e e$ ƒ Wn e j
o n Xd d k$ Z$ WqWe j
o d GHe i d ƒ qWXn e d j o` y4 y e e% ƒ Wn e j
o d d k% Z% n XWqÄe j
o d GHe i d ƒ qÄXn e d j ot yH e i
i d e ƒ y e e& |