Skip to content

Instantly share code, notes, and snippets.

View JonLittleIT's full-sized avatar
🏠
Working from home

CrashOverrid3 JonLittleIT

🏠
Working from home
View GitHub Profile
@jgamblin
jgamblin / antiautosploit.py
Last active December 9, 2025 17:23
Blocks Shodan IPs From Scanning Your Servers.
#!/usr/bin/python3
import os
shodan = ["104.131.0.69", "104.236.198.48", "155.94.222.12","155.94.254.133", "155.94.254.143", "162.159.244.38", "185.181.102.18", "188.138.9.50", "198.20.69.74", "198.20.69.98", "198.20.70.114", "198.20.87.98", "198.20.99.130", "208.180.20.97", "209.126.110.38", "216.117.2.180", "66.240.192.138", "66.240.219.146", "66.240.236.119", "71.6.135.131", "71.6.146.185", "71.6.158.166", "71.6.165.200", "71.6.167.142", "82.221.105.6", "82.221.105.7", "85.25.103.50", "85.25.43.94", "93.120.27.62", "98.143.148.107", "98.143.148.135"]
for ip in shodan:
os.system("iptables -A INPUT -s {} -j DROP".format(ip))
import botocore
import boto3
import json
import os
import time
import uuid
try:
import urllib2
except:
@Neo23x0
Neo23x0 / nmap-cmdline
Last active March 19, 2020 17:10
Nmap Scan Params for CVE-2017-0143 MS17-010 Scanning
# Scan for CVE-2017-0143 MS17-010
# The vulnerability used by WannaCry Ransomware
#
# 1. Use @calderpwn's script
# http://seclists.org/nmap-dev/2017/q2/79
#
# 2. Save it to Nmap NSE script directory
# Linux - /usr/share/nmap/scripts/ or /usr/local/share/nmap/scripts/
# OSX - /opt/local/share/nmap/scripts/
#
@ashishterp
ashishterp / slack_alert.py
Last active January 23, 2025 12:16
Splunk Alerting to Slack
# Instructions:
# 1. Go to https://[yourdomain].slack.com/services/new
# 2. Configure a new Incoming WebHook and paste the URL below on Line 14
# 3. Copy this file into $SPLUNK_HOME$/bin/scripts
# 4. Configure your saved search to run slack_alert.py
import httplib, json
import getopt, sys, os
import subprocess
@Vivek-Ramachandran
Vivek-Ramachandran / demo.py
Created July 1, 2013 08:26
Demo.py -- Client side of RemoteShellcodeLauncher.c
#!/usr/bin/python
import sys, socket
shellcode = ("\x31\xc0\x48\xbb\xd1\x9d\x96\x91\xd0\x8c\x97\xff\x48\xf7\xdb\x53\x54\x5f\x99\x52\x57\x54\x5e\xb0\x3b\x0f\x05")
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM,0)
sock.connect((sys.argv[1], int(sys.argv[2])))
@Vivek-Ramachandran
Vivek-Ramachandran / RemoteShellcodeLauncher.c
Created July 1, 2013 04:51
RemoteShellcodeLauncher - Accepts Shellcode from a connected client and executes it
/*
RemoteShellcodeLauncher.c
Author: Vivek Ramachandran
Email: vivek@securitytube.net
License: Use as you please for both commercial/non-commercial with/without attribution
Website: http://securitytube.net
Infosec Training: http://SecurityTube-Training.com