blog.ikotler.org
I hack, therefore I am: Fuzzing Like A Boss with Pythonect
http://blog.ikotler.org/2012/09/fuzzing-like-boss-with-pythonect.html
I hack, therefore I am. Monday, September 17, 2012. Fuzzing Like A Boss with Pythonect. In my previous post Automated Static Malware Analysis with Pythonect. I wrote about how to use Pythonect. Let's see some code! A', 'a', '0', '! N for n in [256, 512, 1024, 2048, 4096] - os.system('/bin/ping ' ). The code above tries to fuzz the command-line arguments of a *nix command-line tool (e.g. /bin/ping. Let's go line by line and explain what's going on with these 3 lines of code. S', '%n', 'A', 'a', '0', '!
blog.ikotler.org
I hack, therefore I am: September 2012
http://blog.ikotler.org/2012_09_01_archive.html
I hack, therefore I am. Monday, September 17, 2012. Fuzzing Like A Boss with Pythonect. In my previous post Automated Static Malware Analysis with Pythonect. I wrote about how to use Pythonect. Let's see some code! A', 'a', '0', '! N for n in [256, 512, 1024, 2048, 4096] - os.system('/bin/ping ' ). The code above tries to fuzz the command-line arguments of a *nix command-line tool (e.g. /bin/ping. Let's go line by line and explain what's going on with these 3 lines of code. S', '%n', 'A', 'a', '0', '!
blog.ikotler.org
I hack, therefore I am: December 2012
http://blog.ikotler.org/2012_12_01_archive.html
I hack, therefore I am. Tuesday, December 25, 2012. Scraping LinkedIn Public Profiles for Fun and Profit. In this blog post I will show you how to use Pythonect to easily generate potential passwords from LinkedIn public profiles. If you haven't heard about Pythonect. 1) Find all the employees public LinkedIn profiles. 8594; (2) Scrap all the employees public LinkedIn profiles. 8594; (3) Crunch all the data into potential passwords. When creating a Google Custom Search Engine it's possible to refine the ...
blog.ikotler.org
I hack, therefore I am: August 2013
http://blog.ikotler.org/2013_08_01_archive.html
I hack, therefore I am. Wednesday, August 7, 2013. Pythonect Has New Graphs, Documentation, Tutorial, and More! About two weeks ago I have released a new version of Pythonect. 06) with new features, documentation, tutorial, and an (small, but growing) example directory. I’d like to take this opportunity to discuss the past, present and future of the Pythonect Project. Here is the canonical "Hello, world" example program in Pythonect:. Hello, world" - print. Hello, world" - [print, print]. And vice versa&...
blog.ikotler.org
I hack, therefore I am: Automated Static Malware Analysis with Pythonect
http://blog.ikotler.org/2012/08/automated-static-malware-analysis-with.html
I hack, therefore I am. Tuesday, August 21, 2012. Automated Static Malware Analysis with Pythonect. About 5 months ago I have released the first version of Pythonect. A new, experimental, general-purpose high-level dataflow programming language based on Python, written in Python. It aims to combine the intuitive feel of shell scripting (and all of its perks like implicit parallelism) with the flexibility and agility of Python. Most definitely. And yet, strangely enough, it works! The benefits, and perhap...
blog.ikotler.org
I hack, therefore I am: August 2012
http://blog.ikotler.org/2012_08_01_archive.html
I hack, therefore I am. Tuesday, August 21, 2012. Automated Static Malware Analysis with Pythonect. About 5 months ago I have released the first version of Pythonect. A new, experimental, general-purpose high-level dataflow programming language based on Python, written in Python. It aims to combine the intuitive feel of shell scripting (and all of its perks like implicit parallelism) with the flexibility and agility of Python. Most definitely. And yet, strangely enough, it works! The benefits, and perhap...
blog.ikotler.org
I hack, therefore I am: April 2013
http://blog.ikotler.org/2013_04_01_archive.html
I hack, therefore I am. Wednesday, April 3, 2013. Hackersh 0.1 Release Announcement. I am pleased to announce the Official 0.1 launch of Hackersh. Hacker Shell") - a shell (command interpreter) written in Python with built-in security commands, and out of the box wrappers for various security tools. It uses Pythonect as its scripting engine. Since it's the first release of Hackersh, I'd like to take this opportunity to explain how it works and why you should be using it. Return something like this:.