SYMBOL INDEX (114 symbols across 30 files) FILE: bin/httpd.py class FileHandler (line 24) | class FileHandler(server.BaseHTTPRequestHandler): method __init__ (line 26) | def __init__(self, *args, **kwargs): method send_headers (line 30) | def send_headers(self, content_type='text/html'): method get_temp_filename (line 36) | def get_temp_filename(self, client_host): method get_path_filename (line 45) | def get_path_filename(self): method get_client_address (line 48) | def get_client_address(self): method do_GET (line 51) | def do_GET(self): method do_POST (line 64) | def do_POST(self): class HTTPServerV6 (line 90) | class HTTPServerV6(server.HTTPServer): FILE: bin/mitm_toolkit.py class ToolkitBase (line 6) | class ToolkitBase: method __init__ (line 8) | def __init__(self): class HTML (line 12) | class HTML(ToolkitBase): method load (line 14) | def load(self, loader): method response (line 22) | def response(self, flow): class NTLM (line 32) | class NTLM(ToolkitBase): method load (line 34) | def load(self, loader): method response (line 42) | def response(self, flow): class Exec (line 57) | class Exec(ToolkitBase): method load (line 59) | def load(self, loader): method request (line 67) | def request(self, flow): FILE: bin/ping.py function scan (line 12) | def scan(ip, timeout, ttl): function run (line 27) | def run(ip_range, timeout, randomize, ttl, workers): FILE: bin/ssh_enum_malform.py class BadUsername (line 44) | class BadUsername(Exception): method __init__ (line 47) | def __init__(self): function add_boolean (line 51) | def add_boolean(*args, **kwargs): function call_error (line 56) | def call_error(*args, **kwargs): function malform_packet (line 61) | def malform_packet(*args, **kwargs): function checkUsername (line 72) | def checkUsername(username, tried=0): function checkVulnerable (line 98) | def checkVulnerable(): function exportJSON (line 108) | def exportJSON(results): function exportCSV (line 118) | def exportCSV(results): function exportList (line 125) | def exportList(results): function main (line 154) | def main(): FILE: bin/ssh_enum_time.py class bcolors (line 32) | class bcolors: function get_args (line 43) | def get_args(): function get_banner (line 59) | def get_banner(host, port): function connect (line 70) | def connect(host, port, user): function main (line 87) | def main(): FILE: bin/vba_format.py function vb_wrap (line 6) | def vb_wrap(val): function run (line 13) | def run(body, line_length): FILE: bin/vbe_decoder.py function decode_data (line 28) | def decode_data(data: str): function fatal_error (line 60) | def fatal_error(message: str): function success (line 68) | def success(message: str): function validate_files (line 75) | def validate_files(files: list): function decode_files (line 86) | def decode_files(files: list): function decode_file (line 94) | def decode_file(file): function main (line 112) | def main(): FILE: bin/xor.py class Convert (line 7) | class Convert: class XOR (line 12) | class XOR(Convert): method __init__ (line 14) | def __init__(self, data, is_list): method to_dec (line 17) | def to_dec(self, val): method to_hex (line 20) | def to_hex(self, val): method parse (line 23) | def parse(self, val, is_list): method convert (line 32) | def convert(self, key): function run (line 45) | def run(data, key, is_list, truncate, output): FILE: snippets/linux/backdoors/suid_popen.c function main (line 7) | int main(void) FILE: snippets/linux/backdoors/suid_shell.c function main (line 7) | int main(void) FILE: snippets/linux/maldocs/runner-1.c function main (line 9) | int main(int argc, char ** argv) { FILE: snippets/linux/shells/reverse/reverse.c function main (line 11) | int main(int argc, char *argv[]) FILE: snippets/linux/utils/ld_preload.c function _init (line 7) | void _init() { FILE: snippets/linux/utils/python_pickle.py class Payload (line 8) | class Payload(): method __reduce__ (line 10) | def __reduce__(self): FILE: snippets/linux/utils/so_injection.c function inject (line 8) | void inject(){ FILE: snippets/php/recursive_dir.php function list_files (line 8) | function list_files($path=".") { FILE: snippets/windows/maldocs/downloader-1.cs class Program (line 12) | class Program { method OpenProcess (line 14) | [DllImport("kernel32.dll", SetLastError=true, ExactSpelling=true)] method VirtualAllocEx (line 16) | [DllImport("kernel32.dll", SetLastError=true, ExactSpelling=true)] method WriteProcessMemory (line 18) | [DllImport("kernel32.dll")] method CreateRemoteThread (line 20) | [DllImport("kernel32.dll")] method GetProcAddress (line 22) | [DllImport("kernel32", CharSet=CharSet.Ansi, ExactSpelling=true, SetLa... method GetModuleHandle (line 24) | [DllImport("kernel32.dll", CharSet=CharSet.Auto)] method Main (line 27) | static void Main(string[] args) FILE: snippets/windows/maldocs/evasion-1.cs class Program (line 10) | class Program method Main (line 13) | static void Main(string[] args) class Sample (line 19) | [System.ComponentModel.RunInstaller(true)] method Uninstall (line 23) | public override void Uninstall(System.Collections.IDictionary savedState) FILE: snippets/windows/maldocs/runner-1.cs class Program (line 12) | class Program { method VirtualAlloc (line 14) | [DllImport("kernel32.dll", SetLastError = true, ExactSpelling = true)] method CreateThread (line 16) | [DllImport("kernel32.dll")] method WaitForSingleObject (line 18) | [DllImport("kernel32.dll")] method Main (line 21) | static void Main(string[] args) FILE: snippets/windows/shells/reverse/reverse1.cpp function RunShell (line 9) | void RunShell(char* C2Server, int C2Port) { function main (line 61) | int main(int argc, char **argv) { FILE: snippets/windows/shells/reverse/reverse1.cs class Program (line 12) | public class Program method Main (line 15) | public static void Main(string[] args) method CmdOutputDataHandler (line 46) | private static void CmdOutputDataHandler(object sendingProcess, DataRe... FILE: snippets/windows/shells/reverse/reverse2.cpp function LaunchFreddy (line 14) | void LaunchFreddy(char* place, int shipment) { function main (line 70) | int main(int argc, char **argv) { FILE: snippets/windows/shells/reverse/reverse_dll.c type sockaddr_in (line 13) | struct sockaddr_in function executepayload (line 17) | void executepayload(void) function BOOL (line 36) | BOOL APIENTRY DllMain(HMODULE hModule, FILE: snippets/windows/utils/minidump.cs class Program (line 7) | class Program { method MiniDumpWriteDump (line 9) | [DllImport("Dbghelp.dll")] method OpenProcess (line 11) | [DllImport("kernel32.dll")] method Main (line 14) | static void Main(string[] args) { FILE: snippets/windows/utils/run_bat.c function main (line 5) | int main () FILE: snippets/windows/utils/run_dll1.c function BOOL (line 6) | BOOL WINAPI DllMain (HANDLE hDll, DWORD dwReason, LPVOID lpReserved) { FILE: snippets/windows/utils/run_dll2.cpp function fileExist (line 6) | int fileExist(LPCTSTR file) { function scriptExec (line 23) | void scriptExec(void) { function BOOL (line 46) | BOOL APIENTRY DllMain(HMODULE hModule, DWORD ul_reason_for_call, LPVOID ... function main (line 63) | __declspec(dllexport) int main() { FILE: snippets/windows/utils/tcpwrecovery.py function process_file (line 14) | def process_file(filename): function search_ini (line 31) | def search_ini(): function tc_random (line 42) | def tc_random(nMax): function tc_shift (line 47) | def tc_shift(n1, n2): function tc_decrypt (line 50) | def tc_decrypt(pwd): function main (line 81) | def main(): FILE: snippets/windows/utils/useradd.c function main (line 5) | int main () FILE: snippets/windows/utils/winscppassword.py function simple_encrypt_char (line 19) | def simple_encrypt_char(char): function simple_decrypt_next_char (line 26) | def simple_decrypt_next_char(password_list): function encrypt_password (line 34) | def encrypt_password(password, key): function decrypt_password (line 57) | def decrypt_password(password, key): function get_value (line 83) | def get_value(session_key, str): function get_password (line 91) | def get_password():