Skip to content

Instantly share code, notes, and snippets.

View 0x9090's full-sized avatar
💭
🍌'>"><img src=x onerror=alert("never gonna give you up")>

nops 0x9090

💭
🍌'>"><img src=x onerror=alert("never gonna give you up")>
  • No Warranty Included
  • All public code is MIT licensed
View GitHub Profile
@0x9090
0x9090 / hacker_history.txt
Last active January 31, 2024 17:29
History of Hacking
-------------------------------------------------------------
--- Mirrored From http://quietlydreaming.wumpy.xyz/qd.txt ---
-------------------------------------------------------------
1961.01.02 Caltech hackers (Fiendish Fourteen) hacked the stunt cards at the Rose Bowl (U of Wash vs Minnesota)
to say CALTECH instead of WASHINGTON and show a beaver instead of a husky
1969.10.29 The Internet is born as the first ARPANET link was established on October 29, 1969, between the IMP at UCLA and the IMP at SRI. By December, the entire 4-node network was connected.
1971.00.00 John Draper (Cap'n Crunch) uses whistle (blue box) to access Ma Bell
1971.00.00 First e-mail program written by Ray Tomlinson
1972.05.00 John Draper arrested for phone fraud
@0x9090
0x9090 / torrc.examples.txt
Created February 8, 2016 06:47
torrc examples
This file is part of Whonix
Copyright (C) 2012 - 2014 Patrick Schleizer <adrelanos@riseup.net>
See the file COPYING for copying conditions.
**** Do NOT edit this file! ****
This file will show you examples you can copy and paste to /etc/tor/torrc
Additionally, you can read the official Tor Manual at:
https://www.torproject.org/docs/tor-manual.html.en
types {
text/html html htm shtml;
text/css css;
text/xml xml;
image/gif gif;
image/jpeg jpeg jpg;
application/javascript js;
application/atom+xml atom;
application/rss+xml rss;
@0x9090
0x9090 / Nops_Blogs.opml
Last active September 29, 2023 18:31
My Infosec Blog List
<?xml version="1.0" encoding="UTF-8"?>
<opml version="1.0">
<head>
<title>Nops subscriptions in feedly Cloud</title>
</head>
<body>
<outline text="Security" title="Security">
<outline type="rss" text="X-Force Research – Security Intelligence" title="X-Force Research – Security Intelligence" xmlUrl="http://securityintelligence.com/topics/x-force/feed/" htmlUrl="https://securityintelligence.com"/>
<outline type="rss" text="SecurityIntelligence" title="SecurityIntelligence" xmlUrl="http://securityint.blogspot.com/feeds/posts/default" htmlUrl="http://securityint.blogspot.com/"/>
@0x9090
0x9090 / REGO_cheet_sheet.txt
Created April 25, 2023 02:12
REGO Cheat Sheet
REGO is a declarative language used for policy-as-code in the Open Policy Agent (OPA) framework. Here's a concise cheat sheet of popular built-in functions, syntax idioms, and variables in REGO:
1. Built-in functions:
- Comparison: `eq(x, y)`, `lt(x, y)`, `lte(x, y)`, `gt(x, y)`, `gte(x, y)`
- Arithmetic: `add(x, y)`, `sub(x, y)`, `mul(x, y)`, `div(x, y)`, `mod(x, y)`
- Logical: `and(x, y)`, `or(x, y)`, `not(x)`
- Type Checking: `is_number(x)`, `is_string(x)`, `is_boolean(x)`, `is_array(x)`, `is_set(x)`, `is_object(x)`, `is_null(x)`
- Casting: `to_number(x)`, `to_string(x)`, `to_boolean(x)`
- Arrays: `count(arr)`, `all(arr, func)`, `any(arr, func)`, `filter(arr, func)`, `map(arr, func)`, `reduce(arr, func, initial)`
------------
This is a backup of a useful article on ADFS token lifetimes that was taken down. Original URL is = https://tristanwatkins.com/coordinating-adfs-2012-r2-token-lifetime-logon-prompt-enforce-revocation-session-duration-public-network/
------------
Coordinating AD FS 2012 R2 token lifetimes to reduce logon prompts, enforce revocation and limit session duration over public networks
Back in February, I posted a question on the Geneva forum about Adjusting token lifetimes at the Web Application Proxy (WAP) for external access:
package anon.app.core.security;
import anon.market.core.Log;
import org.bouncycastle.crypto.engines.AESEngine;
import org.bouncycastle.crypto.generators.SCrypt;
import org.bouncycastle.crypto.modes.GCMBlockCipher;
import org.bouncycastle.crypto.params.AEADParameters;
import org.bouncycastle.crypto.params.KeyParameter;
import org.bouncycastle.jcajce.provider.digest.SHA3;
import javax.ws.rs.WebApplicationException;
package main
// Code modified from: https://github.com/abdullah2993/go-runpe/blob/master/runpe.go
import (
"bytes"
"debug/pe"
"encoding/binary"
"fmt"
"syscall"
@0x9090
0x9090 / Writings.txt
Last active July 13, 2020 04:50
The Weaponite Writings
~~ The Weaponite Writings ~~
For all of human history, weapons equal power.
Power to the people, means weapons to the people.
We the Weaponites, will not be subjugated.
Principals:
1. Our purpose is to arm all peace-loving peoples for their own salvation. This is the way.
2. Safety and personal responsibility is the first priority of all Weaponites.
3. Weaponites are free to own and carry all weapons and weapon accessories. Firearms are our traditional choice of holey instrument.
@0x9090
0x9090 / CryptoArk.txt
Last active June 1, 2020 16:48
Crypto Ark
We need to be prepared with the tools needed for secure communications.
Downloading these libraries acts as safeguard for privacy, as we will always be able to build and disribute encrypted applications.
And if you're really paranoid, you'll back up a favorite Linux distro, browser and compiler.
* Crypto++ - https://github.com/weidai11/cryptopp
* Botan - https://github.com/randombit/botan
* BouncyCastle Java - https://github.com/bcgit/bc-java
* BouncyCastle C# - https://github.com/bcgit/bc-csharp
* GnuTLS - https://gitlab.com/gnutls/gnutls
* NaCl - https://nacl.cr.yp.to/install.html