Skip to content

Instantly share code, notes, and snippets.

import os
import sys
import math
class AES(object):
keySize = dict(SIZE_128=16, SIZE_192=24, SIZE_256=32)
# Rijndael S-box
sbox = [0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67,
0x2b, 0xfe, 0xd7, 0xab, 0x76, 0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59,
@0xINT3
0xINT3 / crt-finder.sh
Created January 7, 2020 10:58
Fetch all subdomains using crt.sh discovery
curl -fsSL "https://crt.sh/?q=%25.<domain>.com&exclude=expired" | pup 'td :contains(".<domain>.com") text{}' | sort -n | uniq -c | sort -rn | column -t | cut -c 5- > domains.txt
@0xINT3
0xINT3 / tmux-cheatsheet.markdown
Created May 27, 2019 12:12 — forked from MohamedAlaa/tmux-cheatsheet.markdown
tmux shortcuts & cheatsheet

tmux shortcuts & cheatsheet

start new:

tmux

start new with session name:

tmux new -s myname
@0xINT3
0xINT3 / AesCryptoServiceProvider.txt
Created February 20, 2019 20:49
Pasting the encryption function / AES I found that is used by the Jigsaw ransomware used to encrypt victim's files. This is a part of Malware Analysis.
using Microsoft.Win32.SafeHandles;
using System;
using System.Collections.Generic;
using System.Runtime.CompilerServices;
using System.Runtime.InteropServices;
using System.Security.Permissions;
namespace System.Security.Cryptography
{
[HostProtection(SecurityAction.LinkDemand, MayLeakOnAbort = true)]