Skip to content

Instantly share code, notes, and snippets.

View 9b's full-sized avatar
🐗
Creating.

Brandon Dixon 9b

🐗
Creating.
View GitHub Profile
@9b
9b / mitre_extract.py
Created February 8, 2024 13:34
Extract MITRE ATT&CK techniques into a file.
"""Extract MITRE ATT&CK techniques into a file."""
import bs4 as bs
import requests
root_url = "https://attack.mitre.org"
file_name = "mitre.txt"
def get_urls():
"""Get MITRE ATT&CK URLs for processing."""
Descriptor:
Name: BlockadeIoService
DisplayName: Blockade.io
Description: Skills for blocking suspicious and malicious indicators using blockade.io
SkillGroups:
- Format: API
Settings:
OpenApiSpecUrl: https://gist.githubusercontent.com/9b/f3f3e4d831bddcf0ab3f8a32b471893b/raw/b40421aa882e556794d4305dea50bd7f9acc1188/blockadeio.yaml
openapi: 3.0.1
info:
title: Blockade.io
description: Block suspicious and malicious indicators in participating browsers
version: "v1"
servers:
- url: https://api.blockade.io/
@9b
9b / README
Last active August 6, 2019 20:45
Small script to request WHOIS information from RiskIQ
Modify the script to include your username and API key.
Create a virtualenv to keep your space clean:
$ virtualenv -p python3 venv3
Activate it:
$ source venv3/bin/activate
@9b
9b / log-review.txt
Last active November 8, 2018 20:03
{
'statistics': {
'noise': 264,
'ips_processed': 283,
'duplicate_entries': 4609,
'money_saved': '$179.17',
'duplicate_ratio': 94.0,
'noise_ratio': 93.0,
'time_saved': '8:48:00',
'interest': 19,

Keybase proof

I hereby claim:

  • I am 9b on github.
  • I am 9bplus (https://keybase.io/9bplus) on keybase.
  • I have a public key ASDXArDVDZslzdQphHwNk0YbXgJapLZ9yFgrrWCGcK-7Ago

To claim this, I am signing this object:

@9b
9b / apt32.js
Last active June 27, 2018 16:20
Latest observed JS payload used for APT32 profiling.
!function(e) {
function t(i) {
if (n[i])
return n[i].exports;
var o = n[i] = {
"i": i,
"l": !1,
"exports": {}
};
return e[i].call(o.exports, o, o.exports, t),
@9b
9b / false.json
Last active June 1, 2018 02:50
Sample policy generated from a rule builder meant to be evaluated.
{
"condition": "AND",
"rules": [
{
"id": "monitor_category",
"field": "monitor_category",
"type": "string",
"input": "select",
"operator": "equal",
"value": "Competition",
"""Use image analysis to extract scores from coffee charts."""
from PIL import Image, ImageFilter, ImageEnhance
from pytesseract import image_to_string
import cv2
import os
import sys
import numpy as np
@9b
9b / what_runs.py
Created August 26, 2017 03:51
Simple tool to use WhatRuns API to get technologies used on a page. Doesn't submit the page if it's not in the database.
import ast
import datetime
import json
import sys
import requests
import urllib
from tabulate import tabulate
url = "https://www.whatruns.com/api/v1/get_site_apps"
data = {"data": {"hostname": sys.argv[1], "url": sys.argv[1],