Skip to content

Instantly share code, notes, and snippets.

CERT-W CERT-W

Block or report user

Report or block CERT-W

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@CERT-W
CERT-W / file_reader.c
Created Jul 1, 2019
YesWeHack - LeHack challenge 2019
View file_reader.c
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/sendfile.h>
#include <sys/stat.h>
#include <fcntl.h>
void die(const char *fmt, ...)
@CERT-W
CERT-W / main.py
Created Jul 1, 2019
YesWeHack - LeHack challenge 2019
View main.py
#!/usr/bin/env python
import pycurl
import os
import logging
from flask import (
Flask,
request,
render_template,
render_template_string,
abort,
@CERT-W
CERT-W / Search-EncryptedMails.ps1
Last active Nov 2, 2017
PowerShell script to search for plaintext encrypted mails (CVE-2017-11776) - must be run while Outlook is running
View Search-EncryptedMails.ps1
<# DOES NOT WORK IN CONSTRAINED LANGUAGE MODE #>
Function Find-Recurse {
Param(
[parameter(Mandatory=$true)]
$Folder,
$Level=0
)
$Indent = "`t"*$Level
You can’t perform that action at this time.