Skip to content

Instantly share code, notes, and snippets.

Max Kaplan CapCap

  • San Francisco, CA
Block or report user

Report or block CapCap

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@CapCap
CapCap / malware.html.js
Created Feb 28, 2012 — forked from scottschiller/malware.html
Browser malware found in the wild, 02/28/2012, deobf version
View malware.html.js
/* Hello from upgradeyour.com (coming soon),
I've done some security work in the past and figured this would be a fun and quick puzzle, I found the same hash as scott on http://50.116.17.63/stats/counter.php?id=547b373f97233059 and googling it led to his post :)
it tries to identify browser/os version, and possibly run a wmp exp
It also tries to visit http://50.116.17.63/stats/w.php?f=b6863&e=4 and http://50.116.17.63/stats/w.php?f=b6863&e=1 and download+exec, two different exes
It tries a pdf exploit ( http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188 and also http://50.116.17.63/stats/content/ap2.php?f=b6863 and http://50.116.17.63/content/ap1.php ? f = b6863 ), and hcp exploit as well ( http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1885 ), and some pdf exploit
This is all part of the blackhole exploit kit, and this botnet is seemingly Huge!
@CapCap
CapCap / gist:2353326
Created Apr 10, 2012
MYSQL dump of reverse engineered database for phpFormGenerator 3.0beta. Use at your own risk :-)
View gist:2353326
-- Made by the coding ninjas at Upgrade, LLC: www.upgradeyour.com
-- Are YOU ready for an Upgrade?
-- phpMyAdmin SQL Dump
-- Generation Time: Apr 10, 2012 at 06:05 PM
-- Server version: 5.5.20
-- PHP Version: 5.4.0
SET SQL_MODE="NO_AUTO_VALUE_ON_ZERO";
SET time_zone = "+00:00";
@CapCap
CapCap / tensorflow_opencv_ubuntu_deps.sh.txt
Last active Sep 28, 2017
Paperspace tensorflow+opencv setup for both python2 and python3 on ubuntu 16
View tensorflow_opencv_ubuntu_deps.sh.txt
#!/bin/bash
# Don't require you to constantly enter password for sudo:
sudo visudo
# In the bottom of the file, paste the following (without the `#`):
# paperspace ALL=(ALL) NOPASSWD: ALL
# Then press `ctl+o` then `enter` to save your changes, and `ctr+x` to exit nano
# Allow connection from your IP to any port- default seems to be just 22 (ssh)
You can’t perform that action at this time.