Skip to content

Instantly share code, notes, and snippets.

Max Kaplan CapCap

  • San Francisco, CA
Block or report user

Report or block CapCap

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
CapCap / malware.html.js
Created Feb 28, 2012 — forked from scottschiller/malware.html
Browser malware found in the wild, 02/28/2012, deobf version
View malware.html.js
/* Hello from (coming soon),
I've done some security work in the past and figured this would be a fun and quick puzzle, I found the same hash as scott on and googling it led to his post :)
it tries to identify browser/os version, and possibly run a wmp exp
It also tries to visit and and download+exec, two different exes
It tries a pdf exploit ( and also and ? f = b6863 ), and hcp exploit as well ( ), and some pdf exploit
This is all part of the blackhole exploit kit, and this botnet is seemingly Huge!
CapCap / gist:2353326
Created Apr 10, 2012
MYSQL dump of reverse engineered database for phpFormGenerator 3.0beta. Use at your own risk :-)
View gist:2353326
-- Made by the coding ninjas at Upgrade, LLC:
-- Are YOU ready for an Upgrade?
-- phpMyAdmin SQL Dump
-- Generation Time: Apr 10, 2012 at 06:05 PM
-- Server version: 5.5.20
-- PHP Version: 5.4.0
SET time_zone = "+00:00";
CapCap /
Last active Sep 28, 2017
Paperspace tensorflow+opencv setup for both python2 and python3 on ubuntu 16
# Don't require you to constantly enter password for sudo:
sudo visudo
# In the bottom of the file, paste the following (without the `#`):
# paperspace ALL=(ALL) NOPASSWD: ALL
# Then press `ctl+o` then `enter` to save your changes, and `ctr+x` to exit nano
# Allow connection from your IP to any port- default seems to be just 22 (ssh)
You can’t perform that action at this time.