Skip to content

Instantly share code, notes, and snippets.

@Daviey
Daviey / gist:e16bcb6ad68a7936e4fa8297903f3e28
Last active October 2, 2022 16:45
Exploit code for "Mind Calculator"
#!/usr/bin/python3
import os
import base64
import time
import speech_recognition as sr
from selenium import webdriver
from selenium.webdriver.support.ui import WebDriverWait
@Daviey
Daviey / SimpleHTTPServerWithUpload.py
Created January 6, 2018 14:22 — forked from touilleMan/SimpleHTTPServerWithUpload.py
Simple Python Http Server with Upload - Python3 version
#!/usr/bin/env python3
"""Simple HTTP Server With Upload.
This module builds on BaseHTTPServer by implementing the standard GET
and HEAD requests in a fairly straightforward manner.
see: https://gist.github.com/UniIsland/3346170
"""
@Daviey
Daviey / evilcat.go
Created May 26, 2020 20:42
evil cat
package main
import (
"io"
"log"
"os"
"strings"
)
func readWrite(src io.Reader, dst io.Writer) {
import paramiko
import socket
import sys
nbytes = 4096
hostname = "127.0.0.1"
port = 2222
sock = socket.socket()
try:

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

@Daviey
Daviey / github_bugbountyhunting.md
Created October 7, 2017 08:38 — forked from EdOverflow/github_bugbountyhunting.md
My tips for finding security issues in GitHub projects.

GitHub for Bug Bounty Hunters

GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.

Mass Cloning

You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.

$ python githubcloner.py --org organization -o /tmp/output
~ aws_security_group.vpc-6cc8710b-ActiveDirectoryDMZSecurityGroups-SGUSE1SDZAD01-1KD80WPW2KD57
ingress.1997339319.from_port: "" => "49152"
ingress.1997339319.protocol: "" => "udp"
ingress.1997339319.self: "" => "false"
ingress.1997339319.to_port: "" => "65535"
ingress.2357930955.from_port: "" => "464"
ingress.2357930955.protocol: "" => "udp"
ingress.2357930955.self: "" => "false"
ingress.2357930955.to_port: "" => "464"
ingress.4239391808.from_port: "" => "49152"
$ sudo docker push 127.0.0.1:5000/junk/data
The push refers to a repository [127.0.0.1:5000/junk/data]
e23aaf36be54: Retrying in 1 second
ff095ced7068: Retrying in 1 second
9abe2bd17d05: Retrying in 1 second
9f8566ee5135: Retrying in 1 second
read tcp 127.0.0.1:40868->127.0.0.1:5000: read: connection reset by peer

Keybase proof

I hereby claim:

  • I am daviey on github.
  • I am daviey (https://keybase.io/daviey) on keybase.
  • I have a public key ASDuM1x_RJk2n70EZ2p-7R3mGBCPq4Y8nS6Xx0RJtrkm2wo

To claim this, I am signing this object:

@Daviey
Daviey / db.py
Created February 20, 2017 16:01
#!/usr/bin/python
import sys
from oslo.config import cfg
from sqlalchemy import create_engine
cfg_file = "/etc/nova/nova.conf"