Skip to content

Instantly share code, notes, and snippets.

Michael Gillespie Demonslay335

  • Facet Technologies, Inc.
  • United States
Block or report user

Report or block Demonslay335

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@Neo23x0
Neo23x0 / nmap-cmdline
Last active Apr 23, 2019
Nmap Scan Params for CVE-2017-0143 MS17-010 Scanning
View nmap-cmdline
# Scan for CVE-2017-0143 MS17-010
# The vulnerability used by WannaCry Ransomware
#
# 1. Use @calderpwn's script
# http://seclists.org/nmap-dev/2017/q2/79
#
# 2. Save it to Nmap NSE script directory
# Linux - /usr/share/nmap/scripts/ or /usr/local/share/nmap/scripts/
# OSX - /opt/local/share/nmap/scripts/
#
@hasherezade
hasherezade / aes_crypt.cpp
Last active Oct 15, 2019
AES 128 - encrypt/decrypt using Windows Crypto API
View aes_crypt.cpp
#include <Windows.h>
#include <wincrypt.h>
#include <stdio.h>
#pragma comment(lib, "crypt32.lib")
#define AES_KEY_SIZE 16
#define CHUNK_SIZE (AES_KEY_SIZE*3) // an output buffer must be a multiple of the key size
//params: <input file> <output file> <is decrypt mode> <key>
int wmain( int argc, wchar_t *argv[])
@bitbeans
bitbeans / Pkcs7.cs
Last active Jul 19, 2019
PKCS7 padding in C#
View Pkcs7.cs
/// <summary>
/// Removes the Pkcs7 padding of an array.
/// </summary>
/// <param name="paddedByteArray">The padded array.</param>
/// <returns>The unpadded array.</returns>
/// <exception cref="OverflowException"></exception>
/// <exception cref="ArgumentOutOfRangeException"></exception>
/// <exception cref="ArgumentException"></exception>
/// <exception cref="ArgumentNullException"></exception>
public static byte[] RemovePkcs7Padding(byte[] paddedByteArray)
@natmchugh
natmchugh / sha1.php
Last active Aug 10, 2018
Pure PHP implementation of SHA1from wikipedia pseudo code
View sha1.php
<?php
/*
Note 1: All variables are unsigned 32 bits and wrap modulo 232 when calculating, except
ml the message length which is 64 bits, and
hh the message digest which is 160 bits.
Note 2: All constants in this pseudo code are in big endian.
Within each word, the most significant byte is stored in the leftmost byte position
*/
@caspencer
caspencer / OpenSslCompatDeriveBytes.cs
Created Nov 4, 2011
Derives a key from a password using an OpenSSL-compatible version of the PBKDF1 algorithm.
View OpenSslCompatDeriveBytes.cs
using System;
using System.Collections.Generic;
using System.Security.Cryptography;
using System.Text;
namespace OpenSslCompat
{
/// <summary>
/// Derives a key from a password using an OpenSSL-compatible version of the PBKDF1 algorithm.
/// </summary>
You can’t perform that action at this time.