Skip to content

Instantly share code, notes, and snippets.

#!/bin/bash
# Requires the following: dd, tr, sed, mktemp, openssl, perl (sadly gzip CLI can not operate on raw zlib data and most OpenSSL distros do not include zlib)
# However even git for windows (MSysGit) includes enough perl to make it fly :)
IV='B380E17A0C476E8A480B55253ABAE666'
KEY='DD1FBB7596D0D58BBF336ABA391366ED3ED7460849BB9EFAB9649C999863BF25'
ENCRYPT=1
#!/tmp/busybox/sh
TLANPREFIX="$(grep 'prefix' /var/radvd/radvdbr0.conf | sed 's/ *prefix *//' | tr -d ' \r\n' | sed 's/:0*/:/g')"
FULLPREFIX="$(echo "$TLANPREFIX" | sed -r 's~\w\w:\w+:\w+:\w+:\w+/64~~')"
TLANPREFIX="$(echo "$TLANPREFIX" | sed -r 's~\w+:\w+:\w+:\w+/64~:/64~')"
# Use only a part of the full /56 to make sure dibbler cannot delegate the prefix the router wishes to use
TLANPREFIX_FIRST="$(echo "$TLANPREFIX" | sed -r 's~.*(\w)::/64~\1~')"
if [ "$TLANPREFIX_FIRST" == "4" ]; then
#include "z3++.h"
#include <random>
using namespace z3;
using namespace std;
int _main() {
context ctx;
expr c = ctx.bv_const("c", 32);
//expr m = ctx.int_const("m");
from scapy.all import *
import json
Ether.payload_guess = [({"type": 0x800}, IP)]
IP.payload_guess = [({"frag": 0, "proto": 0x06}, TCP)]
TCP.payload_guess = [({"dport": 6379}, Raw), ({"sport": 6379}, Raw)]
INSTANT_READY = True
def sniffOpen():
return PcapReader("big.pcap")
#!/bin/sh
set -eu
make_aten_header() {
printf 'ATEN\1\0'
}
run_aes() {
openssl aes-256-cbc "$1" -in "$2" -out "$3" -k CKSAM1SUCKSAM1SUASMUCIKSASMUCIKS -md md5
hashcat (v6.1.1) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
* Device #1: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
@Doridian
Doridian / ppp_connect.py
Last active January 6, 2021 05:21
ppp_connect.py
#!/usr/bin/python
import sys, tty, termios
#fh = open('/tmp/chatlog', 'a')
tty.setraw(sys.stdin.fileno())
str = ''
while True:
supernet = {}
if SERVER then
AddCSLuaFile()
util.AddNetworkString("SuperNet_MSG")
end
local table = table
local net = net
local util = util
export SSH_AUTH_SOCK=$HOME/.ssh/agent.sock
ss -a | grep -q $SSH_AUTH_SOCK
if [ $? -ne 0 ]; then
rm -f $SSH_AUTH_SOCK
( setsid socat UNIX-LISTEN:$SSH_AUTH_SOCK,fork EXEC:"$HOME/.ssh/npiperelay.exe -ei -s //./pipe/openssh-ssh-agent",nofork & ) >/dev/null 2>&1
fi
cd /D %~dp0
cd C:\KeePassUnlocker
ProtectedLauncher.exe