Skip to content

Instantly share code, notes, and snippets.

View FrankSpierings's full-sized avatar

Frank Spierings FrankSpierings

View GitHub Profile
#Thank you Bouncy Castle.
#Slight code modifications compared to the original C# code.
$source = @"
using System;
using System.Diagnostics;
using Org.BouncyCastle.Utilities;
namespace Org.BouncyCastle.Crypto.Digests
{
$source = @"
/*
* This implementation of Salsa20 is ported from the reference implementation
* by D. J. Bernstein, which can be found at:
* http://cr.yp.to/snuffle/salsa20/ref/salsa20.c
*
* This work is hereby released into the Public Domain. To view a copy of the public domain dedication,
* visit http://creativecommons.org/licenses/publicdomain/ or send a letter to
* Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.
*/
function parse()
{
param(
[Object[]]$SetSPNOutput
)
function New-Item()
{
return $Item = New-Object PSObject -Property @{
Name = ''
from burp import IBurpExtender
from burp import IHttpListener
_bearer = dict()
_AUTHORIZATION_HEADER = 'Authorization: Bearer'
class BurpExtender(IBurpExtender, IHttpListener):
def registerExtenderCallbacks(self, callbacks):
self._callbacks = callbacks
self._helpers = callbacks.getHelpers()
import struct
import ctypes
import random
MIN = 0x20
MAX = 0x7f
def process_bytes(b):
val = [0] *3
if (b >= 0x23) and (b <= 0x82):
@FrankSpierings
FrankSpierings / qemu-system-raspberry.sh
Last active October 15, 2022 12:32
Run Raspberry Pi in qemu-system-arm using versatilepb 'hardware'
#!/bin/sh
#https://github.com/dhruvvyas90/qemu-rpi-kernel/raw/master/kernel-qemu-4.4.13-jessie
KERNEL=kernel-qemu-4.4.13-jessie
#https://downloads.raspberrypi.org/raspbian_lite_latest + https://github.com/dhruvvyas90/qemu-rpi-kernel/wiki/Emulating-Jessie-image-with-4.x.xx-kernel
IMAGE=2016-05-27-raspbian-jessie-lite.img
export QEMU_AUDIO_DRV="none"
qemu-system-arm -kernel ${KERNEL} \
-cpu arm1176 \
-m 256 \
-M versatilepb \
@FrankSpierings
FrankSpierings / wireshark-2.0-sap.build.sh
Last active October 10, 2016 07:38
Wireshark 2.0 master + SAP dissector
#!/bin/bash
mkdir wireshark-sap
cd wireshark-sap
git clone https://github.com/CoreSecurity/SAP-Dissection-plug-in-for-Wireshark.git
mkdir wireshark-master-2.0
cd wireshark-master-2.0
git init
git remote add -t master-2.0 -f origin https://github.com/wireshark/wireshark.git
# https://gallery.technet.microsoft.com/scriptcenter/PowerShellAccessControl-d3be7b83#
Import-Module PowerShellAccessControl
# Find files/dirs recursive | grab their ACL | Special effective perms module, grab all rights for our user | select only objects with write perms | show the path to the object
gci -Recurse c:\ | Get-Acl | Get-EffectiveAccess -ListAllRights -Principal $Env:USERNAME |? {($_.Permission -eq 'Write')} |% {$_.DisplayName}
@FrankSpierings
FrankSpierings / README.md
Last active January 20, 2024 20:45
Linux Container Escapes and Hardening
import string
from math import sqrt; from itertools import count, islice
def isPrime(n):
return n > 1 and all(n%i for i in islice(count(2), int(sqrt(n)-1)))
orgname = input('Give me a name:')
name = orgname.lower()
name = name.replace(' ','')