Skip to content

Instantly share code, notes, and snippets.

View FrankSpierings's full-sized avatar

Frank Spierings FrankSpierings

View GitHub Profile
@FrankSpierings
FrankSpierings / index.html
Created May 9, 2025 07:19
Playing with Transformers detection
<!DOCTYPE html>
<html>
<head>
<title>Webcam Detection</title>
<style>
body {
margin: 0;
}
#container {
@FrankSpierings
FrankSpierings / hookalloverloads.js
Created October 14, 2017 18:57
Hook all overloads - Java/Android - Frida
function getGenericInterceptor(className, func, parameters) {
args = []
for (i = 0; i < parameters.length; i++) {
args.push('arg_' + i)
}
var script = "result = this.__FUNCNAME__(__SEPARATED_ARG_NAMES__);\nlogmessage = '__CLASSNAME__.__FUNCNAME__(' + __SEPARATED_ARG_NAMES__ + ') => ' + result;\nconsole.log(logmessage);\nreturn result;"
script = script.replace(/__FUNCNAME__/g, func);
script = script.replace(/__SEPARATED_ARG_NAMES__/g, args.join(', '));
script = script.replace(/__CLASSNAME__/g, className);
@FrankSpierings
FrankSpierings / shell.js
Last active March 4, 2025 22:23
Frida - Linux Shell From App Perspective (Tested on 32-bit...)
libc = {
library: 'libc.so',
system: function(command) {
f = new NativeFunction(Module.findExportByName(this.library, "system"), 'int32', ['pointer']);
retval = f(Memory.allocUtf8String(command));
return retval;
},
open: function(path, mode) {
f = new NativeFunction(Module.findExportByName(this.library, "open"), 'int32', ['pointer', 'int32']);
@FrankSpierings
FrankSpierings / openssl-frida.js
Last active March 4, 2025 22:22
Some OpenSSL hooks in Frida - Work in progress....
const utils = {
colors: {
red: function(string) {
return '\x1b[31m' + string + '\x1b[0m';
},
green: function(string) {
return '\x1b[32m' + string + '\x1b[0m';
},
@FrankSpierings
FrankSpierings / lab-request-smuggling-h2-request-splitting-via-crlf-injection-solution.py
Created July 21, 2022 07:22
Python3 solution to Portswigger's Lab; HTTP/2 request splitting via CRLF injection
# Thanks to h2 for the example code and thanks to Portswigger for the awesome free labs!
# - https://python-hyper.org/projects/h2/en/stable/plain-sockets-example.html
# - https://portswigger.net/web-security/request-smuggling/advanced/lab-request-smuggling-h2-request-splitting-via-crlf-injection
#
import socket
import ssl
import h2.connection
import h2.events
@FrankSpierings
FrankSpierings / README.md
Last active February 20, 2025 10:48
Linux Container Escapes and Hardening
@FrankSpierings
FrankSpierings / README.MD
Last active February 7, 2025 03:40
Apple Device Enrollment Program (DEP) - ByPass MDM Policy using Checkra1n exploit

Pre-requirements

  • Install a socket daemon to multiplex connections from and to iOS devices, run: brew install usbmuxd
  • Start the socket daemon iproxy 2222 44
  • Install checkra1n exploit locally, run: brew install checkra1n
  • When SSH password authentication is requested, use: alpline.

Wipe iPad and restore Firmware

@FrankSpierings
FrankSpierings / qemu-system-raspberry.sh
Last active January 31, 2025 12:33
Run Raspberry Pi in qemu-system-arm using versatilepb 'hardware'
#!/bin/sh
#https://github.com/dhruvvyas90/qemu-rpi-kernel/raw/master/kernel-qemu-4.4.13-jessie
KERNEL=kernel-qemu-4.4.13-jessie
#https://downloads.raspberrypi.org/raspbian_lite_latest + https://github.com/dhruvvyas90/qemu-rpi-kernel/wiki/Emulating-Jessie-image-with-4.x.xx-kernel
IMAGE=2016-05-27-raspbian-jessie-lite.img
export QEMU_AUDIO_DRV="none"
qemu-system-arm -kernel ${KERNEL} \
-cpu arm1176 \
-m 256 \
-M versatilepb \
@FrankSpierings
FrankSpierings / BurpCAMagiskRooted.md
Created July 25, 2022 10:08
Install Burp CA Certificate on Magisk Rooted Device

Magisk Module

  • Use the modified Magisk module to install the certificate in both the user and the system store.
git clone https://github.com/Magisk-Modules-Repo/movecert.git
@FrankSpierings
FrankSpierings / README-yubikey-linux.md
Last active January 19, 2025 19:30
Yubikey - Ubuntu

Requirements

sudo apt update -y
sudo apt install -y yubikey-manager

Unlock LUKS boot