I hereby claim:
- I am PaulSec on github.
- I am paulsec (https://keybase.io/paulsec) on keybase.
- I have a public key whose fingerprint is 37C2 C83D 124B 2688 7B62 7DA4 B4A6 F863 A65E 7C08
To claim this, I am signing this object:
import requests | |
import json | |
req = requests.get('https://what-hash-is-it.herokuapp.com/API/hash/098f6bcd4621d373cade4e832627b4f6') | |
data = json.loads(req.content) | |
if (len(data) > 0): | |
print data | |
else: | |
print "[-] No result found for this hash." |
I hereby claim:
To claim this, I am signing this object:
#!/bin/sh | |
# check that 7z is installed | |
command -v 7z >/dev/null 2>&1 || { echo >&2 "This script requires 7z. Aborting."; exit 1; } | |
jdgui="/path/to/jd-gui" | |
startmenu="/path/to/DroidBox_4.1.1/startemu.sh" | |
dex2jar="/path/to/dex2jar-0.0.9.15/d2j-dex2jar.sh" | |
if [ $# -eq 0 ] |
To do so: | |
1. Export your Burp Certificate | |
Proxy > Options > CA Certificate > Export in DER format | |
2. Convert it to PEM | |
openssl x509 -inform der -in cacert.der -out burp.pem | |
3. Download it on the device |
#keytool -genkey -v -keystore my-release-key.keystore -alias alias_name -keyalg RSA -keysize 2048 -validity 10000 | |
apktool d -s src/ING.apk -o src/ING/ -f | |
java -jar ./tools/baksmali-2.0.2.jar src/ING/classes.dex -o src/out/ | |
# ==== here patch dex file ==== | |
TEL1="+80000000001" | |
TEL2="+80000000002" | |
TEL_BACK="+80000000003" | |
HOST1="127.0.0.1" | |
HOST2="127.0.0.1" | |
ID_BOT="500" |
from Crypto.Cipher import AES | |
secret_key = "1122456789abcdef" | |
iv = "1122456789abcdef" | |
mode = AES.MODE_CBC | |
ciphers = ["9901a4037eae3008a99a0d42ee1d84d2", "524913a771bd29a4f4547f08c844b33a", "d3a1d39c993b6824212fba3f4aa50865", "6f95f17e43914c85ccf2f2370962aee899398b6cbf6d25ef97a71d4a9ec2dabb057871e5c3fdf2921a40801ce58d44fd", "282aadd640e6b03b1633fa698ecb958bb2bdbe545a06373aaa96c15b6a57fd3bfe29bc21e7b22cd718b118ad48f47308", "579ebf44d3fcf24fed05cd51a8952680", "1181dad1a14cd6323ecb89d2cd06d08a5c7dcd3bd66233f2859d2ec23834501e", "282aadd640e6b03b1633fa698ecb958b4705ee49d44709f62b82dbda708e296b"] | |
for c in text: | |
decryptor = AES.new(secret_key, mode, IV=iv) |
import sys | |
s = sys.argv[1].decode('unicode-escape') | |
key = [int(i) for i in sys.argv[2].split(',')] | |
index, res = 0, "" | |
for char in list(s): | |
res += chr(ord(char) ^ key[index]) | |
index = (index + 1) % 5 | |
print ''.join(res) |
var http = require('http'), | |
path = require('path'), | |
fs = require('fs'); | |
http.createServer(function(req, res) { | |
filename = './cacert.crt' | |
path.exists(filename, function(exists) { | |
res.writeHead(200, {'Content-disposition': 'attachment; filename=cacert.crt', 'Content-Type': 'text/plain'}); | |
var fileStream = fs.createReadStream(filename); | |
fileStream.pipe(res); |
#!/bin/python | |
import requests | |
import threading | |
import os | |
API_KEY = "XXXXXXXXXXXXXXXXX" | |
QUERY = "port:5900 authentication" | |
class VNCSnapshot(threading.Thread): |
#!/usr/bin/env python | |
import ctypes, re, sys | |
## Partial interface to ptrace(2), only for PTRACE_ATTACH and PTRACE_DETACH. | |
c_ptrace = ctypes.CDLL("libc.so.6").ptrace | |
c_pid_t = ctypes.c_int32 # This assumes pid_t is int32_t | |
c_ptrace.argtypes = [ctypes.c_int, c_pid_t, ctypes.c_void_p, ctypes.c_void_p] | |
def ptrace(attach, pid): |