Skip to content

Instantly share code, notes, and snippets.

Shadow0ps Shadow0ps

Block or report user

Report or block Shadow0ps

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View keybase proof
### Keybase proof
I hereby claim:
* I am wethinjp on github.
* I am shadow0ps (https://keybase.io/shadow0ps) on keybase.
* I have a public key whose fingerprint is 1B65 0E95 76F5 AE77 8859 FCE3 11FB A5F6 77A4 6AFA
To claim this, I am signing this object:
View InnoculatePetya.ps1
if (!(Test-Path "C:\Windows\perfc"))
{
New-Item -path C:\Windows -name perfc -type "file" -value "Inoculated"
Write-Host "System Inoculated"
}
else
{
Write-Host "File already exists! Your system may be infected."
}
@Shadow0ps
Shadow0ps / InnoculatePetya.ps1
Created Jun 27, 2017
This will create a file called perfc in the C:\Windows directory. Petya/Goldeneye looks for this file and if it exists it terminates the program.
View InnoculatePetya.ps1
if (!(Test-Path "C:\Windows\perfc"))
{
New-Item -path C:\Windows -name perfc -type "file" -value "Inoculated"
Write-Host "System Inoculated"
}
else
{
Write-Host "File already exists! Your system may be infected."
}
View keybase.md

Keybase proof

I hereby claim:

  • I am Shadow0ps on github.
  • I am shadow0ps (https://keybase.io/shadow0ps) on keybase.
  • I have a public key whose fingerprint is 1B65 0E95 76F5 AE77 8859 FCE3 11FB A5F6 77A4 6AFA

To claim this, I am signing this object:

@Shadow0ps
Shadow0ps / OpenSSL RSA encryption sample
Created Nov 27, 2017 — forked from superwills/OpenSSL RSA encryption sample
Base64 encoding and RSA encryption sample
View OpenSSL RSA encryption sample
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <ctype.h>
#include <openssl/rsa.h>
#include <openssl/engine.h>
#include <openssl/pem.h>
// I'm not using BIO for base64 encoding/decoding. It is difficult to use.
// Using superwills' Nibble And A Half instead
View gw-gravity-forms-advanced-conditional-logic.php
<?php
/**
* Gravity Wiz // Gravity Forms // Advanced Conditional Logic
*
* PLEASE NOTE: This snippet is a proof-of-concept. It is not supported and we have no plans to improve it.
*
* Allows multiple groups of conditional logic per field.
*
* @version 0.1
* @author David Smith <david@gravitywiz.com>
@Shadow0ps
Shadow0ps / gravity-form.php
Created Apr 14, 2018 — forked from wkw/gravity-form.php
Custom: Gravity Forms WP API Submission and GF API form entry creation plus send notifications
View gravity-form.php
<?php
/**
* Add WP API endpoint for form submission, then create new
* Gravity Forms entry and send notifications.
*/
// rest api endpoint for forms submission
add_action( 'rest_api_init', function () {
register_rest_route( 'ahr/v1', '/forms', array(
'methods' => 'POST',
View AFI-R Boot Log.txt
ath>
ath> ?
? - alias for 'help'
base - print or set address offset
boot - boot default, i.e., run 'bootcmd'
bootd - boot default, i.e., run 'bootcmd'
bootm - boot application image from memory
bootp - boot image via network using BootP/TFTP protocol
chpart - change active partition
cmp - memory compare
@Shadow0ps
Shadow0ps / alexa.sh
Created Jun 29, 2018 — forked from haccer/alexa.sh
Gather domains in the Alexa top 1 million
View alexa.sh
#!/bin/bash
# This script will fetch the Alexa top 1 million domains and prepare them how I like it.
# Check if unzip is installed
[ -f /usr/bin/unzip ] || sudo apt-get install unzip
# Get Alexa Top 1 mil
wget -q --show-progress http://s3.amazonaws.com/alexa-static/top-1m.csv.zip
# Unzip
@Shadow0ps
Shadow0ps / alexa.sh
Created Jun 29, 2018 — forked from haccer/alexa.sh
Gather domains in the Alexa top 1 million
View alexa.sh
#!/bin/bash
# This script will fetch the Alexa top 1 million domains and prepare them how I like it.
# Check if unzip is installed
[ -f /usr/bin/unzip ] || sudo apt-get install unzip
# Get Alexa Top 1 mil
wget -q --show-progress http://s3.amazonaws.com/alexa-static/top-1m.csv.zip
# Unzip
You can’t perform that action at this time.