Skip to content

Instantly share code, notes, and snippets.

View adeptex's full-sized avatar
😎
I'll be back

Artëm Tsvetkov adeptex

😎
I'll be back
View GitHub Profile
@adeptex
adeptex / malloc_chunk.c
Last active October 12, 2018 21:51
malloc_chunk
struct malloc_chunk {
INTERNAL_SIZE_T prev_size; /* Size of previous chunk (if free). */
INTERNAL_SIZE_T size; /* Size in bytes, including overhead. */
struct malloc_chunk * fd; /* double links -- used only if free. */
struct malloc_chunk * bk;
/* Only used for large blocks: pointer to next larger size. */
struct malloc_chunk * fd_nextsize; /* double links -- used only if free. */
@adeptex
adeptex / openvas_to_csv_report.py
Created June 4, 2019 20:00
Save Greenbone web report of vulns as local HTML and use this script to convert it to CSV!
from sys import argv
from bs4 import BeautifulSoup as BS
from re import sub
def format(text):
ret = sub(r'[\n\t ]+', ' ', text)
ret = ret.strip()
return ret
with open(argv[1]) as f:
@adeptex
adeptex / smtpd.py
Last active September 11, 2019 18:22
Receive email with Python
sudo python -m smtpd -d -c DebuggingServer -n 0.0.0.0:25
@adeptex
adeptex / PwnedPasswords.md
Created August 22, 2021 02:18 — forked from simbo1905/PwnedPasswords.md
How To Load The HIBP Pwned Passwords Database Into Redis

How To Load The HIBP Pwned Passwords Database Into Redis

NIST recommends that when users are trying to set a password you should reject those that are commonly used or compromised:

When processing requests to establish and change memorized secrets, 
verifiers SHALL compare the prospective secrets against a list that 
contains values known to be commonly-used, expected, or compromised.

But how do you know what are the compromised passwords? Luckily Troy Hunter put a lot of effort into building the "Have I Been Pwned (HIBP)" database with the SHA1 hashes of 501,636,842 passwords that have been compromised on the internet. Sweet.

@adeptex
adeptex / scanio.sh
Created February 10, 2022 22:55 — forked from haccer/scanio.sh
PoC script to mass-locate vulnerable subdomains using results from Rapid7's Project Sonar
#!/bin/bash
# Usage : ./scanio.sh <save file>
# Example: ./scanio.sh cname_list.txt
# Premium
function ech() {
spinner=( "|" "/" "-" "\\" )
while true; do
for i in ${spinner[@]}; do
echo -ne "\r[$i] $1"