Skip to content

Instantly share code, notes, and snippets.

Adric Net adricnet

Block or report user

Report or block adricnet

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
adricnet /
Created Nov 1, 2019
Minimally customize a Kali ISO for moar package goodness
root@kali:~/Desktop/live-build-config# cat kali-config/variant-light-voltron/package-lists/kali.list.chroot 
# You always want those

# Kali applications
# You can customize the set of Kali metapackages (groups of tools) to install
adricnet /
Last active Oct 15, 2019
Conference talks I missed live, watching videos
adricnet /
Last active Apr 12, 2018
Cuckoo 2 python 2.7 32bit on Win x64

Some obstacles overcome to get a Cuckoo 2 sandbox going on the class laptop: Win10x64 Pro. This is just my notes and rambling and intent is to write up a working build in case someone else in 610 or the community wants it.


Upstream installation instructions, might give harmless cert error:


adricnet /
Last active Mar 22, 2018
Proof of obtaining flag? Metasploitable 3's Joker card

The live demo attempt method (FileInsight):

  1. Use web developer tools or Burp to capture source of index page. (Ctrl-A, Ctrl-C)

  2. Paste that HTML into a new buffer in FileInsight.

  3. Trim away everything but the suspicious bitstream.

  4. Select the bitstream (Ctrl-A) and use the Decode tools in the left pane to convert Hex to ASCII (no key).


Theme: Learn to Attack


  • Purple is a lovely colour
  • Lose less at CTFs
  • Get another security certification

Why (srsly)



  1. GSE (done)
  2. SOC Summit workshops
  3. MGT517 SecOps Design and Operation
  4. Security Onion Con / B-Sides Augusta
  5. Investigation Theory (AND)
  6. FOR572 self-study (4A)
  7. DataCamp: Python Data Science ( 7 of 20 )
adricnet /
Last active Jun 22, 2017
Spring Cloud Lab Experiment Results

In which we derive some lessons from the now decommisioned lab resources recently experimented with


  • an Amazon Workspace with Windows and Office, rented for a month
  • a Droplet with Docker, running an infosec app of interest, for a couple months
  • Chromebook as client to all

Test tasks

adricnet /
Last active Mar 13, 2018
dexray testing
adricnet /
Last active Mar 16, 2017
Fun stuff from #investigationtheory class. Get these to work and then share. Save time, reduce dangerous typos.

##Fun stuff from ITTAM class. Get these to work and then share. Save time, reduce dangerous typos.

alias safe="pbpaste| sed -e 's,http,hXXp,g' -e 's,\.,[.],g' | pbcopy; echo 'URLs broken!'" 
alias unsafe="pbpaste| sed -e 's,hXXp,http,g' -e 's,\[\.\],.,g' | pbcopy; echo 'URLs restored!'" 

alias unb64="pbpaste | base64 -D"

alias infected="7z -pinfected a infected.7z"

Created a portproxy with netsh on archie, Win10 x64 to send traffic out to another host,port. Tested with netcat chat. Also made one in the seven VM, and the dumped memory variously.

netsh>add v4tov4 listenport=3333 connectaddress= connectport=8888 listenaddress=

PS C:\malware> netsh interface portproxy show all

Listen on ipv4:             Connect to ipv4:
You can’t perform that action at this time.