Random musings from a 3 AM brain spin. Likely a very stupid idea :)
- create a list of files to lock
- randomize the list order
- generate a random 8 bit ascii hex string to use as an IV
package main | |
/* | |
Example Go program with multiple .NET Binaries embedded | |
This requires packr (https://github.com/gobuffalo/packr) and the utility. Install with: | |
$ go get -u github.com/gobuffalo/packr/packr | |
Place all your EXEs are in a "binaries" folder |
''' | |
parse SavedState artifacts extracted from OSX. | |
author: Willi Ballenthin (william.ballenthin@fireeye.com) | |
license: Apache 2.0 | |
''' | |
import re | |
import sys | |
import json | |
import struct |
#!/usr/bin/env python2.7 | |
import argparse | |
import binascii | |
import sys | |
import base64 | |
import hashlib | |
from Crypto.Cipher import AES | |
from pkcs7 import PKCS7Encoder | |
import random | |
from random import randint |
#!/usr/bin/env python3 | |
''' | |
bling.py - extract keys from macOS keychains. | |
installation: | |
pip install pytz hexdump vivisect-vstruct-wb tabulate argparse pycryptodome | |
usage: | |
python bling.py /path/to/keychain-db <password> ./path/to/output/directory |
// Tracking cursor position in real-time without JavaScript | |
// Demo: https://twitter.com/davywtf/status/1124146339259002881 | |
package main | |
import ( | |
"fmt" | |
"net/http" | |
"strings" | |
) |
''' | |
parse osx sticky databases. | |
author: Willi Ballenthin <william.ballenthin@fireeye.com> | |
license: Apache 2.0 | |
usage: | |
$ python extract_stickies.py /path/to/input.bin /path/to/output/directory/ | |
''' |
package main | |
import ( | |
"io/ioutil" | |
"os" | |
"os/exec" | |
"strconv" | |
"syscall" |
package main | |
/* | |
* | |
* This is just a Go implementation of https://github.com/monoxgas/sRDI/ | |
* Useful if you're trying to generate shellcode for reflective DLL | |
* injection in Go, otherwise probably not much use :) | |
* | |
* The project, shellcode, most comments within this project | |
* are all from the original project by @SilentBreakSec's Nick Landers (@monoxgas) |
# These keyword values can be obtained with: logman query providers Microsoft-Windows-Kernel-Registry | |
[Flags()] | |
enum RegistryOptions { | |
CloseKey = 0x00000001 | |
QuerySecurityKey = 0x00000002 | |
SetSecurityKey = 0x00000004 | |
EnumerateValueKey = 0x00000010 | |
QueryMultipleValueKey = 0x00000020 | |
SetInformationKey = 0x00000040 | |
FlushKey = 0x00000080 |