Skip to content

Instantly share code, notes, and snippets.

@arbu
arbu / parser.hs
Last active February 2, 2016 23:15 — forked from anonymous/parser.hs
import Data.List
data Formula = Atom String | Unary String Formula | Binary String Formula Formula
instance Show Formula where
show (Atom name) = name
show (Unary op remaining) = op ++ " " ++ (show remaining)
show (Binary op left right) = "(" ++ (show left) ++ " " ++ op ++ " " ++ (show right) ++ ")"
unaries = ["-"]
@arbu
arbu / jd2_accounts.py
Created February 18, 2017 17:37
List account informations for JDownloader2
#! /usr/bin/env python3
import os.path, json
from Crypto.Cipher import AES
ACCOUNTS_KEY = b'\x01\x06\x04\x05\x02\x07\x04\x03\x0c=\x0eK\xfe\xf9\xd4!'
def decrypt_ejs(ejs, key):
if hasattr(ejs, "read"):
ejs = ejs.read()

Keybase proof

I hereby claim:

  • I am arbu on github.
  • I am arbu (https://keybase.io/arbu) on keybase.
  • I have a public key ASCBcdsWrJxwy6GjSVUh219S3_uA8Qu6B9WZDKsnsgswKwo

To claim this, I am signing this object:

How to intercept all SSL connections from an Android x86 VM

This guide shows how to setup an Android VM in order to intercept all HTTPS requests. This was originally intended to reverse PlayServices but should work with any app that does not use certificate pinning (i.e. every app that relies on the system certificate authorities).

Inspired by this guide how to install Android x86 in VirtualBox, this guide how to install a system certificate on Android and this guide how to use mitmproxy with VirtualBox.

  1. Download a recent Android x86 ISO from here.

  2. Download a recent Kali Linux VirtualBox Image from here. (You can also use an