I hereby claim:
- I am atucom on github.
- I am atucom (https://keybase.io/atucom) on keybase.
- I have a public key whose fingerprint is 84A0 48A0 922C 3138 F79A 26F3 89A6 2F29 E898 B7FA
To claim this, I am signing this object:
#!/usr/bin/env ruby | |
#the wiegand data format is just 26 bits, | |
# even_parity_bit + 8bit_facility_code + 16bit_badge_code + odd_parity_bit | |
# The proxcard II format expects the 26bit part appended to the "magic" | |
#magic is really the OEM, plus card type, which i've locked to the magic var | |
# below for my purposes. Change it to match yoursjuu | |
def generate_44bit_hex(bin) | |
chopped = bin.chars.each_slice(4).map(&:join) | |
hex_string = "" |
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env ruby | |
#@atucom | |
#http://www.w1hkj.com/FldigiHelp-3.21/html/xmlrpc_control_page.html | |
require "xmlrpc/client" | |
server = XMLRPC::Client.new( "192.168.50.189", "/", port=7362) | |
result = server.call("text.add_tx","Test123") #add Test123 to tx widget | |
result = server.call("main.tx") #tx the text |
#!/usr/bin/env ruby | |
#Fingerprints SecureWorks DCEPT | |
#@atucom | |
require 'net/http' | |
require 'json' | |
if ARGV.empty? | |
puts "Fingerprints destination HTTP service for DCEPT" | |
puts "\t Usage: #{$0} IP[:port] " |
#!/usr/bin/python | |
#stolen and modified from the reddit post about the raspbeery pi tweeting at comcast | |
#run this every 10 minutes (or w/e) with cron: | |
#"crontab -e" | |
#*/10 * * * * /home/pi/lolbandwidth.py | |
import os | |
import sys | |
import csv | |
import datetime | |
import time |
#!/usr/bin/env python | |
#@atucom | |
#this script takes in a one-per-line file of IPs and adds it to Burp without any stupid regexes | |
# This mimics the same thing as hitting the "add" button in the Scope tab | |
# to load the resultant file, you need to go to the Scope tab, hit the little gear button in the | |
# top left and click "load settings", choose the jsonout.txt file and rejoice. | |
import sys | |
import json | |
basejson = """ | |
{ |
#Written by John Mocuta (@atucom) with help from Jared McLaren (@jared_mclaren) | |
#This Burp Plugin allows the user to load many Raw IPs at once without Burp automatically | |
#adding regexes or modying them in any way. | |
#Import Burp Objects | |
from burp import IBurpExtender, IHttpListener, IBurpExtenderCallbacks, ITab | |
#Import Python Objects | |
import json |
The following are the top 100 ingredients as scraped from Homechef's website: | |
178 Garlic Cloves | |
154 Butter | |
115 Shallot | |
106 Boneless Skinless Chicken Breasts | |
99 Green Onions | |
88 Grape Tomatoes | |
73 Lemon | |
70 Liquid Egg | |
65 Red Onion |
#!/usr/bin/env python3 | |
# Written by @Atucom | |
# This exploits the Vmware Vcenter Remote code execution vulnerability | |
import argparse | |
import sys | |
import logging | |
import requests | |
try: |