Skip to content

Instantly share code, notes, and snippets.

@atucom
atucom / gist:5b52b89ce135fb75fe5f
Created May 1, 2015 18:00
Create hex for proxmark3 and generate 26bit wiegand formatted badge data
#!/usr/bin/env ruby
#the wiegand data format is just 26 bits,
# even_parity_bit + 8bit_facility_code + 16bit_badge_code + odd_parity_bit
# The proxcard II format expects the 26bit part appended to the "magic"
#magic is really the OEM, plus card type, which i've locked to the magic var
# below for my purposes. Change it to match yoursjuu
def generate_44bit_hex(bin)
chopped = bin.chars.each_slice(4).map(&:join)
hex_string = ""

Keybase proof

I hereby claim:

  • I am atucom on github.
  • I am atucom (https://keybase.io/atucom) on keybase.
  • I have a public key whose fingerprint is 84A0 48A0 922C 3138 F79A 26F3 89A6 2F29 E898 B7FA

To claim this, I am signing this object:

@atucom
atucom / cfadmin-cookie-grabber.rb
Last active December 10, 2015 17:41
Coldfusion Admin Cookie Generator
@atucom
atucom / fldigi-rpc.rb
Created February 15, 2016 20:26
Simple XML-RPC client for fldigi
#!/usr/bin/env ruby
#@atucom
#http://www.w1hkj.com/FldigiHelp-3.21/html/xmlrpc_control_page.html
require "xmlrpc/client"
server = XMLRPC::Client.new( "192.168.50.189", "/", port=7362)
result = server.call("text.add_tx","Test123") #add Test123 to tx widget
result = server.call("main.tx") #tx the text
@atucom
atucom / dcept-fingerprint.rb
Created March 7, 2016 19:34
super simple fingerprinter for DCEPT cred serving server
#!/usr/bin/env ruby
#Fingerprints SecureWorks DCEPT
#@atucom
require 'net/http'
require 'json'
if ARGV.empty?
puts "Fingerprints destination HTTP service for DCEPT"
puts "\t Usage: #{$0} IP[:port] "
@atucom
atucom / lolbandwidth.py
Created February 1, 2016 14:49
automatically log speedtest results to file with timestamp for logging.
#!/usr/bin/python
#stolen and modified from the reddit post about the raspbeery pi tweeting at comcast
#run this every 10 minutes (or w/e) with cron:
#"crontab -e"
#*/10 * * * * /home/pi/lolbandwidth.py
import os
import sys
import csv
import datetime
import time
#!/usr/bin/env python
#@atucom
#this script takes in a one-per-line file of IPs and adds it to Burp without any stupid regexes
# This mimics the same thing as hitting the "add" button in the Scope tab
# to load the resultant file, you need to go to the Scope tab, hit the little gear button in the
# top left and click "load settings", choose the jsonout.txt file and rejoice.
import sys
import json
basejson = """
{
@atucom
atucom / RawBulkIPImportBurp.py
Created June 14, 2017 16:11
Bulk Import Raw IPs
#Written by John Mocuta (@atucom) with help from Jared McLaren (@jared_mclaren)
#This Burp Plugin allows the user to load many Raw IPs at once without Burp automatically
#adding regexes or modying them in any way.
#Import Burp Objects
from burp import IBurpExtender, IHttpListener, IBurpExtenderCallbacks, ITab
#Import Python Objects
import json
@atucom
atucom / gist:9c4886f65185944816110990bba9f0a5
Created July 5, 2017 19:15
Top Ingredients for Homechef
The following are the top 100 ingredients as scraped from Homechef's website:
178 Garlic Cloves
154 Butter
115 Shallot
106 Boneless Skinless Chicken Breasts
99 Green Onions
88 Grape Tomatoes
73 Lemon
70 Liquid Egg
65 Red Onion
@atucom
atucom / vmshell.py
Created November 7, 2017 20:15
Vmware Vcenter Remote Code Execution
#!/usr/bin/env python3
# Written by @Atucom
# This exploits the Vmware Vcenter Remote code execution vulnerability
import argparse
import sys
import logging
import requests
try: