Skip to content

Instantly share code, notes, and snippets.

Avatar

Ewald beamzer

View GitHub Profile
View scan_http_list.py
#!/usr/bin/env python3
# 13-12-2021
# will take a file with a list of URLS and return the resulting URL after following redirects and final HTTP response code
# if a URL is unreachable it will be silently skipped
# The User-Agent is a Canary Token for log4j or modify to your needs
import argparse
import requests
import urllib3
View canary_log4jcheck.py
#!/usr/bin/python3
import requests
#import uuid
import logging
import urllib3
import time
import sys
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
logging.basicConfig(level=logging.INFO)
View sha256.pl
#!/opt/local/bin/perl -w
use strict;
use Digest::file qw(digest_file_hex);
for (@ARGV) {
print digest_file_hex($_, "SHA-256");
}
View vtcheck zsh function
vtcheck () {
myhash=$(sha256.pl $1 )
curl --silent https://www.virustotal.com/vtapi/v2/file/report -F apikey=$VTAPI -F resource=$myhash | jq '.scans |= with_entries(select(.value.detected) | .value |= .version + " / " + .update + " / " + .result)'
}
View maltrieve.ps1
<#
.SYNOPSIS
This script retrieves malware (or other) mails from the O365 - EOP quarantaine queue
these are real malware e-mails and could cause massive damage to your PC, network, organisation and even beyond (remember WannaCry, NonPetya and others)
Use a dedicated, isolated malware research workstation, and make sure you know what you are doing
=> Use at your own Risk <=
.DESCRIPTION
Fetch malware (or other) mails from Office365 EOP Quarantaine Queue
@beamzer
beamzer / parseml.py
Last active Sep 23, 2022 — forked from urschrei/parseml.py
Extract attachments from EML files in the current dir, and write them to the output subdir
View parseml.py
#!/usr/bin/env python3.7
"""
source: https://gist.github.com/urschrei/5258588 by Stephan Hügel
2020 update:
- More iterators, fewer lists
- Python 3 compatible
- Processes files in parallel
(one thread per CPU, but that's not really how it works)
@beamzer
beamzer / vc-backgrounds.txt
Created May 11, 2020
VideoConferencing backgrounds
View vc-backgrounds.txt
BBC Series emtpy set photo's
https://www.bbc.co.uk/archive/empty-sets-sitcoms/zj98wty
Some Galaxy-class backgrounds for your video calls:
https://twitter.com/TrekCore/status/1245729524735791104
Best Zoom backgrounds
https://www.pocket-lint.com/apps/news/151711-best-zoom-backgrounds-fun-virtual-backgrounds-for-zoom-meetings
View zoom_security.txt
[Zoom best practice secure configuration]
https://www.eff.org/deeplinks/2020/04/harden-your-zoom-settings-protect-your-privacy-and-avoid-trolls
https://www.uio.no/tjenester/it/telefoni-sanntid/videokonf/zoom/endringslogg/uio-zoom-configuration-status.html
https://www.forbes.com/sites/kateoflahertyuk/2020/04/03/use-zoom-here-are-7-essential-steps-you-can-take-to-secure-it/
https://www.telegraph.co.uk/technology/2020/04/09/set-zoom-meeting-safely/
[Zoom security whitepaper]
https://zoom.us/docs/doc/Zoom-Security-White-Paper.pdf
[Zoom Privacy Policy]
View keybase.md

Keybase proof

I hereby claim:

  • I am beamzer on github.
  • I am beamzer (https://keybase.io/beamzer) on keybase.
  • I have a public key ASD31zEoyiKKl1hj8T_CyirBQenqPfIP_ZvsPRMGpYREfgo

To claim this, I am signing this object: