Skip to content

Instantly share code, notes, and snippets.

View binarymaster's full-sized avatar

Stanislav Motylkov binarymaster

View GitHub Profile
@LorbusChris
LorbusChris / MatrixIRC.md
Last active December 30, 2022 19:27
Matrix libera.chat IRC Bridge Setup

Matrix libera.chat IRC Bridge Setup

Change libera.chat IRC Nick

This is optional, in case you prefer your nick to be shown as something other than <matrix_nick>[m] on IRC, e.g. just <matrix_nick> (without the [m] suffix) or <libera_nick>.

Open a private chat with @appservice:libera.chat:

!nick <new_libera_nick>

Note: This does not change your Matrix nick!

@cab404
cab404 / checkmacs.sh
Last active April 3, 2018 07:05
MAC address checker for moscow metro
#!/bin/bash
# script for finding userdata from a list of macs.
# for educational purposes only, of course.
INPUT=$1
SSID=MT_FREE
DEV=${2:-wlp1s0}
OUTDIR=check-`date +%d-%m-%yT%H:%M:%S`
function jsonf() { python -c 'import json; json.dump(json.load(open("/dev/stdin", "r")), open("/dev/stdout", "w"), indent=2)'; echo; }
@Wack0
Wack0 / peb.c
Created December 31, 2017 16:31
Getting a pointer to the PEB in C, for every architecture that NT was ported to (where at least one build of the port was leaked/released)
// Gets a pointer to the PEB for x86, x64, ARM, ARM64, IA64, Alpha AXP, MIPS, and PowerPC.
// This relies on MS-compiler intrinsics.
// It has only been tested on x86/x64/ARMv7.
inline PEB* NtCurrentPeb() {
#ifdef _M_X64
return (PEB*)(__readgsqword(0x60));
#elif _M_IX86
return (PEB*)(__readfsdword(0x30));
@binkybear
binkybear / NETHUNTEROS.MD
Last active March 31, 2024 04:57
Nethunter ROM on Nexus 5 & 6P with Nexmon (testing only)

Nethunter OS on Nexus 5/Nexus 6P

Here are instructions to install Nethunter (as a ROM) with working native monitor mode in the chroot using Nexmon. The ROM is a modified CM 14.1 (nougat) base with custom kernel which supports: HID, Drivedroid, Kexec, and external wireless.

What you need

You will need the following 3 items (maybe 4):

Nexus 5 Devices:

@duksis
duksis / README
Created September 17, 2012 19:25
Wi-Fi Protected Setup vulnerability VU#723755 brute force attack implementation in Python
PoC implementation of a brute force attack against WPS - PIN External Registrar
My test environment was Backtrack 5R1 + an Atheros USB adapter.
I used a mac80211/carl9170 driver but any mac80211-based driver should be ok.
DEPENDENCIES:
PyCrypto
Scapy (2.2.0) (does not come with Backtrack)
USAGE:
@7shi
7shi / binutils-2.21.1a-mipsel-pe.diff
Created November 17, 2011 22:39
patches for mipsel-pe-gcc
diff -ur binutils-2.21.1.orig/bfd/config.bfd binutils-2.21.1/bfd/config.bfd
--- binutils-2.21.1.orig/bfd/config.bfd 2011-04-01 21:02:42 +0900
+++ binutils-2.21.1/bfd/config.bfd 2011-11-17 07:40:22 +0900
@@ -132,11 +132,6 @@
exit 1
;;
- mips*-*-pe*)
- echo "This target is obsolete and has been removed."
- exit 1