Skip to content

Instantly share code, notes, and snippets.

Avatar

Brent Cook busterb

  • Rapid7
  • Pflugerville, TX
View GitHub Profile
View git-markov
#!/usr/bin/env python
import random, sys, os
random.seed()
nonword = "\n" # Since we split on whitespace, this can never be a word
w1 = nonword
w2 = nonword
# GENERATE TABLE
@busterb
busterb / gist:11265810
Created Apr 24, 2014
speed test - libressl default vs openssl binary supplied with Ubuntu 12.04 on Xeon 3 Ghz
View gist:11265810
OpenSSL
bcook@testing02:~/libressl$ /usr/bin/openssl speed aes
Doing aes-128 cbc for 3s on 16 size blocks: 17657948 aes-128 cbc's in 2.99s
Doing aes-128 cbc for 3s on 64 size blocks: 5088345 aes-128 cbc's in 2.99s
Doing aes-128 cbc for 3s on 256 size blocks: 1297264 aes-128 cbc's in 2.99s
Doing aes-128 cbc for 3s on 1024 size blocks: 324907 aes-128 cbc's in 2.99s
Doing aes-128 cbc for 3s on 8192 size blocks: 40847 aes-128 cbc's in 3.00s
Doing aes-192 cbc for 3s on 16 size blocks: 16173463 aes-192 cbc's in 2.99s
Doing aes-192 cbc for 3s on 64 size blocks: 4271739 aes-192 cbc's in 2.99s
Doing aes-192 cbc for 3s on 256 size blocks: 1084255 aes-192 cbc's in 2.99s
@busterb
busterb / gist:11267168
Created Apr 24, 2014
libressl sync script
View gist:11267168
#!/bin/sh
#git clone https://bitbucket.org/braindamaged/openbsd-src.git
(cd openbsd-src;
git pull)
for dir in libssl libcrypto; do
echo $dir
rm -fr $dir-openbsd
cp -ax openbsd-src ${dir}-openbsd
(cd ${dir}-openbsd;
@busterb
busterb / gist:631e2cf61a55de87d6b8
Last active Aug 29, 2015
HAVEGE extracted from xyssl 0.9 (appears unchanged in PolarSSL 1.3 except for interface)
View gist:631e2cf61a55de87d6b8
/*
* HAVEGE: HArdware Volatile Entropy Gathering and Expansion
*
* Copyright (C) 2006-2007 Christophe Devine
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* * Redistributions of source code must retain the above copyright
View gist:5dbfaeb6b24b496d6339
# $Id: PKGBUILD 107711 2014-03-18 17:19:21Z bpiotrowski $
# Maintainer: Bartłomiej Piotrowski <bpiotrowski@archlinux.org>
# Maintainer: Sébastien Luttringer
# Contributor: Sergej Pupykin <pupykin.s+arch@gmail.com>
# Contributor: Miroslaw Szot <mss@czlug.icis.pcz.pl>
pkgname=nginx-pouar
provides=('nginx')
conflicts=('nginx')
replaces=('nginx')
@busterb
busterb / gist:ff75d37f16942d7e9f91
Last active Aug 29, 2015
libressl contributors 12/27/2014
View gist:ff75d37f16942d7e9f91
openbsd/src/lib$ git shortlog -sn libssl libcrypto libtls|head -n 12
449 jsing
350 miod
241 deraadt
183 tedu
135 beck
99 markus
87 djm
51 bcook
40 guenther
@busterb
busterb / keybase.md
Last active Aug 29, 2015
keybase.md
View keybase.md

Keybase proof

I hereby claim:

  • I am busterb on github.
  • I am busterb (https://keybase.io/busterb) on keybase.
  • I have a public key whose fingerprint is A1EB 079B 8D3E B92B 4EBD 3139 663A F51B D5E4 D8D5

To claim this, I am signing this object:

View gist:e6365b175fb8199eca1762552453252a
#!/usr/bin/env python
import os, sys, urllib2, sgmllib, time, random, subprocess, glob
class MyParser(sgmllib.SGMLParser):
def parse(self, s):
self.inside_title = False
self.title = ""
self.feed(s)
View gist:999b44b48470b5c4891d6c79d8db2503
--- a/lib/msf/core/exploit/remote/browser_exploit_server.rb
+++ b/lib/msf/core/exploit/remote/browser_exploit_server.rb
@@ -103,7 +103,8 @@ module Msf
register_advanced_options([
OptString.new('CookieName', [false, "The name of the tracking cookie", DEFAULT_COOKIE_NAME]),
OptString.new('CookieExpiration', [false, "Cookie expiration in years (blank=expire on exit)"]),
- OptString.new('Custom404', [false, "An external custom 404 URL (Example: http://example.com/404.html)"])
+ OptString.new('Custom404', [false, "An external custom 404 URL (Example: http://example.com/404.html)"]),
+ OptString.new('IgnoreBrowserRequirements', [false, "Ignore browser requirements for the exploit"])
], Exploit::Remote::BrowserExploitServer)
View gist:0c80b9c9f604e51eb5dab276941ac5d6
# Metasploit Framework Basic Skills
If you are a developer of Metasploit, make sure you know how to do the following:
## 1. Basic Metasploit Experience
### Set up
- [ ] Set up Metasploit Framework Developer's Environment (with database connection)