Skip to content

Instantly share code, notes, and snippets.

View cmlh's full-sized avatar

Christian Heinrich cmlh

View GitHub Profile
#!/bin/sh
# Simple shell script to replay URL(s) discovered by DirBuster over a local web proxy i.e. Burp Proxy, etc on TCP/8080
#
# Based on http://pauldotcom.com/2011/08/dirbuster-to-burp-the-missing.html
# REPOSITORY
# https://gist.github.com/1325706
# git://gist.github.com/1325706.git
@cmlh
cmlh / robots.txt
Created April 27, 2014 22:39
robots.txt for dev www
# http://www.robotstxt.org/robotstxt.html
User-agent: *
Disallow: /
#!/usr/bin/env python
#
# shodan-stream.py
# Read a firehose/ stream of 1% of the data that Shodan collects in real-time.
#
# WARNING: This script only works with people that have a subscription API plan!
# And by default the Streaming API only returns 1% of the data that Shodan gathers.
# If you wish to have more access please contact us at support@shodan.io for pricing
# information.
#
@cmlh
cmlh / gfind
Last active August 29, 2015 14:10
#!/bin/bash
directories=(
'dir1'
'dir2')
function search {
res=$(unzip -c \*.mtgx Graphs/Graph1.graphml 2>&1 |egrep "(Archive: )|$1" |grep "<mtg:Value" -B1)
res=$(echo -e "$res" |sed 's/\<mtg\:Value\>//g')
res=$(echo -e "$res" |sed 's/\<\/mtg\:Value\>//g')
dc:14:de:8e:d7:c1:15:43:23:82:25:81:d2:59:e8:c0 245272
32:f9:38:a2:39:d0:c5:f5:ba:bd:b7:75:2b:00:f6:ab 197846
d0:db:8a:cb:74:c8:37:e4:9e:71:fc:7a:eb:d6:40:81 152046
34:47:0f:e9:1a:c2:eb:56:eb:cc:58:59:3a:02:80:b6 140777
df:17:d6:57:7a:37:00:7a:87:5e:4e:ed:2f:a3:d5:dd 91904
81:96:a6:8c:3a:75:f3:be:84:5e:cc:99:a7:ab:3e:d9 80499
7c:a8:25:21:13:a2:eb:00:a6:c1:76:ca:6b:48:6e:bf 78172
1c:1e:29:43:d2:0c:c1:75:40:05:30:03:d4:02:d7:9b 71851
8b:75:88:08:41:78:11:5b:49:68:11:42:64:12:6d:49 70786
c2:77:c8:c5:72:17:e2:5b:4f:a2:4e:e3:04:0c:35:c9 68654
32:f9:38:a2:39:d0:c5:f5:ba:bd:b7:75:2b:00:f6:ab 197846
d0:db:8a:cb:74:c8:37:e4:9e:71:fc:7a:eb:d6:40:81 152046
34:47:0f:e9:1a:c2:eb:56:eb:cc:58:59:3a:02:80:b6 140777
df:17:d6:57:7a:37:00:7a:87:5e:4e:ed:2f:a3:d5:dd 91904
81:96:a6:8c:3a:75:f3:be:84:5e:cc:99:a7:ab:3e:d9 80499
7c:a8:25:21:13:a2:eb:00:a6:c1:76:ca:6b:48:6e:bf 78172
1c:1e:29:43:d2:0c:c1:75:40:05:30:03:d4:02:d7:9b 71851
8b:75:88:08:41:78:11:5b:49:68:11:42:64:12:6d:49 70786
c2:77:c8:c5:72:17:e2:5b:4f:a2:4e:e3:04:0c:35:c9 68654
tradermail.info
binkmail.com
suremail.info
safetymail.info
thisisnotmyrealemail.com
mailinator.com
sogetthis.com
spamhereplease.com
spambooger.com
streetwisemail.com

Keybase proof

I hereby claim:

  • I am cmlh on github.
  • I am cmlh (https://keybase.io/cmlh) on keybase.
  • I have a public key whose fingerprint is 5CE5 3D47 5613 5B3D B242 0094 A463 2510 0EAE E92B

To claim this, I am signing this object:

#Define the modules that we intend to use.
use strict;
use LW2;
use Getopt::Std;
#Define hashes for our command line options, request #information, response information and cookies.
my ( %opts, %request, %response, %jar, $headers_array, $header );
##note the addition of 'U' and 'D' as options
getopts( 'dh:m:u:U:D:', \%opts );
@cmlh
cmlh / backtrack-build-skipfish.sh
Created October 27, 2011 23:45
Updated the skipfish build sh script for BackTrack Linux from http://www.ehacking.net/2011/06/skipfish-backtrack5-tutorial.html
#!/bin/sh
# Builds skipfish on BackTrack 5 R1
# Updated from http://www.ehacking.net/2011/06/skipfish-backtrack5-tutorial.html
# skipfish is available from http://code.google.com/p/skipfish/
# BackTrack is available from http://www.backtrack-linux.org/
# TODO sudo
apt-get install libssl-dev