I hereby claim:
- I am colin-stubbs on github.
- I am nullbytes (https://keybase.io/nullbytes) on keybase.
- I have a public key ASC0oPSkKS2o9FstjWQXKFRl-SMZeppiQn_TZpGUfCIq2go
To claim this, I am signing this object:
<?xml version="1.0" encoding="utf-8"?> | |
<service> | |
<short>chromecast-ssdp</short> | |
<port protocol="udp" port="1900"/> | |
<destination ipv4="239.255.255.250/32"/> | |
</service> |
I hereby claim:
To claim this, I am signing this object:
THREAT_FIELDS_5_0 = ["future_use1","receive_time","serial_number","@THREAT","log_subtype","future_use2", | |
"generated_time","src_ip","dest_ip","src_translated_ip","dest_translated_ip","rule","src_user", | |
"dest_user","app","virtual_system","src_zone","dest_zone","src_interface","dest_interface", | |
"log_forwarding_profile","future_use3","session_id","repeat_count","src_port","dest_port", | |
"src_translated_port","dest_translated_port","flags","protocol","action","misc","threat_name", | |
"category","severity","direction","sequence_number","action_flags","src_location","dest_location", | |
"future_use4","content_type"] | |
THREAT_FIELDS_6_0 = THREAT_FIELDS_5_0 + ["pcap_id", "url_idx", "cloud_address"] |
#!/bin/bash -l | |
# | |
# VeraCrypt volume brute forcing script with support for key file based volumes | |
# | |
# NOTE: veracrypt will need to be run with root privileges, either directly as root or via sudo | |
# WARNING: This is a very slow method to brute force access into a volume, you can extract the password hash and use hashcat if you're certain no key file needs to be involved. | |
# | |
if [ $# -ne 2 ] && [ $# -ne 3 ] ; then | |
/bin/echo "Usage $0 <veracrypt-file> <wordlist> [<key-file>]" |
#!/bin/bash -l | |
# | |
# KeePass brute force script with support for key file based vaults | |
# | |
if [ $# -ne 2 ] && [ $# -ne 3 ] ; then | |
/bin/echo "Usage $0 <kdbx-file> <wordlist> [<key-file>]" | |
exit 2 | |
fi |