Skip to content

Instantly share code, notes, and snippets.

@duraki
duraki / art.yaml
Last active December 6, 2019 03:22
Mockup YAML config for static blog generator `art`
---
minimal:
artist: "Your Name"
title: "Blog Title"
description: "Blog description."
theme: "sterdo"
posts:
in: /posts/in # => post in (md)
out: /posts/out # => post out (html)
@duraki
duraki / shell_bind_tcp.asm
Created December 9, 2017 18:54 — forked from geyslan/shell_bind_tcp.asm
Shell Bind TCP in Assembly (Linux/x86)
; This is a snippet of the original file in https://github.com/geyslan/SLAE/blob/master/1st.assignment/shell_bind_tcp.asm
global _start
section .text
_start:
; syscalls (/usr/include/asm/unistd_32.h)
; socketcall numbers (/usr/include/linux/net.h)
@duraki
duraki / breach_compilation_passlist-extraction.txt
Last active May 7, 2022 12:49
1.4 billion password breach compilation wordlist
# => create a wordlist from original 41G stash via:
$ grep -rohP '(?<=:).*$' | uniq > breachcompilation.txt
# => compressed with:
$ 7z a breachcompilation.txt.7z breachcompilation.txt
# => size (rel):
## 4.1G compressed
## 9.0G uncompressed
# => Open this file
$ sudo vi /etc/default/tlp
# => Set this from 1 to 0:
USB_AUTOSUSPEND=0
# => Reboot
# SD card reader should work #
Go to: chrome://net-internals/#modules
Find Module by name, for e.g. "Alexa"
Get it's ID: `cknebhggccemgcnbidipinkifmmegdel`
Find chrome ext directory by profile:
```
$ sudo find / -iname "cknebhggccemgcnbidipinkifmmegdel"
​ /home/devil/.config/google-chrome/Profile 1/Extensions/cknebhggccemgcnbidipinkifmmegdel
```
@duraki
duraki / web-servers.md
Created February 5, 2018 17:46 — forked from willurd/web-servers.md
Big list of http static server one-liners

Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.

Discussion on reddit.

Python 2.x

$ python -m SimpleHTTPServer 8000
@duraki
duraki / fix_macbook_air_redhat_linux_wifi.txt
Last active May 7, 2022 13:04
Wi-fi fix RHEL on Macbook Air
# => unload/load wl module
$ modprobe -r wl
$ modprobe wl
$ nmtui ...
# => show use across the linux
$ modprobe --show-depends wl
insmod /lib/modules/3.10.0-693.11.1.el7.x86_64/kernel/net/rfkill/rfkill.ko.xz
insmod /lib/modules/3.10.0-693.11.1.el7.x86_64/kernel/net/wireless/cfg80211.ko.xz
From: http://redteams.net/bookshelf/
Techie
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp.
Social Engineering: The Art of Human Hacking by Christopher Hadnagy
Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam
The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick
Hacking: The Art of Exploitation by Jon Erickson and Hacking Exposed by Stuart McClure and others.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Fyodor
The Shellcoder's Handbook: Discovering and Exploiting Security Holes by several authors
@duraki
duraki / Aircrack Commands
Created March 22, 2019 10:24 — forked from victorreyesh/Aircrack Commands
Cracking WPA2 / WEP Wifi / Aircrack 10 seconds guide. For Mac OSX
//Install Macports.
//Install aircrack-ng:
sudo port install aircrack-ng
//Install the latest Xcode, with the Command Line Tools.
//Create the following symlink:
sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport
//Figure out which channel you need to sniff:
sudo airport -s
sudo airport en1 sniff [CHANNEL]
Go the road less travelled, find programs that are not on hackerone or bugcrowd:
https://www.bugcrowd.com/bug-bounty-list/
google: "Responsible Disclosure" or "Vulnerability Disclosure" or "responsible disclosure website list"
google: responsible disclosure "bounty"
Responsible Disclosure seems to give best results.
intext:”Responsible Disclosure Policy”
"responsible disclosure" "private program"
"responsible disclosure" "private" "program"
Google Dork: