I hereby claim:
- I am furusiyya on github.
- I am furusiyya (https://keybase.io/furusiyya) on keybase.
- I have a public key whose fingerprint is 2D55 B75B D686 3D23 55A7 F44F 4C5A 29F8 C638 4CB0
To claim this, I am signing this object:
package proxy | |
import ( | |
"io" | |
"log" | |
"net" | |
) | |
func Proxy(srvConn, cliConn *net.TCPConn) { | |
// channels to wait on the close event for each connection |
# CySecBooks | |
============ | |
## Repo Content | |
- A Guide to Kernel Exploitation Attacking the Core | |
- Computer Networking A Top-Down Approach | |
- Fuzzing Brute Force Vulnerability Discovery | |
- Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009) | |
- Hacking - The Art of Exploitation, 2nd Ed. | |
- Metasploit, Penetration Testers Guide |
package glutton | |
import ( | |
"bufio" | |
"bytes" | |
"os/exec" | |
"regexp" | |
) | |
const tcpRegExp = `\[\w+]\s+\w+\s+.+?src=(\d+\.\d+\.\d+\.\d+)\s+dst=(\d+\.\d+\.\d+\.\d+)\s+sport=(\d+)\s+dport=(\d+)\s+` |
import re | |
import clipboard | |
import console | |
import webbrowser | |
import urllib | |
import contacts | |
import datetime | |
import dialogs | |
def extract_num(input): |
for (i = 0; i < *len; i++) | |
{ | |
cpy[i] ^= 0xDE; | |
cpy[i] ^= 0xAD; | |
cpy[i] ^= 0xBE; | |
cpy[i] ^= 0xEF; | |
} | |
(facepalm) |
########## | |
# Win10 Initial Setup Script | |
# Author: Disassembler <disassembler@dasm.cz> | |
# Version: 1.7, 2016-08-15 | |
# dasm's script: https://github.com/Disassembler0/Win10-Initial-Setup-Script/ | |
# THIS IS A PERSONALIZED VERSION | |
# This script leaves more MS defaults on, including MS security features. | |
# Tweaked based on personal preferences for @alirobe 2016-11-16 - v1.7.1 |
- "consumer.Http": | |
Enable: true | |
ID: "" | |
Fuse: "" | |
Stream: | |
- "foo" | |
- "bar" | |
Address: ":9000" | |
ReadTimeoutSec: 3 | |
WithHeaders: true |
//IPTable rules for capturing ssh packets | |
//sudo iptables -A INPUT -p tcp --dport 22 -j NFQUEUE --queue-num 0 | |
//sudo iptables -A OUTPUT -p tcp --dport 22 -j NFQUEUE --queue-num 0 | |
//sudo iptables -A FORWARD -p tcp --dport 22 -j NFQUEUE --queue-num 0 | |
package main | |
import ( |
I hereby claim:
To claim this, I am signing this object:
RSA 2017 DevOOPS: Attacks And Defenses For DevOps Toolchains Talk Links SessionID: HTA-W02 | |
https://www.slideshare.net/chrisgates/devoops-attacks-and-defenses-for-devops-toolchains | |
Past talks: | |
http://www.slideshare.net/KenJohnson61/aws-surival-guide | |
[Ken Johnson earlier talk on AWS security, dedicated to using these services (cloudwatch/config/cloudtrail)] | |
https://www.youtube.com/watch?v=g-wy9NdATtA&feature=youtu.be |