Skip to content

Instantly share code, notes, and snippets.

@goofwear
goofwear / 20200114-TLP-WHITE_CVE-2020-0601.md
Created January 19, 2020 03:29 — forked from SwitHak/20200114-TLP-WHITE_CVE-2020-0601.md
BlueTeam CheatSheet * CVE-2020-0601 * crypt32.dll | Last updated: 2020-01-17 2220 UTC

CVE-2020-0601 AKA ChainOfFools OR CurveBall

General

  • Microsoft disclosed a vulnerability in their monthly Patch Tuesday referenced under CVE-2020-0601.
  • The vulnerability was discovered by the U.S. National Security Agency, anounced today (2020-01-14) in their press conference, followed by a blog post and an official security advisory.
  • The flaw is located in the "CRYPT32.DLL" file under the C:\Windows\System32\ directory.

Vulnerability explanation

  • NSA description:
  • NSA has discovered a critical vulnerability (CVE-2020-0601) affecting Microsoft Windows® cryptographic functionality.
@goofwear
goofwear / gist:bca41e3e8a6edcc8ce3aac0f804956b8
Created January 12, 2020 00:54 — forked from Pusungwi/gist:7212599
A List of Javascript Emulator
@goofwear
goofwear / hosts
Created February 7, 2019 02:13
Hosts File to Block Facebook from my Machine
127.0.0.1 api.ak.facebook.com
127.0.0.1 api.connect.facebook.com
127.0.0.1 api.facebook.com
127.0.0.1 app.facebook.com
127.0.0.1 apps.facebook.com
127.0.0.1 ar-ar.facebook.com
127.0.0.1 badge.facebook.com
127.0.0.1 blog.facebook.com
127.0.0.1 connect.facebook.com
127.0.0.1 connect.facebook.net
@goofwear
goofwear / hactool_key_verify.py
Created January 26, 2019 21:53 — forked from khang06/hactool_key_verify.py
hactool key verifier
'''
hactool key verifier v0.2 by Khangaroo
a very badly made script to verify your hactool keys
Hash sources:
https://gist.github.com/roblabla/d8358ab058bbe3b00614740dcba4f208
My own console
https://github.com/SocraticBliss/hactool/blob/4169184c88a10cde0db8eaa83d38bd32a7f35751/KEYS.md
Some places that I can't link
'''
@goofwear
goofwear / 0-SD-GUIDE.md
Created January 26, 2019 21:50 — forked from khang06/0-SD-GUIDE.md
Switch SD Dumping 101

https://gbatemp.net/threads/nintendo-switch-sd-to-nsp-dumper.514816/ for a more automated and easier way to do this

This guide assumes you have previous experience with hactool and messing with your NAND. You aren't supposed to blindly copy commands in this, so read before pasting!

Also, the Python sections require Python 2.7 and pycrypto. Make sure your hactool is v1.2 or above.

Obtaining Your SD Seed

  1. Run https://cdn.discordapp.com/attachments/432400335235973120/478053328857726976/Compelled-Disclosure.nro (source at https://github.com/shadowninja108/Compelled-Disclosure, thx Shadów#6239)
@goofwear
goofwear / nx_bootloader_uncompress.c
Created January 15, 2019 07:01 — forked from SciresM/nx_bootloader_uncompress.c
Quick and dirty NX bootloader uncompression code for 6.2.0+
#include <stdlib.h>
#include <stdio.h>
#include <stdint.h>
#include <string.h>
#include <stdbool.h>
typedef uint32_t u32;
typedef uint8_t u8;
#!/usr/bin/env python3
import gzip
import os
import shutil
import subprocess
import tarfile
import zipfile
from defusedxml import ElementTree
import yaml
#!/usr/bin/env python3
import argparse
import io
import os
import string
import sys
import tempfile
import zipfile
import bs4 # pip install bs4
#!/usr/bin/env python3
import argparse
import sys
try:
from defusedxml import ElementTree
except (ImportError, AttributeError):
from xml.etree import ElementTree
import requests
@goofwear
goofwear / hosts-yt-ads
Created September 23, 2018 00:23 — forked from jakubpolak/hosts-yt-ads
youtube ads hosts file
0.0.0.0 ads.doubleclick.net
0.0.0.0 s.ytimg.com
0.0.0.0 ad.youtube.com
0.0.0.0 ads.youtube.com
0.0.0.0 www.gstatic.com
0.0.0.0 gstatic.com
0.0.0.0 clients1.google.com
0.0.0.0 dts.innovid.com
0.0.0.0 googleads.g.doubleclick.net
0.0.0.0 googleads4.g.doubleclick.net