Skip to content

Instantly share code, notes, and snippets.

View gquere's full-sized avatar

Guillaume Quéré gquere

View GitHub Profile
@gquere
gquere / vault_get_secrets.py
Last active October 28, 2022 07:07
Recursively dump Hashicorp Vault secrets
#!/usr/bin/env python3
import argparse
import urllib3
import requests
import json
import sys
# SUPPRESS WARNINGS ############################################################
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
@gquere
gquere / openldap2john.py
Last active November 17, 2020 14:38
Convert OpenLDAP hashes to a format john the ripper can understand
#!/usr/bin/env python3
# Convert OpenLDAP hashes to a format john the ripper can understand
import sys
import base64
with open(sys.argv[1], 'r') as f:
lines = f.readlines()
for line in lines:
line = line.rstrip("\n")
@gquere
gquere / openldap2hashcat.py
Last active April 17, 2022 14:06
Convert OpenLDAP hashes to a format Hashcat can understand
#!/usr/bin/env python3
# Convert OpenLDAP hashes to a format Hashcat can understand
import sys
import base64
with open(sys.argv[1], 'r') as f:
lines = f.readlines()
for line in lines:
line = line.rstrip("\n")
@gquere
gquere / ports.txt
Last active November 27, 2020 11:06
Network
=======
DNS 53
DHCP server 67
DHCP client 68
NTP 123
Auth
====
TACACS 49
#!/usr/bin/env python3
import sys
import re
import random
import base64
with open(sys.argv[1], "rb") as f:
lines = f.readlines()
obfuscated_lines = b""

BareBox security advisory

Barebox security features

The security features of Barebox are:

  • Signed images
  • Signed "state variables" (shared with the kernel)

Kill it!

As admin launch SymCorpUi.exe and unprotect SEP in options.

for /L %n in (1,0,10) do taskkill /F /IM ccSvcHst.exe & timeout 1

Privesc

@gquere
gquere / weblogic_password.decrypt.py
Last active June 23, 2023 20:35
Weblogic password decrypt python
#!/usr/bin/env python3
# python3 port from https://github.com/L-codes/ctf-scripts/blob/master/crypto/weblogic_password.py
# /console/ login account
# -i ~/wls<VERSION>/user_projects/domains/<DOMAIN_NAME>/security/SerializedSystemIni.dat
# -f ~/wls<VERSION>/user_projects/domains/<DOMAIN_NAME>/config/config.xml
from Cryptodome.Cipher import ARC2, AES, DES3
from Cryptodome.Hash import SHA
import struct
import re
@gquere
gquere / fortigate_decrypt.py
Last active August 15, 2023 17:27
Decrypt FortiGate configuration secrets CVE-2019-6693
#!/usr/bin/env python3
from Cryptodome.Cipher import AES
import base64
import sys
key = b'Mary had a littl'
data = base64.b64decode(sys.argv[1])
iv = data[0:4] + b'\x00' * 12