Skip to content

Instantly share code, notes, and snippets.

View hreese's full-sized avatar

Heiko Reese hreese

  • Karlsruhe Institute of Technology – Steinbuch Centre for Computing
  • Karlsruhe, Germany
View GitHub Profile
% FontAwesome (http://fortawesome.github.com/Font-Awesome/) bindings for (Xe)LaTeX
% Author: Honza Ustohal <honza@egoistic.biz>
%
% Translation of FontAwesome's private range characters into XeTeX symbols. All icons are camel-cased and prefixed with 'fa', i.e. what was .icon-align-center the CSS version of FontAwesome becomes \faAlignCenter
% This might be reworked into a full blown package in the near future
%
% Prerequisite:
% XeLaTeX, FontAwesome installed as a system font accessible by XeLaTeX
%
% Usage:

Keybase proof

I hereby claim:

  • I am hreese on github.
  • I am heikoreese (https://keybase.io/heikoreese) on keybase.
  • I have a public key whose fingerprint is 2129 1E79 5592 B87A 479D D30B 1FDD 301F B636 D58B

To claim this, I am signing this object:

@hreese
hreese / remove_ms_spyware.bat
Last active September 7, 2015 13:23
Remove unwanted updates from Windows 7
wusa /kb:3021917 /uninstall /norestart /quiet
wusa /kb:3035583 /uninstall /norestart /quiet
wusa /kb:2952664 /uninstall /norestart /quiet
wusa /kb:3022345 /uninstall /norestart /quiet
wusa /kb:3068708 /uninstall /norestart /quiet
wusa /kb:2990214 /uninstall /norestart /quiet
wusa /kb:2505438 /uninstall /norestart /quiet
wusa /kb:2670838 /uninstall /norestart /quiet
wusa /kb:2952664 /uninstall /norestart /quiet
wusa /kb:3021917 /uninstall /norestart /quiet
@hreese
hreese / ssh-keygen
Created April 11, 2016 01:34 — forked from tuxfight3r/ssh-keygen
ssh key / fingerprint tricks
#Read multiple keys from an authorized_keys file and print the finger print
[root@server01 .ssh]# while read line; do ssh-keygen -l -f /dev/stdin <<< $line; done < authorized_keys
2048 87:7a:4d:70:d2:10:a4:4b:b7:e1:2b:7c:77:92:25:04 /dev/stdin (RSA)
2048 7d:f0:89:94:00:09:bc:70:46:59:8d:9a:70:3b:ac:70 /dev/stdin (RSA)
2048 61:63:ee:0d:f6:d2:d8:d6:ae:37:0c:35:ae:da:51:6a /dev/stdin (RSA)
#read a key from authorized key file
[root@server01 .ssh]# ssh-keygen -l -f authorized_keys
2048 87:7a:4d:70:d2:10:a4:4b:b7:e1:2b:7c:77:92:25:04 authorized_keys (RSA)
@hreese
hreese / fix_ssl_trust.sh
Created April 24, 2016 10:39
Make Fedora's certstore compatible with Debian standard (use case: use git-annex binary distribution)
sudo ln -s /etc/ssl/certs/ca-bundle.crt /etc/ssl/certs/ca-certificates.crt
@hreese
hreese / pfshell.c
Created September 21, 2016 06:58
Minimal shell for ssh portforwarding only
#include <unistd.h>
#include <stdio.h>
#define ANSI_COLOR_RED "\x1b[31m"
#define ANSI_COLOR_GREEN "\x1b[32m"
#define ANSI_COLOR_YELLOW "\x1b[33m"
#define ANSI_COLOR_BLUE "\x1b[34m"
#define ANSI_COLOR_MAGENTA "\x1b[35m"
#define ANSI_COLOR_CYAN "\x1b[36m"
#define ANSI_COLOR_RESET "\x1b[0m"
@hreese
hreese / broken_amd_core_test.c
Last active September 20, 2019 21:31
Shows broken core on my AMD Ryzen 2700X (use taskset to pin to core 3 and run a few times)
#include <math.h>
#include <stdio.h>
struct transform {
double x1;
double y1;
double x2;
double y2;
};
@hreese
hreese / Various-Macro-Based-RCEs.md
Created February 14, 2020 02:01 — forked from mgeeky/Various-Macro-Based-RCEs.md
Various Visual Basic Macros-based Remote Code Execution techniques to get your meterpreter invoked on the infected machine.

This is a note for myself describing various Visual Basic macros construction strategies that could be used for remote code execution via malicious Document vector. Nothing new or fancy here, just a list of techniques, tools and scripts collected in one place for a quick glimpse of an eye before setting a payload.

All of the below examples had been generated for using as a remote address: 192.168.56.101.

List:

  1. Page substiution macro for luring user to click Enable Content
  2. The Unicorn Powershell based payload