Skip to content

Instantly share code, notes, and snippets.

View intrd's full-sized avatar
🚫
Become a ghost

intrd

🚫
Become a ghost
View GitHub Profile
@intrd
intrd / claude_usage.sh
Last active December 10, 2025 12:21
Simple one-shot script to extract Claude Code "Plan usage limits" using tmux
#!/usr/bin/env bash
## Simple one-shot script to extract Claude Code "Plan usage limits" using tmux.
# Author: intrd@dann.com.br
# Tags: claude, quota
SESSION="claude-usage-$$"
# Start Claude Code in a detached tmux session
tmux new-session -d -s "$SESSION" 'claude'
@intrd
intrd / vpn_intrd.sh
Last active September 24, 2025 16:20
Openvpn safe kill switch / isolate vpn connection using linux routing table (no iptables needed)
#!/bin/bash
## Openvpn safe kill switch / isolate vpn connection using linux routing table (no iptables needed)
# Author: intrd@dann.com.br
# flush the entire routing table (incl cache)
sudo ip route flush table main
sudo ip route flush cache
# route the wan network but not a gateway
@intrd
intrd / mitrastar_ipchanger.sh
Last active May 17, 2025 23:38
VIVO FIBRA MitraStar GPT - IP changer / reboot one-liner (authd xpl)
## VIVO FIBRA MitraStar GPT - IP changer / reboot one-liner (authd xpl)
# Successfully tested on MitraStar GPT-2541 and 2741. No SSH access required.
# Author: intrd@dann.com.br
# YoU WouLdn't ReBooT My RoUtEr.. they said? CHALLENGE ACCEPTED!
# Install Node.js (sudo apt install nodejs), required to calculate sessionKey from CLI;
# Edit LOGIN/PASSWORD, IP_ROUTER and run: ./mitrastar_ipchanger.sh
# It will extract the JS and SID from router, process the JS with w/ node, trigger the reboot and change ip.
@intrd
intrd / tutorial_bruteforce_cookies_csrf_burp_rewrite.txt
Last active March 12, 2025 16:09
Tutorial - Extract session and csrf using cURL, run Hydra/Patator bruteforce over Burpsuite proxy w/ rewritting macros
## Extract session and csrf using cURL, run Hydra/Patator bruteforce over Burpsuite proxy w/ rewritting macros
# @author intrd - http://dann.com.br/ (thx to g0tmi1k)
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
## Burp csrf-rewritting macro
- Session handling rules = new macro, tick Tolerate URL mismatch when matching parameters..
Create a macro rule over method GET, extract custom parameter w/ parameter name = _csrf
and extract start after expression value=" and end at delimiter ", configure scope for domain and enable for Proxy,
Open session tracker to test. (on Intruder bruteforce, u need to untick Make unmodified baseline request).
- Proxy options = Enable Cookie jar for proxy, if not working, enable invisible proxing
@intrd
intrd / dropbear_howto.md
Last active January 23, 2025 19:31
Remotely Boot and Unlock a Linux Full Disk Encrypted machine (LUKS) with Dropbear

Installing dropbear to initramfs

sudo apt update
sudo apt install dropbear-initramfs
sudo -i
cd /etc/dropbear/initramfs/
nano dropbear.conf
DROPBEAR_OPTIONS="-I 239 -j -k -p 8008 -s"
nano /etc/initramfs-tools/initramfs.conf
IP=192.168.1.11::192.168.1.1:255.255.255.0:YOURHOSTNAME
@intrd
intrd / Xwitter_createFirstToken.py
Last active November 12, 2024 11:34
X/Twitter - Simple Python3 OAuth 2.0 Authorization (PKCE), Refresh Token and Tweet Action without Tweepy or any 3rd-party libs
## X/Twitter - Simple Python3 OAuth 2.0 Authorization (PKCE), Refresh Token and Tweet Action without Tweepy or any 3rd-party libs.
# Author: intrd@dann.com.br
# Action: Create Refresh Token
import os
import secrets
import string
import requests
from urllib.parse import urlencode
@intrd
intrd / gh_issues2md.py
Created September 25, 2024 12:34
Python3 Convert all your Github issues into Obsidian markdown format.
## Python3 Convert all your Github issues into Obsidian markdown format.
# Author: intrd@dann.com.br
import os
import requests
import re
# Replace with your repository and username
GITHUB_API = "https://api.github.com"
USERNAME = "intrd"
@intrd
intrd / hackvertor-tags.json
Created August 8, 2024 23:28
Splitting-the-email-atom - Hackvertor Javascript custom tags converted to Python
[
{
"argument1Default":"0x100",
"code":"output = ''.join(unichr(mask + ord(c)) for c in input)",
"argument1Type":"Number",
"numberOfArgs":1,
"argument1":"mask",
"language":"Python",
"tagName":"__unicode_overflow_py"
},
@intrd
intrd / xwitter.py
Created July 23, 2024 08:22
Python3 OAuth 2.0 PKCE with Tweepy: Upload and Tweet an Image using Twitter API v1 w/ X API v2.
## Python3 OAuth 2.0 PKCE with Tweepy: Upload and Tweet an Image using Twitter API v1 w/ X API v2.
# This script uploads an image using the old Twitter API v1, retrieves the media URL, and then tweets it using the new X API v2. (Yes, currently, this is the easiest way to accomplish this).
# Author: intrd@dann.com.br
import tweepy, sys
if len(sys.argv) < 3:
print("Usage: python3 script.py <file_path> <long_text>")
sys.exit(1)
file_path = sys.argv[2]
@intrd
intrd / base3200.py
Last active May 24, 2024 23:15
base64x50 decoder used in misc100-base3200 @ 3dsctf-2k16
## base64x50 decoder used in misc100-base3200 @ 3dsctf-2k16
# @author intrd - http://dann.com.br/
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/
import base64
# 3200/64 = 50
pontfile='msg.txt'
for x in range(0, 50):
with open(pontfile, 'r') as f: