Skip to content

Instantly share code, notes, and snippets.

@brutuscat
brutuscat / README
Last active October 26, 2022 06:22
Anonymous Rotating Proxies with Monit, Tor, Haproxy and Delegated. Idea by http://blog.databigbang.com/running-your-own-anonymous-rotating-proxies/
0 - Read http://blog.databigbang.com/running-your-own-anonymous-rotating-proxies/
1 - Install monit, haproxy, tor and delegated.
2 - Setup your environment in the setup.rb file
3 - Just run > ruby setup.rb
4 - ...........
5 - PROFIT! > http://www.southparkstudios.com/clips/151040/the-underpants-business
@btoews
btoews / login_spoof.html
Created April 29, 2012 19:24
XSS Login Page Spoofer
<script>
replacement_page_url = 'index.php';
replacement_page_html = "\
<html>\
<head>\
<link rel='shortcut icon' href='data:image/vnd.microsoft.icon;base64,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
@dannvix
dannvix / intercept-https-with-python-mitmproxy.md
Last active February 16, 2023 02:43
Intercept and manipulate HTTPs traffic with Python and mitmproxy

Intercepts HTTPs Traffic with Python & mitmproxy

Warning

This Gist is created in 2014, and it's highliy outdated now, according to one of mitmproxy's manjor contributor (check his comment below). Thanks for letting us know, @mhils!

Introduction

Modern applications usually make use of back-end API servers to provide their services. With a non-transparent HTTPs proxy, which intercepts the communication between clients and servers (aka the man-in-the-middle scheme), you can easily manipulate both API requests and responses.

@ib-lundgren
ib-lundgren / gmail.py
Created September 25, 2013 13:25
How to fetch emails from GMail using an OAuth 2 Bearer token and GMails SASL XOAuth2 mechanism.
"""Fetching the latest GMail email using OAuth 2 and IMAP.
Requires requests-oauthlib, which is available on pypi.
Includes a basic SASL XOAUTH2 authentication method for imaplib.
"""
# Credentials you get from registering a new web application in Google API Console
client_id = 'your-id.apps.googleusercontent.com'
client_secret = 'your secret'
redirect_uri = 'your callback uri'
@benmanns
benmanns / hash-setup.sh
Created October 29, 2013 17:06
This sets up an Amazon cluster GPU instance for hash cracking with oclHashcat (CUDA). You must use the Ubuntu 12.04.x AMI for HVM. The most recent is Ubuntu Server 12.04.3 LTS for HVM Instances - ami-b93264d0.
sudo apt-get update -y && sudo apt-get upgrade -y
wget http://developer.download.nvidia.com/compute/cuda/repos/ubuntu1204/x86_64/cuda-repo-ubuntu1204_5.5-0_amd64.deb
sudo dpkg -i cuda-repo-ubuntu1204_5.5-0_amd64.deb
sudo apt-get update -y && sudo apt-get install -y nvidia-settings nvidia-current-dev nvidia-modprobe cuda
cat >> ~/.profile <<END
export CUDA_HOME=/usr/local/cuda-5.5
export CUDA_ROOT=/usr/local/cuda-5.5
@HarmJ0y
HarmJ0y / ubuntu_veil_evasion_setup.sh
Last active May 12, 2021 08:33
This short script will install Metasploit as well as Veil-Evasion on Ubuntu
#!/bin/bash
sudo apt-get install git
cd /tmp/
git clone https://github.com/darkoperator/MSF-Installer.git
cd MSF-Installer
sudo ./msf_install.sh -i
source ~/.bashrc
sudo chmod 0666 /usr/local/share/metasploit-framework/log/production.log
@lnaia
lnaia / jam.sh
Last active September 25, 2016 22:35
A fully functional general purpose WiFi Jammer, for research purposes. Use it at your own risk. Inspired by https://code.google.com/p/wifijammer/downloads/detail?name=wifijammer_0.1.sh and http://julianoliver.com/output/log_2014-05-30_20-52.
#!/bin/bash
# Targeted jammer
NIC=$1 # Your wireless NIC
BSSID=$2 # Your target BSSID
if [ "$NIC" == "" ]; then
echo "No NIC defined."
exit 1
fi
@binkybear
binkybear / mubix-lock.sh
Last active November 3, 2021 22:56
mubix-lock.sh
#!/bin/bash
#
# Attack created by Mubix. For more information see:
# https://room362.com/post/2016/snagging-creds-from-locked-machines
# Modified for Nethunter by Binkybear
#
# ================== #
# Check for root
# ================== #
@koenrh
koenrh / gcp-gpu-vm-hashcat.md
Last active June 14, 2024 17:37
Running Hashcat on Google Cloud's new GPU-based VMs

Running Hashcat on Google Cloud's GPU-based VMs

In February 2017, Google announced the availability GPU-based VMs. I spun up a few of these instances, and ran some benchmarks. Along the way, I wrote down the steps taken to provision these VM instances, and install relevant drivers.

Update April 2019: Updated instructions to use instances with the Tesla T4 GPUs.

@7MinSec
7MinSec / Password_cracking_in_the_cloud.md
Last active August 24, 2023 14:24
Password cracking in the cloud