Skip to content

Instantly share code, notes, and snippets.

View jfalken's full-sized avatar

Chris Sandulow jfalken

View GitHub Profile
@jfalken
jfalken / keepass2john.py
Created July 1, 2016 13:08 — forked from HarmJ0y/keepass2john.py
Python port of John the Ripper's keepass2john - extracts a HashCat/john crackable hash from KeePass 1.x/2.X databases
#!/usr/bin/python
# Python port of keepass2john from the John the Ripper suite (http://www.openwall.com/john/)
# ./keepass2john.c was written by Dhiru Kholia <dhiru.kholia at gmail.com> in March of 2012
# ./keepass2john.c was released under the GNU General Public License
# source keepass2john.c source code from: http://fossies.org/linux/john/src/keepass2john.c
#
# Python port by @harmj0y, GNU General Public License
#
@jfalken
jfalken / bashcheck
Created September 30, 2014 14:27
bashcheck
#!/bin/bash
# this was mirrored from https://raw.githubusercontent.com/hannob/bashcheck/master/bashcheck
r=`x="() { :; }; echo x" bash -c ""`
if [ -n "$r" ]; then
echo -e '\033[91mVulnerable to CVE-2014-6271 (original shellshock)\033[39m'
else
echo -e '\033[92mNot vulnerable to CVE-2014-6271 (original shellshock)\033[39m'
fi

Keybase proof

I hereby claim:

  • I am jfalken on github.
  • I am chrissandulow (https://keybase.io/chrissandulow) on keybase.
  • I have a public key whose fingerprint is 12BB A9AC 228C 7D83 4D7C FE05 BC99 D098 4ACD B270

To claim this, I am signing this object: