Skip to content

Instantly share code, notes, and snippets.

@jon1scr
jon1scr / decoder
Last active January 26, 2021 10:40
import sys, numpy as np
def cipher_encryption():
msg = input('Enter message: ').upper()
msg = msg.replace(' ', '')
len_chk = 0
if len(msg) % 2 != 0:
msg += '0'
len_chk = 1
row = 2
@jon1scr
jon1scr / awesome-python-sorted-2020-09-27.md
Created January 28, 2021 10:54 — forked from kvnxiao/awesome-python-sorted-2020-09-27.md
awesome-python-sorted-2020-09-27.md
@jon1scr
jon1scr / dump-pyc-with-gdb.md
Created February 13, 2021 20:43 — forked from stecman/dump-pyc-with-gdb.md
Dumping all bytecode from a packaged Python application

This is a technique for extracting all imported modules from a packaged Python application as .pyc files, then decompiling them. The target program needs to be run from scratch, but no debugging symbols are necessary (assuming an unmodified build of Python is being used).

This was originally performed on 64-bit Linux with a Python 3.6 target. The Python scripts have since been updated to handle pyc files for Python 2.7 - 3.9.

Theory

In Python we can leverage the fact that any module import involving a .py* file will eventually arrive as ready-to-execute Python code object at this function:

PyObject* PyEval_EvalCode(PyObject *co, PyObject *globals, PyObject *locals);
@jon1scr
jon1scr / ida75sp3
Created February 14, 2021 15:33
ida75sp3
http://www.mediafire.com/file/u9mdqysvddqcb7l/IDA_Pro_7.5.201028_SP3.zip/file
#!/usr/bin/env python3
"""
This module generates a passphrase using EFF's long word list (for use with five dice).
word list attribution:
https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases
usage: passphrase_ex.py [-h] [-n NUMBER] [-s SEPARATOR]
@jon1scr
jon1scr / Poisson-processes.ipynb
Created February 18, 2021 15:32
RiskEngineering notebooks
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
RiseupVPN
https://bayfiles.com/l9peY2Ufpc/RiseupVPN_zip
from idautils import *
from idaapi import *
from ida_name import *
from idc import *
from ida_hexrays import *
from ida_frame import *
from ida_struct import *
INHERITANCE = {
# Auto Object base classes.
@jon1scr
jon1scr / get_ippsec_details.py
Created February 24, 2021 11:14 — forked from sminez/get_ippsec_details.py
Find examples of pen testing methods and tools in videos by Ippsec (as of 22nd January 2020)
#!/usr/bin/env python3
"""
Script used to pull down the current video descriptions from ippsec's youtube channel.
The raw output still has a few HTML tags that need to be manually removed and there
also seem to be multiple duplicates of videos that have been removed in the output
saved as ippsec-details.txt
"""
import re
import sys

😍 The beginners note for OSINT 📚


The number of OSINT tools and services is constantly growing (image via osintframework.com)

Definition:
(intentionally left blank)