Skip to content

Instantly share code, notes, and snippets.

View ksoona's full-sized avatar

Kenneth J. Soona ksoona

View GitHub Profile
@ksoona
ksoona / breachcompilation.txt
Created December 21, 2017 17:35
1.4 billion password breach compilation wordlist
wordlist created from original 41G stash via:
grep -rohP '(?<=:).*$' | uniq > breachcompilation.txt
Then, compressed with:
7z a breachcompilation.txt.7z breachcompilation.txt
Size:
@ksoona
ksoona / crime.py
Last active August 29, 2015 14:08 — forked from koto/crime.py
# This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do
# Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz
# http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/
import string
import zlib
import sys
import random
charset = string.letters + string.digits + "%/+="
:: process-permissions.bat
:: =======================
:: Batch Script for process permission analysis
:: by Thom Hastings ©2012 New BSD License
::
:: for reference-
:: http://travisaltman.com/windows-privilege-escalation-via-weak-service-permissions/
:: TODO: http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html
@echo off
title %username%@%userdomain% on %logonserver%\%computername% via %comspec% ~c0nS0Le
@ksoona
ksoona / pdf2xdp.py
Last active August 29, 2015 14:08 — forked from 9b/pdf2xdp.py
import base64
import sys
def main():
if len(sys.argv) < 3:
sys.exit('Usage (2 arguments): %s "%s" %s' % (sys.argv[0],"malicious file","outfile"))
else:
f = open(sys.argv[1],"rb")
con = f.read()
f.close()
@ksoona
ksoona / ripoff-git-kali.sh
Last active December 17, 2015 23:49
how I ripped off Kali and stole all their hard work
for LINE in `curl http://git.kali.org/gitweb/?a=project_index | sort`
do
if [ ! -e "kali/`echo $LINE | awk -F. '{print $1}'`" ]
then
git clone git://git.kali.org/$LINE `echo $LINE | awk -F. '{print $1}'`
else
cd $LINE
git pull
cd ..
fi