Skip to content

Instantly share code, notes, and snippets.

@libcrack
libcrack / ipmi.sh
Created May 9, 2024 02:19
Example commands to manage an HPE server iLO via IPMI
#!/usr/bin/env bash
# devnull@libcrack.so
# Thu May 9 04:04:44 CEST 2024
#
# ——————————————————————————————————————————————————————————————————————————————————————————————
#
# $ ipmitool -H 10.10.10.10 -I lanplus -U admin
# Password:
# Unable to Get Channel Cipher Suites
# No command provided!
@libcrack
libcrack / unpack-scexe.sh
Created May 9, 2024 01:37
Script to unpack HPE iLO scexe firmware files
#!/usr/bin/env bash
# devnull@libcrack.so
# Thu May 9 02:27:35 CEST 2024
# This script unpacks HPE iLO4 firmware scexe files
if [[ $# -ne 1 ]]; then
printf "Usage: $0 <CP053894.scexe>\n"
exit 1
fi
@libcrack
libcrack / shellcode_from_file.c
Created July 1, 2023 18:30
Execute shellcode from file
/*
* Exec shellcode from file (no need of -z execstack)
* gcc ./shellcode_from_file.c -o ./shellcode_from_file
*
* Sat Jul 1 20:21:12 CEST 2023
* devnull@libcrack.so
*
* 1. Create a payload:
* msfvenom -p osx/x64/exec CMD=/bin/sh -f raw -o osx-exec.raw
*
@libcrack
libcrack / shellcode_mmap.c
Created July 1, 2023 18:28
Execute shellcode from file using mmap()
/*
* Exec shellcode from file
* gcc ./shellcode_mmap.c -o ./shellcode_mmap
*
* Sat Jul 1 20:21:12 CEST 2023
* devnull@libcrack.so
*
* 1. Create a payload:
* msfvenom -p osx/x64/exec CMD=/bin/sh -f raw -o osx-exec.raw
*
#!/bin/bash
#
# findilos - Search a local network segment for iLOs
# The iLO is the Integrated Lights-Out management processor
# used on HP ProLiant and BladeSystem servers
#
scriptversion="1.0"
#
# Author: iggy@nachotech.com
#
@libcrack
libcrack / PKGBUILD
Created March 3, 2019 23:03
mirrorlist-manager AUR package: PKGBUILD, setup.py, mirrorist-manager.desktop.in
# Bastard System Operator From Hell: <root@localhost.localdomain>
pkgname=mirrorlist-manager
pkgver=1.1
pkgrel=1
pkgdesc="A Qt frontend for Pacman mirrorlist management"
arch=('x86_64')
url="https://github.com/Rizwan-Hasan/ArchLinux-Mirrorlist-Manager"
license=('GPL3')
depends=('python>=3.7.0' 'python-pyqt5>=5.11.2' 'python-sip-pyqt5>=4.19.12' 'pyqt5-common>=5.11.2' 'python-pandas>=0.23.4' 'pacman-contrib')
#!/usr/bin/env bash
# devnull@libcrack.so
# 18/08/2016 05:54:35
#
#
# From man(1) find:
#
# -P Never follow symbolic links. This is the default behaviour. When find
# examines or prints information a file, and the file is a symbolic link,
# the information used shall be taken from the properties of the symbolic
#!/usr/bin/env bash
# devnull@libcrack.so
# 18/08/2016 05:54:35
#
#
# From man(1) find:
#
# -P Never follow symbolic links. This is the default behaviour. When find
# examines or prints information a file, and the file is a symbolic link,
# the information used shall be taken from the properties of the symbolic
@libcrack
libcrack / suidshell.c
Created January 29, 2017 06:02
Suid /bin/sh helper
/*
* root@libcrack.so
* Sun Jan 29 06:57:23 CET 2017
*
* gcc -o /tmp/suidshell suidshell.c
* chown root /tmp/shell
* chmod +s /tmp/shell
*/
#define _GNU_SOURCE
@libcrack
libcrack / letsencrypt.sh
Created January 27, 2017 02:57
LetsEncrypt helper
#!/usr/bin/env bash
# root@libcrack.so
# Fri Jan 27 03:46:04 CET 2017
error(){ printf "\e[0;31m${*}\e[0m\n"; }
success(){ printf "\e[0;32m${*}\e[0m\n"; }
if [ -z "$1" ]; then
error "Usage: $0 host.domain.com"
exit 1