Skip to content

Instantly share code, notes, and snippets.

View magnologan's full-sized avatar

Magno Logan magnologan

View GitHub Profile
@Proteas
Proteas / PoC.m
Last active July 7, 2023 10:22 — forked from LinusHenze/PoC.m
A PoC for CVE-2023-28206
//
// PoC.m
// IOSABugTrigger
//
// Created by Linus Henze on 2023-04-08.
// Copyright © 2023 Pinauten GmbH. Some rights reserved.
//
//
// This is a PoC for CVE-2023-28206, triggering an oob memmove in IosaColorManagerMSR8::getHDRStats_gatedContext
@yardenshafir
yardenshafir / vulnerable_drivers_hvci_bypass
Created May 22, 2023 16:17
Vulnerable drivers from loldrivers.io that load with HVCI blocklist version 25314
- 0a6a1c9a7f80a2a5dcced5c4c0473765.bin
- 0c0195c48b6b8582fa6f6373032118da.bin
- 0d5774527af6e30905317839686b449d.bin
- 045ef7a39288ba1f4b8d6eca43def44f.bin
- 07efb8259b42975d502a058db8a3fd21.bin
- 0898af0888d8f7a9544ef56e5e16354e.bin
- 08c1bce6627764c9f8c79439555c5636.bin
- 09672532194b4bff5e0f7a7d782c7bf2.bin
- 0dff47f3b14fb1c1bad47cc517f0581a.bin
- 0fc2653b1c45f08ca0abd1eb7772e3c0.bin
- Threat Modelling / Code Review —
Resources-for-Application-Security
How to prepare for a security engineer interview by Eray Mitrani
Security_Engineer_Interview_Questions by Tad Whitaker
Security Engineer - Interview Questions by Namish
loader:
project_id: 3074491541
domain: dgormiugatox.com
bot:
c2s:
- skaiortalop.com
- ijoyzymama.com
- ertusaporf.com
- elcapolis.com
- lezhidov.cloud
@righettod
righettod / portswigger-webacademy-status-check.ps1
Last active September 2, 2022 16:48
Quick PowerShell functions to identify any courses or labs missed from the Portswigger WebAcademy courses.
function Test-WebAcademy-Labs-Status($sessionCookieValue){
$storageFile="$env:USERPROFILE\.webacademy-labs-status"
$session = New-Object Microsoft.PowerShell.Commands.WebRequestSession
$cookie = New-Object System.Net.Cookie
$cookie.Name = "SessionId"
$cookie.Value = $sessionCookieValue
$cookie.Domain = ".portswigger.net"
$session.Cookies.Add($cookie);
Write-Host "[i] Status storage file: $storageFile" -ForegroundColor Cyan
Write-Host "[+] Retrieving labs status from PortSwigger labs web page..." -ForegroundColor Yellow
@rqu1
rqu1 / checkmk.py
Last active November 13, 2023 22:07
check if a PAN firewall is using the default master key when globalprotect is enabled
from hashlib import md5, sha1
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.backends import default_backend
from base64 import b64encode, b64decode
import sys, time
import requests
DEFAULT_MASTERKEY=b'p1a2l3o4a5l6t7o8'
class PanCrypt():

IAM Tips

Those tips where posted between June and July 2022 on LinkedIn by Roberto Migli.

#IAM tip #1: There are 4 main types of IAM policies: Identity-based policies, resource-based policies, permissions boundaries, Organizations SCPs and Session Policies. Matt Luttrell's blog post will guide you through when and how to use them.

HowAndWhenWithRolesBlog

@aviadhahami
aviadhahami / install.sh
Created June 21, 2022 11:49
Download, build and install all python 3.x versions
#!/bin/bash
# Verify we have wget and build tools
apt-get update && apt-get install -y wget gcc make
# add or remove python versions; full index @ https://www.python.org/ftp/python/
cd /tmp &&\
wget https://www.python.org/ftp/python/3.5.10/Python-3.5.10.tgz &&\
wget https://www.python.org/ftp/python/3.6.9/Python-3.6.9.tgz &&\
wget https://www.python.org/ftp/python/3.7.9/Python-3.7.9.tgz &&\
@righettod
righettod / identify-log4j-class-location.sh
Last active January 17, 2022 12:01
Script to identify Log4J affected class for CVE-2021-44228 in a collection of ear/war/jar files
#!/bin/bash
#########################################################################################################
# Script to identify Log4J affected class for CVE-2021-44228 in a collection of EAR/WAR/JAR files
# Based on this script:
# https://github.com/righettod/toolbox-pentest-web/blob/master/scripts/identify-class-location.sh
#########################################################################################################
if [ "$#" -lt 1 ]; then
script_name=$(basename "$0")
echo "Usage:"
echo " $script_name [BASE_SEARCH_FOLDER]"