Skip to content

Instantly share code, notes, and snippets.

Mike McCabe mccabe615

  • DC
Block or report user

Report or block mccabe615

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@mccabe615
mccabe615 / delete-lambda.sh
Last active Jan 23, 2020
Bash script to download the lambda code and delete it
View delete-lambda.sh
while IFS="" read -r p || [ -n "$p" ];
do
if [ -z $1 ]; then
echo "Error: must supply a filename with line delimited values"
echo "Usage: delete-lambda.sh <filename>"
exit 1
fi
timestamp=$(date +%s)
@mccabe615
mccabe615 / android-burp-cert.sh
Created Sep 25, 2019 — forked from vavkamil/android-burp-cert.sh
One Liner For Installing Burp Certificate Into Android Nougat and Later
View android-burp-cert.sh
# https://securitychops.com/2019/08/31/dev/random/one-liner-to-install-burp-cacert-into-android.html
#
curl --proxy http://127.0.0.1:8080 -o cacert.der http://burp/cert \
&& openssl x509 -inform DER -in cacert.der -out cacert.pem \
&& cp cacert.der $(openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1).0 \
&& adb root \
&& adb remount \
&& adb push $(openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1).0 /sdcard/ \
&& echo -n "mv /sdcard/$(openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1).0 /system/etc/security/cacerts/" | adb shell \
&& echo -n "chmod 644 /system/etc/security/cacerts/$(openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1).0" | adb shell \
@mccabe615
mccabe615 / hosts.sh
Created Feb 3, 2019
Determine number of hosts for subnet from file
View hosts.sh
while IFS="" read -r p || [ -n "$p" ];
do
printf '%s' "$p -- Hosts: ";
subnetcalc $p|grep "Max. Hosts"|awk '{ print $4 }';
done < hosts.txt
# while IFS="" read -r p || [ -n "$p" ]; do printf '%s' "$p -- Hosts: "; subnetcalc $p|grep "Max. Hosts"|awk '{ print $4 }'; done < hosts.txt
@mccabe615
mccabe615 / iterm2-solarized.md
Created Feb 2, 2019 — forked from kevin-smets/iterm2-solarized.md
iTerm2 + Oh My Zsh + Solarized color scheme + Meslo powerline font + [Powerlevel9k] - (macOS)
View iterm2-solarized.md

Default

Default

Powerlevel9k

Powerlevel9k

@mccabe615
mccabe615 / autonomous.md
Last active Dec 11, 2018 — forked from benjamincharity/autonomous.txt
Instructions on how to reset the autonomous desk. This fixes a problem where the desk will not lower.
View autonomous.md

Reset Steps:

  • Unplug the desk for 20 seconds. Plug it back in. Wait a full 20 seconds.
  • Press the up and down buttons until the desk lowers all the way and beeps or 20 seconds pass.
  • Release both buttons.
  • Press the down buttons until the desk beeps one more time or 20 seconds pass.
View jwtex_test.go
package jwtex
import (
"encoding/base64"
"encoding/json"
"fmt"
"strings"
"testing"
)
@mccabe615
mccabe615 / ioshacking.md
Last active Jan 20, 2020
iOS hacking steps
View ioshacking.md

list signing keys

security find-identity -v -p codesigning

patch IPA

objection patchipa --source "outlook.ipa" --codesign-signature 7836F9FC5FD55E48326EA8A1854D030551F413A8

jailbreak

electra

View nmap discovery.md

nmap -sV -vv -Pn 123.123.123.123 -oN outputfile.txt

@mccabe615
mccabe615 / burpEntRequiredPorts.md
Created Sep 15, 2018
Required ports for Burp enterprise
View burpEntRequiredPorts.md

Users and API clients need to access the web server on a port that you can select (by default, 8080). The Enterprise server needs to access portswigger.net on port 443, to carry out license activation and software updates. Note that this access is needed for ongoing usage of the software, not only during initial installation. You can configure a network proxy if this is needed to reach the public web. If you install agents on any external machines, these need to access the Enterprise server machine on port 8072. If you use the bundled database, then any external agent machines will need to access the Enterprise server machine on port 9092. If you use an external database, then the Enterprise server and any external agents will need to access the database service on the configured host and port. Agents will need to access the sites that are to be scanned (on ports 80, 443, etc. as required). To gain the full benefit of Burp Suite’s out-of-band vulnerability detection technology, agents will need to access burp

@mccabe615
mccabe615 / firefox_settings.md
Last active Sep 7, 2018
Firefox settings for testing
View firefox_settings.md

In about:config in Firefox, all of the below should be set to false

  • network.captive-portal-service.enabled
  • extensions.getAddons.cache.enabled
  • network.prefetch-next
  • browser.newtabpage.enabled
  • toolkit.telemetry.archive.enabled = false
  • toolkit.telemetry.enabled = false
  • toolkit.telemetry.rejected = true
You can’t perform that action at this time.