Skip to content

Instantly share code, notes, and snippets.

# This script locates potentially dangerous functions that could introduce a vulnerability if they are used incorrectly.
#@author: VDA Labs (Michael Fowl)
#@category Functions
print "Searching for banned functions..."
# Microsoft SDL banned.h list.
blist = (["strcpy", "strcpyA", "strcpyW", "wcscpy", "_tcscpy", "_mbscpy", "StrCpy",
"StrCpyA", "StrCpyW", "lstrcpy", "lstrcpyA", "lstrcpyW", "_tccpy", "_mbccpy",
"_ftcscpy", "strcat", "strcatA", "strcatW", "wcscat", "_tcscat", "_mbscat",
@mfowl
mfowl / ws.harness.py
Created March 4, 2019 19:38
Web Socket Harness
#!/usr/bin/python
import socket,ssl
from BaseHTTPServer import BaseHTTPRequestHandler,HTTPServer
from websocket import create_connection, WebSocket
from urlparse import parse_qs
import argparse
import os
LOOP_BACK_PORT_NUMBER = 8000
@mfowl
mfowl / linked_in_names
Created January 2, 2019 15:36
Mitmproxy script for collecting Linked-In names.
import datetime
import os
import re
def response(flow):
with open('/tmp/linked-in-names-%s.txt' % datetime.datetime.now().date(), "a") as f:
names = re.findall(r'firstName":"[a-zA-Z:",. ]+',flow.response.text)
for name in names:
clean = name.lstrip().rstrip().replace('firstName":"','').replace('","lastName":"',' ').replace('","','').lower()