Skip to content

Instantly share code, notes, and snippets.

@n1nj4sec
n1nj4sec / extract_and_scramble_hashcat_hash.sh
Created March 28, 2022 08:24 — forked from loren-osborn/extract_and_scramble_hashcat_hash.sh
script to extract (and then scramble) macOS user password hash from system .plist file
#!/bin/bash
extractOsXUserHash() {
xmlOfUsertPlist="$( \
plutil -convert xml1 - -o - \
)"
if [ -z "$xmlOfUsertPlist" ] ; then \
1>&2 echo "No input detected"
exit 127
fi
@n1nj4sec
n1nj4sec / dump_pupyconfig.py
Created October 8, 2019 08:43
A little forensic script to extract a pupy payload's config.
#!/usr/bin/env python
# -*- coding: UTF8 -*-
import sys
import struct
import pylzma
if __name__=="__main__":
data=b""
found=False

Keybase proof

I hereby claim:

  • I am n1nj4sec on github.
  • I am n1nj4sec (https://keybase.io/n1nj4sec) on keybase.
  • I have a public key ASDpWv_5VQ_kN-xV-gM3EZx76oA9Fb2P1o8dp77o6x5D2Qo

To claim this, I am signing this object: