Skip to content

Instantly share code, notes, and snippets.

View nabla-c0d3's full-sized avatar
🌴

Alban Diquet nabla-c0d3

🌴
View GitHub Profile
@nabla-c0d3
nabla-c0d3 / gist:715cdfe2ffb9d13726eb
Created March 2, 2015 06:00
MitM Script for XMPP StartTLS Stripping
#!/usr/bin/env python
import sys, socket, thread, ssl
from select import select
HOST = '0.0.0.0'
PORT = 5222
BUFSIZE = 4096
# Change this with the first two bytes of the SSL client hello
@nabla-c0d3
nabla-c0d3 / gist:961af2560634ff53cb77
Created March 2, 2015 06:04
HTML Payload to send a POST request via JS
<html>
<head>
<script>
function postData(url, body) {
var http = new XMLHttpRequest;
http.open("POST", url, true);
http.setRequestHeader('Content-Type', 'text/xml');
http.withCredentials = 'true';
http.onreadystatechange = function() {
if(http.readyState == 4) {
@nabla-c0d3
nabla-c0d3 / gist:1b50a21bff7220683e91
Last active August 29, 2015 14:19 — forked from jimbojsb/gist:1630790
Syntax coloring on OS X

Step 0:

Get Homebrew installed on your mac if you don't already have it

Step 1:

Install highlight. "brew install highlight". (This brings down Lua and Boost as well)

Step 2:

@nabla-c0d3
nabla-c0d3 / gist:f952c6fcc1e9d359dbfe
Last active December 22, 2022 12:47
Hooking a variadic function with Cydia Substrate
//
// LibC.m
//
// Created by Alban Diquet on 5/14/14.
// Copyright (c) 2014 Alban Diquet. All rights reserved.
//
#import <CydiaSubstrate.h>
#import "LibC.h"

Keybase proof

I hereby claim:

  • I am nabla-c0d3 on github.
  • I am nabla (https://keybase.io/nabla) on keybase.
  • I have a public key whose fingerprint is C6EE 0C3B 35FB A053 DE97 DB7E E889 2555 B489 B47B

To claim this, I am signing this object:

from pympler import tracker
from sslyze.plugins.certificate_info_plugin import CertificateInfoScanCommand
from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError
from sslyze.ssl_settings import TlsWrappedProtocolEnum
from sslyze.synchronous_scanner import SynchronousScanner
from sslyze.plugins.openssl_cipher_suites_plugin import Tlsv10ScanCommand
from sslyze.plugins.openssl_cipher_suites_plugin import Tlsv11ScanCommand
memory_tracker = tracker.SummaryTracker()
from pympler import tracker
from nassl.ssl_client import OpenSslVersionEnum, OpenSslVerifyEnum
import socket
from nassl.legacy_ssl_client import LegacySslClient, SslClient
memory_tracker = tracker.SummaryTracker()
for i in range(20):
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
from pympler import tracker
from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError
from sslyze.ssl_settings import TlsWrappedProtocolEnum
memory_tracker = tracker.SummaryTracker()
# Setup the server to scan and ensure it is online/reachable
hostname = 'smtp.gmail.com'
for i in range(20):
try:
set _NT_SYMBOL_PATH=D:\Python36;srv*c:\mycache*https://msdl.microsoft.com/download/symbols
set OANOCACHE=1
"C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -p:14724 -f:.\umdh1.txt
"C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\umdh.exe" -d .\umdh1.txt .\umdh2.txt > .\umd12.txt
@nabla-c0d3
nabla-c0d3 / sslyze_robot.py
Last active December 18, 2017 06:01
Scanning for the ROBOT Vulnerability at Scale
from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult
from sslyze.plugins.robot_plugin import RobotScanCommand, RobotScanResultEnum
from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError
from sslyze.ssl_settings import TlsWrappedProtocolEnum
SERVERS_TO_SCAN = [
('www.google.com', 443, TlsWrappedProtocolEnum.HTTPS),
('smtp.gmail.com', 587, TlsWrappedProtocolEnum.STARTTLS_SMTP),
('imap.gmail.com', 993, TlsWrappedProtocolEnum.PLAIN_TLS),