Skip to content

Instantly share code, notes, and snippets.

@nmcv
nmcv / snitchkiller.sh
Created April 30, 2013 23:15
Little Snitch 3 trial reset
#!/bin/bash
kill -9 `ps auxc | grep "Little Snitch Daemon" | awk '{print $2}'`;
echo "Killed Little Snitch Daemon" > /tmp/snitchkiller.log;
date >> /tmp/snitchkiller.log;
@nmcv
nmcv / msec.exploitable.bat
Created August 1, 2013 07:57
Batch script for standalone usage of MSEC extension of WinDBG (!exploitable). Good if you have a bunch of crash reports and you need to analyze them thru in bulk. Original @ http://msecdbg.codeplex.com/discussions/56156
@echo off
setlocal ENABLEEXTENSIONS
@REM get local Path of script
for /F %%I in ("%0") do set localDir=%%~dpI
@REM Check for MSEC.dll in current directory, and in script directory
if not exist .\msec.dll (
if not exist %localDir%\msec.dll (
echo.
echo MSEC.dll not in current directory, please copy MSEC.dll locally and
@nmcv
nmcv / bash_xor.txt
Created February 1, 2013 11:02
Quick XOR of hexadecimal strings for BASH
# BASH function to get the result
# of a ^ b when a, b are in the
# following hexadecimal string
# form: AF396463D8705 ...
# Obtained from here:
# http://www.codeproject.com/Tips/470308/XOR-Hex-Strings-in-Linux-Shell-Script
# Author is Sanjay1982 (see http://www.codeproject.com/Members/Sanjay1982)
# Usage:
@nmcv
nmcv / brute_server.py
Created February 24, 2014 10:53
Codegate 2014 web "120" PoC
#!/bin/env python3
import string
import urllib
from urllib.request import urlopen
import requests # <- bitch (always URL-encodes POST data)
url = "http://58.229.183.24/5a520b6b783866fd93f9dcdaf753af08/index.php"
cookie_jar = []
cnt = 0
@nmcv
nmcv / sqlite_shell.py
Created June 9, 2014 17:19
Minimal SQLite shell from Python docs
# A minimal SQLite shell for experiments
import sqlite3
con = sqlite3.connect(":memory:")
con.isolation_level = None
cur = con.cursor()
buffer = ""

A Trello Board

[![Trello Development Board](https://trello.com/b/nC8QJJoZ.png)](https://trello.com/b/nC8QJJoZ)

Trello Development Board

A Trello Card

@nmcv
nmcv / csaw2013-web400-tamper.py
Created September 25, 2013 06:50
CSAW2013 web400 tamper script for sqlmap
#!/usr/bin/env python
from lib.core.enums import PRIORITY
import phpserialize
import urllib
import base64
import hashlib
__priority__ = PRIORITY.HIGHEST
@nmcv
nmcv / web400.py
Created September 24, 2013 14:25
(CSAW2013 web400 #1) Enumerate all widgets
#!/usr/bin/env python
import requests
import pprint
cookie_jar = \
{
"PHPSESSID": "g53q6qct4l2bbgs1p5t48denf1",
"widget_tracker": "YTozOntpOjA7aTo1MzMwO2k6MTtpOjUzMzc7aToyO2k6NTM0MDt9",
"widget_validate": "05963d6a3e0abdc7df29beae3c68c6e933d4021446f060024aa4b8fa9cf61928748d4a93bce9209a106db6ef8dbba2ddf8aa0ef105bb11ec0b911a9e513718f"
@nmcv
nmcv / leet_speak.py
Created September 7, 2013 11:55
Simple python script to convert stdin to 13375p34k with limited dictionary
#!/usr/bin/env python
''' Simple Python script to convert STDIN to 13375p34k with limited dictionary '''
'''
Usage:
$ chmod +x leet_speak.py
$ echo "All your base are belong to us" | leet_speak.py
'''
# All credit: http://stackoverflow.com/questions/4006324/how-to-atomically-delete-keys-matching-a-pattern-with-redis
redis-cli [options] KEYS "prefix:*" | xargs redis-cli [options] DEL