Skip to content

Instantly share code, notes, and snippets.

View numberwhun's full-sized avatar

Jefferson Kirkland numberwhun

View GitHub Profile
def extract_values(obj, key):
"""Recursively pull values of specified key from nested JSON."""
arr = []
def extract(obj, arr, key):
"""Return all matching values in an object."""
if isinstance(obj, dict):
for k, v in obj.items():
if isinstance(v, (dict, list)):
extract(v, arr, key)
@numberwhun
numberwhun / All_the_Wget_Commands_You_Should_Know
Created March 10, 2015 17:30
All the Wget Commands You Should Know
From: http://www.labnol.org/software/wget-command-examples/28750/
How do I download an entire website for offline viewing? How do I save all the MP3s from a website to a folder on my computer? How do I download files that are behind a login page? How do I build a mini-version of Google?
Wget is a free utility – available for Mac, Windows and Linux (included) – that can help you accomplish all this and more. What makes it different from most download managers is that wget can follow the HTML links on a web page and recursively download the files. It is the same tool that a soldier had used to download thousands of secret documents from the US army’s Intranet that were later published on the Wikileaks website.
You mirror an entire website with wget
Mirror an entire website with wget
Spider Websites with Wget – 20 Practical Examples
@numberwhun
numberwhun / Penetration Tester Links
Last active June 24, 2021 19:35
Penetration Tester Links
@numberwhun
numberwhun / diabetes bg data links
Last active June 19, 2021 08:26
diabetes bg data links
@numberwhun
numberwhun / Passive WiFi Tracking
Created December 15, 2014 19:17
Passive WiFi Tracking
Passive WiFi Tracking
Posted February 26, 2014 by Edward
Borrowed from: http://edwardkeeble.com/2014/02/passive-wifi-tracking/
In the last year or so, there have been quite a few stories on the use of passive WiFi tracking by advertisers, retailers, and analytics startups. Most of these articles focus on the significant privacy and security concerns associated with this practice, but few of them get into the details of how the technology works. Having built a similar system for my project, Casual Encounters, I think I can explain some of the inner workings of these systems, how to avoid being tracked, and how, for research purposes or to determine their own level of exposure, someone could build such a system. I will state that I am by no means an expert on wireless networks, signal analysis, or anything of the sort, but I have conducted a fair bit of research and trial and error, and it works for me. Your mileage may vary; don’t try this at home; etc, etc.
Probe Requests
When a WiFi client (phone, laptop
@numberwhun
numberwhun / Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
Created July 18, 2016 02:44
Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
Hacking is an art of finding bugs and flaws in a perfect software which will allow cyber criminals to exploit it for their own malicious gains. Hackers are mostly able to spot the flaws and bugs on their own but sometimes it is worthwhile to use a automated software to find these bugs and holes. A vulnerability scanner is such a automated software which has specifically been written to find such flaw.
Vulnerability Scanner is a specialised software build with a sole purpose of helping security researchers, hackers, system admins and developers to find faults in a particular software, computer system, network and servers. A hacker or security researcher is complemented in his manual testing of software or computer by using such vulnerability scanner making the hackers assessment efficient.
This article brings out such top 10 vulnerability scanner tools available to help hackers and security researchers in their security testing mission.
@numberwhun
numberwhun / Ten_Immutable_Laws_Of_Security
Created June 22, 2016 22:14
Ten_Immutable_Laws_Of_Security
“Ten Immutable Laws Of Security”:
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore.
Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore.
Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.
Law #4: If you allow a bad guy to run active content in your website, it’s not your website any more.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy.
Law #7: Encrypted data is only as secure as its decryption key.
Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.
@numberwhun
numberwhun / PenTesting_Links
Last active April 3, 2021 13:21
PenTesting_Links
@numberwhun
numberwhun / Penetration tests: 10 tips for a successful program
Created July 2, 2016 04:46
Penetration tests: 10 tips for a successful program
Penetration tests need to accomplish business goals, not just check for random holes. Here's how to get the most value for your efforts.
Why are you performing penetration tests? Whether you're using an internal team, outside experts or a combination of the two, are you simply satisfying regulatory or audit requirements, or do you actually expect to improve enterprise security?
We asked penetration testing experts for guidance on how to improve your program to get the most benefit for your time, money and effort. If you turn to outside expertise, their advice will show you what to expect and demand from consultants. The following 10 tips will show you understand the goal and focus of your testing; develop effective testing strategies; make effective use of your personnel; and make the most effective use of pen test results to remediate issues, improve processes and continuously improve enterprise security posture.
Penetration Test Tip 1: Define Your Goals
Penetration testing—really, all information securi
@numberwhun
numberwhun / osi_model
Created November 16, 2016 00:04
osi_model
What is OSI model?
The OSI model (Open System Interconnection) model defines a computer networking framework to implement protocols in seven layers. A protocol in the networking terms is a kind of negotiation and rule in between two networking entities.
Layers of OSI model:
Physical layer
The Physical layer is also called as the Layer 1. Here are the basic functionalities of the Physical layer:
Responsible for electrical signals, light signal, radio signals etc.
Hardware layer of the OSI layer