Skip to content

Instantly share code, notes, and snippets.

View obihann's full-sized avatar

Jeffrey Hann obihann

View GitHub Profile

Installation

mkdir -p ~/esp
cd ~/esp
git clone --recursive https://github.com/espressif/esp-idf.git
. $HOME/esp/esp-idf/export.sh
cd ~
git clone https://github.com/hackgnar/ble_ctf.git
make menuconfig # enable Bluetooth and set serial connection, disable new warnings introduced in gcc 6-8
@obihann
obihann / track-unknown.sh
Last active April 26, 2020 23:21
Track calls in SDRTrunk that have no alias
awk -F ',' '{print $6}' ~/SDRTrunk/event_logs/*_call_events.log | grep -v TO | grep -v "\"\"" | sed "s/\"//g" | sort -u > ~/mpsnr.log
while read call; do if ! grep -q "$call" ~/SDRTrunk/playlist/default.xml; then grep "$call" ~/trs.csv; fi; done < ~/mpsnr.log 2>/dev/null

Keybase proof

I hereby claim:

  • I am obihann on github.
  • I am obihann (https://keybase.io/obihann) on keybase.
  • I have a public key whose fingerprint is 0FFD 4C0B FD13 AA81 ED15 C543 AC4B C93B 2038 8632

To claim this, I am signing this object:

@obihann
obihann / hashes.pwdump
Last active May 13, 2019 12:23
hashcat tests
123456::44EFCE164AB921CAAAD3B435B51404EE:32ED87BDB5FDC5E9CBA88547376818D4:::
password::E52CAC67419A9A224A3B108F3FA6CB6D:8846F7EAEE8FB117AD06BDD830B7586C:::
password1::E52CAC67419A9A2238F10713B629B565:5835048CE94AD0564E29A924A03510EF:::
PassworD::E52CAC67419A9A224A3B108F3FA6CB6D:7B41DCEC483F64B9319288D1B265387C:::
1PassworD::DCAA79B6FE1CE7C702657A8D8EF025E2:D8B3962C0B98D657CB2DD0D529E16F22:::
wertwerhl::7593EE7A813CCC58EB90FCD89E798A49:3063B437FA1CA6E8EE9287D3A8611391:::
34jk345gh::F31DEBB8CAC86467492929A2C3B5A9F4:A33CA424AC3004C74D215346AFA1FD01:::
%h32@##HD::2DCEEC91A2AA321F16743D83C7924B3E:E282ACE800FB2722002217FE8AAD3129:::
@obihann
obihann / README.md
Last active April 8, 2019 15:32
Poll GitHub API for gists and search them for keywords. Useful for identifying leaked data.
@obihann
obihann / gist:ff5df377fa57830fb6fb3ff10c41db23
Last active March 25, 2019 12:25
grep for common comment strings
grep -rniE "[ ]?\W\D(todo|fixme|hack|xxx|note|optimize|bug|wtf|later|lazy|why|fix)" *
grep -riEn --include=\*.php "(todo|hack|wtf|fixme|later|lazy|why|xxx|note|(^|[^e])bug|optomize|shit|fuck|damn)" ./
grep -riEn --exclude=\*.css "(todo|hack|wtf|fixme|later|lazy|why|xxx|note|(^|[^e])bug|optomize|shit|fuck|damn)" ./
grep --color=always -riEn "(todo|hack|wtf|fixme|later|lazy|why|xxx|note|(^|[^e])bug|optomize|shit|fuck|damn)" ./
@obihann
obihann / http-enum.py
Last active March 20, 2019 15:56
OSCP Scripts
#!/usr/bin/python
import os, sys, argparse, datetime
def scan(cmd, ip, dir, log, name, tool):
print("[%s / %s] %s starting...." % (ip, name, tool))
os.system(cmd)
print("\tLog: %s" % log)
print("\tResults: %s" % dir)
print("[%s / %s] %s complete." % (ip, name, tool))
@obihann
obihann / web-runner.sh
Created March 13, 2019 11:23
quick web enumeration script (quick as in to write, not to execute... it could be better)
#!/bin/sh
HOST=$1
UA='Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36'
DATE=$(date +%Y%m%d)
WORDS="/usr/share/wordlists/seclists/Discovery/Web-Content/common.txt"
whatweb --colour=never --log-brief=whatweb_"$HOST"_"$DATE".log "$HOST"
gobuster -n -q -r -e -t 30 \
-w "$WORDS" \
cat ping_10.11.1.0_24_20190106.gnmap
cut -d ' ' -f 2 ping_10.11.1.0_24_20190106.gnmap | sed '/^[0-9].*/!d' | sort -u -o ips_10.11.1.0_24
shuf -n 3 ips_10.11.1.0_24.txt | nmap -sT -A -T5 --open --script=default,vuln -oA nse_$(date +%Y%m%d) -iL -
$wshell = New-Object -com "Wscript.Shell"
Sleep 5
$wshell.SendKeys('abc123')