Skip to content

Instantly share code, notes, and snippets.

View oxagast's full-sized avatar
🔨
Probably breaking your code.

Mark Stealer Whitehall oxagast

🔨
Probably breaking your code.
View GitHub Profile
@oxagast
oxagast / suricata.service
Created May 17, 2021 13:26 — forked from stupidpupil/suricata.service
Suricata systemd file
[Unit]
Description=Suricata IDS/IDP daemon
After=network.target
Requires=network.target
Documentation=man:suricata(8) man:suricatasc(8)
Documentation=https://redmine.openinfosecfoundation.org/projects/suricata/wiki
[Service]
Type=forking
Environment=LD_PREDLOAD=/usr/lib/libtcmalloc_minimal.so.4
@oxagast
oxagast / ovpn-writer.sh
Last active July 10, 2023 03:39 — forked from renatolfc/ovpn-writer.sh
Script to generate an OpenVPN client configuration file in the unified format
#!/bin/sh
##
## Usage: ./ovpn-writer.sh SERVER CA_CERT CLIENT_CERT CLIENT_KEY > client.ovpn
##
server=${1?"The server address is required"}
cacert=${2?"The path to the ca certificate file is required"}
client_cert=${3?"The path to the client certificate file is required"}
client_key=${4?"The path to the client private key file is required"}
@oxagast
oxagast / cache_rebuild.sh
Last active December 8, 2021 01:25
Dissassembles all binaries in a directory and sorts by most used processor instructions
# finds and sorts most commonly used processor instructions from raw objdump dissassembley.
objdump -D /bin/bash | grep -E " .{6,}:" | grep -v '(bad)' | cut -d ':' -f 2 | sort -b -t, -nk2 | uniq -c | sort -n -r | grep -E "\s+[[:digit:]]+\s+.{12,}$" | head -n 15
for i in {1..10000};
do
curl "https://api.github.com/users/KevinHock/following?per_page=100&page=${i}" -s | tee -a github.ids; # KevinHock follows everyone
sleep 300; # sleep 5 min between pages or rate limit kicks in soon
done;
cat github.ids | grep true -B 18 -A 1 | grep login | cut -d '"' -f 4 | xargs -I {LOGIN} curl "https://api.github.com/users
/{LOGIN}" -s | sed -e 's/}/},/' > github_admins.txt
cat github_admins.txt;
@oxagast
oxagast / qg.c
Last active February 24, 2023 07:10
Shortest working C quine, works on a nuance of compilers and linkers.
/* touch qg.c && gcc qg.c -o gg.o -c && ld gg.o -o quine 2>/dev/null && ./quine | cat */
subnet 10.0.0.0 netmask 255.0.0.0 {
# filename "pxe/pxelinux.0";
next-server 10.1.1.1;
if substring (option vendor-class-identifier, 15, 5) = "00007" {
filename "/grubx64.efi";
}
else {
filename "/pxelinux.0";
}
# All scripts
```
--tamper=apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,randomcomments,securesphere,space2comment,space2dash,space2hash,space2morehash,space2mssqlblank,space2mssqlhash,space2mysqlblank,space2mysqldash,space2plus,space2randomblank,sp_password,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords
```
# General scripts
```
--tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes
```
# Microsoft access
```
### oxagast ###
# jump to an arbitrary function via buffer overflow
FUNCTION="spawnme";
BINARY="./bo";
OTHEROPTS="a";
BUFFERLEN=16;
@oxagast
oxagast / wifihuh.txt
Created April 26, 2020 05:38
Saw this SSID, huh
[kali@kali]{01:28 AM}: [~] $ sudo iw dev wlan0 scan | grep "BSS 88:de:a9:68:04:27" -A 78
BSS 88:de:a9:68:04:27(on wlan0)
last seen: 2116.208s [boottime]
TSF: 1121530265658 usec (12d, 23:32:10)
freq: 2437
beacon interval: 100 TUs
capability: ESS Privacy SpectrumMgmt ShortSlotTime (0x0511)
signal: -90.00 dBm
last seen: 512 ms ago
SSID: \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
@oxagast
oxagast / pentest_tools.txt
Last active March 1, 2021 04:12
List of my favorite penetration testing tools (not all hacking related)
--== My favorite penetration testing tools ==--
--== Notes ==--
This list is far from complete, and not everything on the list is specifically a "hacker tool"
--== List ==--
Wireshark
Valgrind
dnscat
dns2tcp
XSSer
curl/wget