Skip to content

Instantly share code, notes, and snippets.

Exploits

EGREGIOUSBLUNDER

A remote code execution exploit for Fortigate firewalls that exploits a HTTP cookie overflow vulnerability. It affects models 60, 60M, 80C, 200A, 300A, 400A, 500A, 620B, 800, 5000, 1000A, 3600, and 3600A. The model of the firewall is detected by examining the ETag in the HTTP headers of the firewall. This is not CVE-2006-6493 as detected by Avast.

ELIGIBLEBACHELOR

@p3t3r67x0
p3t3r67x0 / iptables_ubuntu.md
Last active September 3, 2017 23:40
Iptables for Ubuntu Desktop 16.04 with default DROP policy

Iptables for Ubuntu Desktop 16.04

With these rules you are able to protect yourself a tiny bit

  • You are able to do open website in your browser or terminal
  • You are able to reviece and send mails with e. g. Thunderbird
  • You are able to ping any device you want from you machine
  • You are able to connect yourself to a remote secure shell
  • You are able to retrieve a dhcp lease from your router
@p3t3r67x0
p3t3r67x0 / zip_codes.csv
Last active December 28, 2016 20:07
A sorted list of german zip codes
We can't make this file beautiful and searchable because it's too large.
"zip","city","state","citizen"
"01067","Dresden","Sachsen","11957"
"01069","Dresden","Sachsen","25484"
"01097","Dresden","Sachsen","14924"
"01099","Dresden","Sachsen","27974"
"01108","Dresden","Sachsen","5876"
"01109","Dresden","Sachsen","20010"
"01127","Dresden","Sachsen","14991"
"01129","Dresden","Sachsen","18915"
"01139","Dresden","Sachsen","17555"
@p3t3r67x0
p3t3r67x0 / get_server_cert.py
Last active June 2, 2021 08:08
Simple script to extract the server cert of a given domain
#!/usr/bin/env python
# -*- coding: utf-8 -*-
import ssl
import OpenSSL
cert = ssl.get_server_certificate(('google.de', 443))
x509 = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM, cert)
print 'Expired: {}'.format(x509.has_expired())
@p3t3r67x0
p3t3r67x0 / extract_links.py
Created January 26, 2017 21:31
Extract links from a given html document with you must call as first argument
@p3t3r67x0
p3t3r67x0 / extract_records.py
Last active January 29, 2017 22:30
Retrieves domains from the database and tries to get records for each entry and updates the database when neccessary
#!/usr/bin/env python
from dns import resolver
from dns.name import EmptyLabel
from dns.resolver import NoAnswer
from dns.resolver import NXDOMAIN
from pymongo import MongoClient
from pymongo.errors import DuplicateKeyError
@p3t3r67x0
p3t3r67x0 / extract_arte_mp4.py
Last active October 29, 2017 15:59
Extract mp4 url from ARTE.tv and a proper title
#!/usr/bin/env python
# -*- coding: utf-8 -*-
import sys
import json
import requests
from lxml import html
from urlparse import urlparse
from fake_useragent import UserAgent

You need to add the following entry in /etc/apt/sources.list or a new file in /etc/apt/sources.list.d/:

deb http://deb.torproject.org/torproject.org xenial main
deb-src http://deb.torproject.org/torproject.org xenial main

Then add the gpg key used to sign the packages by running the following commands at your command prompt: