Skip to content

Instantly share code, notes, and snippets.

View rishdang's full-sized avatar

Rishabh Dangwal rishdang

View GitHub Profile
@rishdang
rishdang / teamviewer_password_decrypt.py
Created February 4, 2020 05:36
This is a quick and dirty Teamviewer password decrypter basis wonderful post by @whynotsecurity
import sys, hexdump, binascii
from Crypto.Cipher import AES
class AESCipher:
def __init__(self, key):
self.key = key
def decrypt(self, iv, data):
self.cipher = AES.new(self.key, AES.MODE_CBC, iv)
return self.cipher.decrypt(data)
@rishdang
rishdang / trimmed.wix
Last active April 26, 2018 09:34 — forked from xpn/msigen.wix
Trimmed & cleaned original code
<?xml version="1.0"?>
<Wix xmlns="http://schemas.microsoft.com/wix/2006/wi">
<Product Id="*" UpgradeCode="00000000-0000-0000-0000-111111111111" Name="PrivEsc POC" Version="0.0.1" Manufacturer="@_xpn_" Language="1033">
<Package InstallerVersion="200" Compressed="yes" Comments="PrivEsc POC"/>
<Directory Id="TARGETDIR" Name="SourceDir">
<Component Id="ApplicationFiles" Guid="11111111-1111-1111-1111-222222222222"></Component>
</Directory>
<Feature Id="AppFiles" Level="1">

Keybase proof

I hereby claim:

  • I am rishdang on github.
  • I am rdangwal (https://keybase.io/rdangwal) on keybase.
  • I have a public key whose fingerprint is E30E 84CB 2386 D156 1A53 9BAB 47F4 04E0 9383 B9D5

To claim this, I am signing this object: