Skip to content

Instantly share code, notes, and snippets.

@sh4dowb
sh4dowb / stake_limbo_verify.py
Created December 8, 2021 23:49
verify stake.com limbo outcome with python
import hmac
import hashlib
def getLimboOutcome(server, client, nonce):
server = server.encode()
client = client.encode()
nonce = str(nonce).encode()
round = 0
hash = hmac.new(server, client+b':'+nonce+b':'+str(round).encode('utf-8'), hashlib.sha256).digest()
first4 = hash[:4]
@sh4dowb
sh4dowb / retrieve_password.py
Created September 1, 2019 09:29
Chromium Linux Password Retriever (Decryption support)
# source: https://stackoverflow.com/questions/23153159/decrypting-chromium-cookies
# just put a few answers together for a working script
# python3 retrieve_password.py
# outputs passwords.csv
import secretstorage
import sqlite3
import os
import csv
from Crypto.Cipher import AES
@sh4dowb
sh4dowb / fuck-ethereum.py
Last active December 8, 2022 02:56
run a fucking ethereum VERY LIGHT client that uses cloudflare rpc
"""
do you have an app that fucking supports geth only?
and after new cryptobros got high and decided you should have at least 1 TB SSD and 10 fucking free days to synchronize to run a "fast" node, you can't be fucking bothered?
well I did, and there you fucking go. this fucking shit gets all stupid motherfucking data from cloudflare and handles account creation and sending etc
fuck you web 3.0
run geth with snap and dont run no consensus or what in the flying fuck that is
note that you probably need to add more methods to the cloudflare array for block and tx fetching etc.
I also added gas price fetching because the app was fucking dumb and sending 0x0
@sh4dowb
sh4dowb / ud64_deobfuscator.php
Created September 4, 2019 19:55
UD64 Deobfuscator / Unknowndevice64 PHP obfuscation deobfuscator
<html>
<head>
<meta charset="UTF-8">
<style>*{font-family:Arial;}a{text-decoration:none;}</style>
<link rel="stylesheet" href="https://unpkg.com/purecss@1.0.0/build/base-min.css">
<meta name="description" content="UD64, Unknowndevice64 deobfuscator/decrypter.">
<meta name="keywords" content="ud64 deobfuscate, ud64 cleaner, ud64 beautifier, ud64 decrypt">
<title>UD64 - Unknowndevice64 Deobfuscator</title>
<body>
<center>
@sh4dowb
sh4dowb / catch_all.txt
Created January 15, 2022 19:32
catch-all mail server installation on ubuntu
# redirect MX record to your server ip
apt install postfix
adduser myuser # necessary - you cannot login as root on dovecot imap
# add user
nano /etc/postfix/virtual
# @example.com myuser
# info@example.com info # optional
@sh4dowb
sh4dowb / gist:861934f2d0472400c6f9a764b4b7589d
Last active December 9, 2021 09:02
telethon get if participant is admin
from telethon.tl.types import ChannelParticipantCreator, ChannelParticipantAdmin
from telethon.tl.functions.channels import GetParticipantRequest
#..
@client.on(events.NewMessage)
async def handler(event):
participant = await client(GetParticipantRequest(channel=event.original_update.message.to_id.channel_id,user_id=event.original_update.message.from_id))
isadmin = (type(participant.participant) == ChannelParticipantAdmin)
iscreator = (type(participant.participant) == ChannelParticipantCreator)
@sh4dowb
sh4dowb / README
Last active August 22, 2021 21:49
satellite_track.py and site source code for https://cagriari.com/satellite/
needs;
rtl_fm
sox
wxtoimg (https://wxtoimgrestored.xyz/beta/wxtoimg-armhf-2.11.2-beta.deb)
wxmap on your server for map generation (https://wxtoimgrestored.xyz/beta/wxtoimg-amd64-2.11.2-beta.deb)
(because wxmap on ARM is not working, at least for me)
python3
requests
noaa-apt
n2yo account and api key
@sh4dowb
sh4dowb / atomic_eth.js
Created May 30, 2021 20:03
atomic wallet get eth private key / address by mnemonic seed
// fuck you atomic. why can't you just be fucking normal?
// east home innocent snake icon curtain series brave guard program history stand
// BIP39 seed:
var seed = new Uint8Array([70, 78, 5, 155, 232, 171, 38, 78, 191, 56, 142, 102, 122, 20, 65, 239, 127, 215, 39, 174, 28, 222, 17, 150, 102, 129, 182, 172, 246, 80, 15, 19, 79, 248, 113, 244, 95, 101, 33, 96, 203, 181, 243, 63, 23, 9, 71, 102, 37, 216, 196, 6, 77, 209, 18, 2, 107, 12, 239, 38, 249, 29, 107, 249]);
var s = require('ethereum-cryptography/pure/hdkey').HDKey;
var t = require('ethereumjs-wallet');
var w = s.fromMasterSeed(seed);
@sh4dowb
sh4dowb / decrypt_ruby_MessageEncryptor.py
Last active April 17, 2021 18:14
Decrypt Ruby's ActiveSupport::MessageEncryptor on Python 3
import hashlib
import base64
from Crypto import Random
from Crypto.Cipher import AES
import rubymarshal.reader
from pbkdf2 import PBKDF2
SECRET = "asdasd"
ITERATIONS = 65536
KEYLENGTH = 32
@sh4dowb
sh4dowb / decrypt_ruby_MessageEncryptor.py
Created April 8, 2021 07:34
Decrypt Ruby's ActiveSupport::MessageEncryptor on Python 3
import hashlib
import base64
from Crypto import Random
from Crypto.Cipher import AES
import rubymarshal.reader
from pbkdf2 import PBKDF2
SECRET = "a3f58debfe0c5b71edaebea3a627f4f"
SALT = "12345"
ITERATIONS = 65536