Skip to content

Instantly share code, notes, and snippets.

@sh4dowb
sh4dowb / eba-canli-ders.md
Last active Nov 18, 2022
EBA canlı ders için Linux ve Mac desteği (Zoom)
@sh4dowb
sh4dowb / retrieve_password.py
Created Sep 1, 2019
Chromium Linux Password Retriever (Decryption support)
View retrieve_password.py
# source: https://stackoverflow.com/questions/23153159/decrypting-chromium-cookies
# just put a few answers together for a working script
# python3 retrieve_password.py
# outputs passwords.csv
import secretstorage
import sqlite3
import os
import csv
from Crypto.Cipher import AES
@sh4dowb
sh4dowb / send_usdt.py
Created Aug 26, 2021
tronapi python mass USDT payment - send mass USDT payments with python
View send_usdt.py
import time
from tronapi import Tron
full_node = 'https://api.trongrid.io'
solidity_node = 'https://api.trongrid.io'
event_server = 'https://api.trongrid.io'
pkey = "private_key_hex"
payments = [
@sh4dowb
sh4dowb / selenium-save-profile-session.py
Last active Jul 4, 2022
workaround for selenium to save the goddamn session / profile completely on firefox / geckodriver --- selenium firefox geckodriver persistent profile
View selenium-save-profile-session.py
# Selenium does not use the given profile, but copies it, and uses a temporary profile.
# As a result, new cookies and sessions etc. are not saved.
# To fix it, we get the actual profile firefox is using, kill firefox manually so geckodriver
# doesn't delete profile data. Copying the profile when it's being used is generally not a good idea.
# After killing firefox profile and databases are unlocked, we copy the "temporary" profile
# to our old profile.
#
# driver.profile doesn't provide the actual temporary profile, but another copy of it. And firefox
# does not use that one. that's why I got it from process list.
#
@sh4dowb
sh4dowb / ud64_deobfuscator.php
Created Sep 4, 2019
UD64 Deobfuscator / Unknowndevice64 PHP obfuscation deobfuscator
View ud64_deobfuscator.php
<html>
<head>
<meta charset="UTF-8">
<style>*{font-family:Arial;}a{text-decoration:none;}</style>
<link rel="stylesheet" href="https://unpkg.com/purecss@1.0.0/build/base-min.css">
<meta name="description" content="UD64, Unknowndevice64 deobfuscator/decrypter.">
<meta name="keywords" content="ud64 deobfuscate, ud64 cleaner, ud64 beautifier, ud64 decrypt">
<title>UD64 - Unknowndevice64 Deobfuscator</title>
<body>
<center>
@sh4dowb
sh4dowb / catch_all.txt
Created Jan 15, 2022
catch-all mail server installation on ubuntu
View catch_all.txt
# redirect MX record to your server ip
apt install postfix
adduser myuser # necessary - you cannot login as root on dovecot imap
# add user
nano /etc/postfix/virtual
# @example.com myuser
# info@example.com info # optional
@sh4dowb
sh4dowb / gist:861934f2d0472400c6f9a764b4b7589d
Last active Dec 9, 2021
telethon get if participant is admin
View gist:861934f2d0472400c6f9a764b4b7589d
from telethon.tl.types import ChannelParticipantCreator, ChannelParticipantAdmin
from telethon.tl.functions.channels import GetParticipantRequest
#..
@client.on(events.NewMessage)
async def handler(event):
participant = await client(GetParticipantRequest(channel=event.original_update.message.to_id.channel_id,user_id=event.original_update.message.from_id))
isadmin = (type(participant.participant) == ChannelParticipantAdmin)
iscreator = (type(participant.participant) == ChannelParticipantCreator)
@sh4dowb
sh4dowb / stake_limbo_verify.py
Created Dec 8, 2021
verify stake.com limbo outcome with python
View stake_limbo_verify.py
import hmac
import hashlib
def getLimboOutcome(server, client, nonce):
server = server.encode()
client = client.encode()
nonce = str(nonce).encode()
round = 0
hash = hmac.new(server, client+b':'+nonce+b':'+str(round).encode('utf-8'), hashlib.sha256).digest()
first4 = hash[:4]
@sh4dowb
sh4dowb / decrypt.py
Created Sep 17, 2021
Decrypt crypto-js default AES encryption with OpenSSL KDF in Python 3
View decrypt.py
# I absolutely hated crypto-js for this. non-standard configurations, weird algorithms, ...
# well obviously you can encrypt it with a better configuration which people will not
# go crazy figuring out its implementation, but in this case I wasn't encrypting the data.
import base64
from Crypto.Hash import MD5
from Crypto.Util.Padding import unpad
from Crypto.Cipher import AES
# generated using: CryptoJS.AES.encrypt('test 123456 plaintext', 'some password').toString()
@sh4dowb
sh4dowb / README
Last active Aug 22, 2021
satellite_track.py and site source code for https://cagriari.com/satellite/
View README
needs;
rtl_fm
sox
wxtoimg (https://wxtoimgrestored.xyz/beta/wxtoimg-armhf-2.11.2-beta.deb)
wxmap on your server for map generation (https://wxtoimgrestored.xyz/beta/wxtoimg-amd64-2.11.2-beta.deb)
(because wxmap on ARM is not working, at least for me)
python3
requests
noaa-apt
n2yo account and api key