Skip to content

Instantly share code, notes, and snippets.

View slashTPA's full-sized avatar
✈️
out for a trip

slashTPA

✈️
out for a trip
  • localhost
View GitHub Profile
@slashTPA
slashTPA / keybase.md
Created July 3, 2021 15:14
keybase.md

Keybase proof

I hereby claim:

  • I am slashtpa on github.
  • I am oisrp (https://keybase.io/oisrp) on keybase.
  • I have a public key ASCu-R93ufWd-qIPFAZuMQ8sY9sbzlBdb-dHuby0O-lhkgo

To claim this, I am signing this object:

@slashTPA
slashTPA / pysim-suci.md
Created July 1, 2021 12:04 — forked from mrlnc/pysim-suci.md
pysim-suci.md

SUPI/SUCI Concealment is a new 5G-Standalone (SA) feature to encrypt the IMSI/SUPI with a network operator public key. pySIM now supports writing these 5G-specific files to USIM cards.

In short:

  • USIM Service 124 enables SUCI calculation
  • SUCI_Calc_Info, stores the public keys, required
  • Routing Indicator, required

To enable SUCI concealment, follow all steps. If you want to disable the feature, you can just disable USIM Service 124.

Admin Keys

def verify_sign(public_key_loc, signature, data):
'''
Verifies with a public key from whom the data came that it was indeed
signed by their private key
param: public_key_loc Path to public key
param: signature String signature to be verified
return: Boolean. True if the signature is valid; False otherwise.
'''
from Crypto.PublicKey import RSA
from Crypto.Signature import PKCS1_v1_5
@slashTPA
slashTPA / rc4.cpp
Created January 29, 2019 11:23 — forked from Mjiig/rc4.cpp
Simple RC4 encryption program
#include <iostream>
#include <fstream>
#include <cstdlib>
#include <cstdio>
#include <cstring>
class State
{
unsigned char s[256];
int i, j;
@slashTPA
slashTPA / pass.md
Created November 25, 2018 21:13 — forked from abtrout/pass.md
Using password-store with git repository synching

Password-store keeps your passwords (or any other sensitive information) saved in GnuPG encrypted files organized in ~/.password-store. For more information about GPG, consult the GNU Privacy Handbook.

Getting started

To get started, install pass and generate a keypair.

$ brew install pass
$ gpg --gen-key
$ gpg --list-keys