Skip to content

Instantly share code, notes, and snippets.

Steeve Barbeau steeve85

Block or report user

Report or block steeve85

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
steeve85 / OpenSSH Username Enumeration
Last active Sep 7, 2018
OpenSSH Username Enumeration
View OpenSSH Username Enumeration
Date: Wed, 15 Aug 2018 09:05:58 -0700
From: Qualys Security Advisory <>
Subject: OpenSSH Username Enumeration
Hi all,
We sent the following email to and
steeve85 /
Created Jul 7, 2018 — forked from fransr/
Using error messages to decloak an S3 bucket. Uses soap, unicode, post, multipart, streaming and index listing as ways of figure it out. You do need a valid aws-key (never the secret) to properly get the error messages
# Written by Frans Rosén (
_debug="$2" #turn on debug
#you need a valid key, since the errors happens after it validates that the key exist. we do not need the secret key, only access key
H_ACCEPT="accept-language: en-US,en;q=0.9,sv;q=0.8,zh-TW;q=0.7,zh;q=0.6,fi;q=0.5,it;q=0.4,de;q=0.3"
H_AGENT="user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.146 Safari/537.36"
steeve85 / content_discovery_all.txt
Created Jun 25, 2018 — forked from jhaddix/content_discovery_all.txt
a masterlist of content discovery URLs and files (used most commonly with gobuster)
View content_discovery_all.txt
This file has been truncated, but you can view the full file.
steeve85 / cloud_metadata.txt
Created Apr 25, 2018 — forked from jhaddix/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
View cloud_metadata.txt
## AWS
steeve85 /
Created Apr 12, 2015
Send and receive SMS Text Messages in Weechat
# -*- coding:utf-8 -*-
from __future__ import unicode_literals
import weechat, csv, re, gammu, time, unicodedata
2015-04-12: v0.1 - Initial/draft/beta version
steeve85 /
Last active Aug 29, 2015
List Infosec Jobs on Reddit
#!/usr/bin/env python
import praw, datetime, time
class Reddit:
def __init__(self):
self.submissions = ['2s9m3i', '2rijej'] # to update when they change
self.offers = {}
self.r = praw.Reddit('Infosec jobs on Reddit')
steeve85 /
Last active May 30, 2018
Simple script to git clone each GitHub project starred by a user.
#!/usr/bin/env python
import urllib2, json, os, subprocess
# Simple script to git clone each project starred by a user.
# /!\ There is an API rate limit. To increase it, authenticated actions are needed -_-
user = "steeve85"
i = 1
json_data = None
View gist:5394539
if !exists("au_loaded")
let au_loaded = 1
augroup rb
au FileType ruby set shiftwidth=4 tabstop=4 softtabstop=4 textwidth=78
au FileType ruby set noexpandtab
au FileType ruby hi BogusWhitespace ctermbg=darkgreen guibg=darkgreen
au FileType ruby match BogusWhitespace /\s\+$\|^\t\+ \+\|^ \+\t*/
augroup END
steeve85 /
Created Mar 31, 2013
xor algo used in an APT1 sample
# encoded data
encoded = []
encoded.append([0x2D, 0xC8, 0xD4, 0xDD, 0xCF, 0xCC, 0xDA, 0xC9, 0xDE, 0xC7, 0xD6, 0xF2, 0xF8, 0xE9, 0xF4, 0xE8, 0xF4, 0xFD, 0xEF, 0xC7, 0xCC, 0xF2, 0xF5, 0xFF, 0xF4, 0xEC, 0xE8, 0xC7, 0xD8, 0xEE, 0xE9, 0xE9, 0xFE, 0xF5, 0xEF, 0xCD, 0xFE, 0xE9, 0xE8, 0xF2, 0xF4, 0xF5, 0xC7, 0xC9, 0xEE, 0xF5, 0xB6, 0x00])
encoded.append([0x08, 0x21, 0x0F, 0x39, 0x1C, 0x08, 0x0D, 0x18, 0x09, 0x64, 0x00])
encoded.append([0x26, 0xB2, 0xAE, 0xAE, 0xAA, 0xE0, 0xF5, 0xF5, 0xE8, 0xEB, 0xEC, 0xF4, 0xEB, 0xEF, 0xF4, 0xE8, 0xEB, 0xEA, 0xF4, 0xEC, 0xE2, 0xF5, 0xEB, 0xE3, 0xED, 0xF4, 0xEB, 0xF4, 0xEB, 0xEC, 0xF4, 0xE9, 0x85, 0xED, 0xF4, 0xB2, 0xAE, 0xB7, 0xB6, 0xFC, 0x0, 0x0])
encoded.append([0x32, 0x3D, 0x1F, 0x0A, 0x19, 0x1C, 0x1C, 0x11, 0x5F, 0x44, 0x5E, 0x40, 0x50, 0x58, 0x13, 0x1F, 0x1D, 0x00, 0x11, 0x04, 0x19, 0x12, 0x1C, 0x15, 0x4B, 0x50, 0x3D, 0x23, 0x39, 0x35, 0x50, 0x46, 0x5E, 0x40, 0x4B, 0x50, 0x27, 0x19, 0x1E, 0x14, 0x1F, 0x07, 0x03, 0x50, 0x3E, 0x24, 0x50, 0x45, 0x5E, 0x41, 0x59,
steeve85 / nmap.diff
Created Nov 20, 2012
Nmap Bug in Msf
View nmap.diff
--- lib/msf/core/auxiliary/nmap-error.rb 2012-11-19 11:14:06.000000000 +0100
+++ lib/msf/core/auxiliary/nmap.rb 2012-11-19 11:14:58.000000000 +0100
@@ -225,7 +225,7 @@
disallowed_characters = /([\x00-\x19\x21\x23-\x26\x28\x29\x3b\x3e\x60\x7b\x7c\x7d\x7e-\xff])/n
badchar = str[disallowed_characters]
if badchar
- print_error "Malformed nmap arguments (contains '#{c}'): #{str}"
+ print_error "Malformed nmap arguments (contains '#{badchar}'): #{str}"
return false
You can’t perform that action at this time.