Skip to content

Instantly share code, notes, and snippets.

💥
🦆

Gareth Jones symm

💥
🦆
Block or report user

Report or block symm

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View nessus-dl.sh
MD5 (NessusAgent-6.10.2-es7.x86_64.rpm) = 0a42d5838aac2e468663463e1133a6e3
9cd362cd591eda8626ef96bdf9ece2220ee8a5c4 NessusAgent-6.10.2-es7.x86_64.rpm
View gist:195a1718c5fc3cbd86b4
#!/bin/bash
POWERDNS_API_KEY="XXX"
POWERDNS_API_URL="http://x.x.x.x:8081"
POWERDNS_ZONE="example.com"
DNS_NAME="foo.example.com"
DNS_TTL="120"
SERVICE_IP="1.2.3.4"
curl --silent -X PATCH --data '{"rrsets":[{"name":"'$DNS_NAME'","type":"A","changetype":"REPLACE","records":[{"name":"'$DNS_NAME'","type":"A","content":"'$SERVICE_IP'","ttl":'$DNS_TTL',"priority":0,"disabled":false}]}]}' -H 'X-API-Key: '$POWERDNS_API_KEY'' $POWERDNS_API_URL/servers/localhost/zones/$POWERDNS_ZONE > /dev/null
View baofeng-t1.markdown

Baofeng bf-t1 default frequency

Channel Frequency DCS /CTCSS
ch1 437.150 ct 69.3
ch2 439.250 ct 100.0
ch3 441.750 ct 151.4
ch4 443.450 ct 203.5
ch5 445.550 ct 241.8
@symm
symm / gist:6e8a8dfd9f312dd4b94e942025048ba9
Created Feb 8, 2019
Disable LED on Alfa AWUS036NHA with AR9271 chipset
View gist:6e8a8dfd9f312dd4b94e942025048ba9
echo "none" > /sys/class/leds/ath9k_htc-phy1/trigger
View rtlsdr.service
[Unit]
Description=RTL-SDR Server
Wants=network-online.target
After=network-online.target
[Service]
ExecStartPre=/bin/sleep 15
ExecStart=/bin/sh -c '/usr/bin/rtl_tcp -a 0.0.0.0 -s 1024000'
@symm
symm / settings.md
Last active Jan 22, 2019
PMR446.txt
View settings.md
CH Frequency
1 446.00625
2 446.01875
3 446.03125
4 446.04375
5 446.05625
6 446.06875
7 446.08125
8 446.09375
9 446.10625
@symm
symm / Syscan2015Badge.md
Created Jan 10, 2019 — forked from egirault/Syscan2015Badge.md
Dumping the flash memory of the Syscan 2015 badge
View Syscan2015Badge.md

Dumping the flash of the Syscan 2015 badge

The badge of the Syscan 2015 conference included an ARM-based STM32F030R8 processor running some challenges. Although SWD pins are accessible on the badge, some have noted that the STM32 is readout-protected, meaning that it will refuse to dump its flash memory.

Fortunately, two researchers (Johannes Obermaier and Stefan Tatschner) recently published a paper at the WOOT '17 conference, in which they reveal a vulnerability allowing to bypass the readout protection. Their technique allows to dump the flash one DWORD at a time, rebooting the CPU between each access.

I implemented this attack using a BusPirate and the PySWD module. Here is a quick'n dirty PoC to

View vscode.json
{
"workbench.colorTheme": "Dracula",
"editor.fontSize": 12,
"presentationMode.zoomLevel": 4,
"editor.fontFamily": "Fira Code",
"files.autoSave": "onFocusChange",
"window.zoomLevel": 1,
"flow.pathToFlow": "${workspaceRoot}/node_modules/.bin/flow"
}
@symm
symm / now.js
Last active Jul 3, 2018
JS date mock
View now.js
export default () => new Date()
You can’t perform that action at this time.