Skip to content

Instantly share code, notes, and snippets.

David M. Syzdek syzdek

Block or report user

Report or block syzdek

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View Cameron Sum
PROG_NAME="$(basename "${0}")"
if test -z "${FILE}";then
echo "Usage: ${PROG_NAME} <file>"
exit 1

This following can used to distribute common files amoung hosts. For example, to distribute a shared hosts file.

Initial Setup:

  mkdir /etc/gitfiles
  cd /etc/gitfiles
  git init
  git remote add origin
  git fetch origin

Keybase proof

I hereby claim:

  • I am syzdek on github.
  • I am syzdek ( on keybase.
  • I have a public key whose fingerprint is 000C CBFA BA86 33B7 9FB3 E532 6C69 94B2 91A8 B42D

To claim this, I am signing this object:

View Bootable Hybrid USB
# Instructions for making hybrid GPT/MBR boot USB thumb drive.
# The Slackware Linux installer will be added to the image as an example,
# however the syslinux configuration can be modified to include any desired
# image.
# A USB thumb drive formatted with these instructions was able to
# boot the Slackware Installer on a:
# Dell Latitude E6430 in Legacy BIOS mode
syzdek /
Created Aug 21, 2017
Simple build script to build TomSellers' nmap repository
echo "building TomSellers's nmap..."
set -x -e
git clone
( cd nmap && git branch build 7c833b933e771923e660 && checkout build )
( cd nmap && ./configure --prefix=/opt/nmap )
( cd nmap/libdnet-stripped && make )
( cd nmap/liblinear && make )
View RFC 6455 Section 5.2, The WebSocket Protocol: Base Framing Protocol
Converting base 10 frame diagram to base 8 with byte offsets:
Original (
This wire format for the data transfer part is described by the ABNF
[RFC5234] given in detail in this section. (Note that, unlike in
other sections of this document, the ABNF in this section is
operating on groups of bits. The length of each group of bits is
indicated in a comment. When encoded on the wire, the most
significant bit is the leftmost in the ABNF). A high-level overview
View qr-code-ver1.h
#include <inttypes.h>
const char * qr-code-ver1[] =
"| |",
"| |",
"| |",
"| |",
"| ▓▓▓▓▓▓▓▓▓▓▓▓▓▓ ▓▓▓▓ ▓▓▓▓▓▓▓▓▓▓▓▓▓▓ |",
syzdek / locky-dga.c
Last active Feb 25, 2016
Locky Ransomware Domain Generation Algorithm
View locky-dga.c
* Locky Ransomware Domain Generation Algorithm
* Original code from Forcepoint Security Labs:
* Code updated by David M. Syzdek <ten . kedzys @ divad> on 2016/02/24
* Compile with:
* gcc -W -Wall -Werror -o locky-dga locky-dga.c
View totp.c
* TOTP: Time-Based One-Time Password Algorithm
* Copyright (c) 2015, David M. Syzdek <>
* All rights reserved.
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
* 1. Redistributions of source code must retain the above copyright
# set parameters
# encode numeric UID into three port numbers
TOTP_PORT1=$(( $(( ${TOTP_UID} / 4194304)) + 4096 ))
TOTP_PORT2=$(( $(( $(( ${TOTP_UID} % 4194304)) / 16384 )) + 4096 ))
TOTP_PORT3=$(( $(( $(( ${TOTP_UID} % 4194304)) % 16384 )) + 4096 ))
You can’t perform that action at this time.