Skip to content

Instantly share code, notes, and snippets.

@takeshixx
takeshixx / gist:7466377
Last active December 28, 2015 07:39
$shell (zsh,bash,etc.) search functions
# search all with wildcard
function saw(){
find / -regextype posix-extended -iregex ".*\/[^\/]*$@.*" -exec ls -lad --color {} \; 2>/dev/null
}
# search all with exact match
function sa(){
find / -regextype posix-extended -iregex ".*\/$@" -exec ls -lad --color {} \; 2>/dev/null
}
# search local with wildcard
function slw(){
@takeshixx
takeshixx / pidgin.py
Created November 3, 2015 13:00
Python D-Bus example for Pidgin
#!/usr/bin/env python2
# -*- coding: utf-8 -*-
DEBUG = True
import dbus, gobject,re,pynotify
from dbus.mainloop.glib import DBusGMainLoop
dingregex = re.compile(r'(ding)',re.IGNORECASE)
def check_ding(account, sender, message, conv, flags):
sender = sender.encode('utf-8')
message = message.encode('utf-8')
obj = bus.get_object("im.pidgin.purple.PurpleService", "/im/pidgin/purple/PurpleObject")
@takeshixx
takeshixx / 31C3
Created December 27, 2014 15:08
31C3 802.1x WiFi config for netctl
Description='31C3 802.1x WiFi'
Interface=wlp4s0
Connection=wireless
Security=wpa-configsection
IP=dhcp
WPAConfigSection=(
'ssid="31C3"'
'key_mgmt=WPA-EAP'
'eap=TTLS'
'identity="randomusername"'
{}.__class__.__base__.__subclasses__()[59]()._module.__builtins__['__import__']('os').system('id')
#!/usr/bin/env python2
#
# OpenSSL heap overflow PoC
# Found by ZDI - ZDI-14-173 // CVE-2014-0195
# PoC by @_hugsy_
#
# Ref: https://tools.ietf.org/html/rfc6347
#
import socket, struct
@takeshixx
takeshixx / gist:11264187
Created April 24, 2014 18:14
Parse jail parameters from FreeBSD /etc/rc.conf file (and all included files)
from sh import sh
dict(_.split('=',1) for _ in [_ for _ in sh('-c','\n'.join([_.strip() for _ in open('/etc/rc.conf').read().split('\n') if not _.startswith('#') and _ is not ''])+'\nset').split('\n') if _.startswith('jail_')])
@takeshixx
takeshixx / leakdb.py
Created January 30, 2014 23:51
Small leakdb script for a $SHELL alias
#!/usr/bin/env python2
import sys,requests
DEBUG = False
try:
lines = sys.stdin.read().split('\n')
for h in lines:
if not h: continue
r = requests.get('https://api.leakdb.net/?j={}'.format(h)).json()