Skip to content

Instantly share code, notes, and snippets.

Avatar
👨‍💻
Locked Down

Aidan Holland thehappydinoa

👨‍💻
Locked Down
View GitHub Profile
@thehappydinoa
thehappydinoa / DEVELOPER.md
Last active May 30, 2020
Awesome Developer Information
View DEVELOPER.md
@thehappydinoa
thehappydinoa / reencode.py
Last active May 20, 2020 — forked from mgeeky/reencode.py
ReEncoder.py - script allowing for recursive encoding detection, decoding and then re-encoding. To be used for instance in fuzzing purposes. Requires: jwt (pip install pyjwt)
View reencode.py
#!/usr/bin/python
#
# ReEncoder.py - script allowing for recursive encoding detection, decoding and then re-encoding.
# To be used for instance in fuzzing purposes.
#
# NOTICE:
# If the input string's length is divisble by 4, Base64 will be able to decode it - thus, the script
# would wrongly assume it has been encoded using Base64. The same goes for Hex decoding.
# In order to tackle this issue, the script builds up a tree of possible encoding schemes and then evaluate
@thehappydinoa
thehappydinoa / AppDelegate.m
Created Apr 4, 2020
Working React Native Firebase Messaging Notifications AppDelegate
View AppDelegate.m
/**
* Copyright (c) Facebook, Inc. and its affiliates.
*
* This source code is licensed under the MIT license found in the
* LICENSE file in the root directory of this source tree.
*/
#import "AppDelegate.h"
#import <React/RCTBridge.h>
@thehappydinoa
thehappydinoa / README.md
Last active Oct 22, 2019
Basically saves me so much time re-arranging all the simulated circuit devices to look nice
View README.md

Simcir Rearranger

Usage

usage: simcir_rearranger.py [-h] JSON_FILE

SHOW ME WHAT YOU GOT

positional arguments:
View README.md

new_lab.py

Usage

usage: new_lab.py [-h] -l NAME -q Q [-n NAME] [-c C] [-m]

Create lab setup

optional arguments:
  -h, --help            show this help message and exit
View addtrustexternalca.cer
-----BEGIN CERTIFICATE-----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@thehappydinoa
thehappydinoa / CVE_2017_7529.py
Last active May 4, 2020
Nginx - Remote Integer Overflow Vulnerability
View CVE_2017_7529.py
#!/usr/bin/python
# -*- coding:utf-8 -*-
# Nginx - Remote Integer Overflow Vulnerability
# CVE-2017-7529
import argparse
import logging
import requests
@thehappydinoa
thehappydinoa / fakelogin.py
Last active Aug 26, 2019
Sends fake login info to phishers
View fakelogin.py
#!/usr/bin/env python3s
from concurrent.futures import ThreadPoolExecutor
try:
import requests
from faker import Faker
except ImportError:
print("Please install requests and faker")
print("Running: `pip install requests faker` should do the trick")
View google.yaml
name: 'google'
author: '@ewhit'
min_ver: '2.3.0'
proxy_hosts:
- {phish_sub: 'accounts', orig_sub: 'accounts', domain: 'google.com', session: true, is_landing: true}
- {phish_sub: 'ssl', orig_sub: 'ssl', domain: 'gstatic.com', session: false, is_landing: false}
- {phish_sub: 'content', orig_sub: 'content', domain: 'googleapis.com', session: false, is_landing: false}
- {phish_sub: 'gstatic', orig_sub: 'gstatic', domain: 'gstatic.com', session: true, is_landing: false}
- {phish_sub: 'mail', orig_sub: 'mail', domain: 'google.com', session: false, is_landing: false}
- {phish_sub: 'myaccount', orig_sub: 'myaccount', domain: 'google.com', session: false, is_landing: false}
You can’t perform that action at this time.