I hereby claim:
- I am thomaspatzke on github.
- I am thomaspatzke (https://keybase.io/thomaspatzke) on keybase.
- I have a public key whose fingerprint is ADDB 3A1A 80DE 4D0E 79B9 58AD 5F1A A4D8 C753 A286
To claim this, I am signing this object:
from burp import (IBurpExtender, IBurpExtenderCallbacks, ISessionHandlingAction, IHttpListener) | |
import re | |
class BurpExtender(IBurpExtender, ISessionHandlingAction, IHttpListener): | |
def registerExtenderCallbacks(self, callbacks): | |
self.callbacks = callbacks | |
self.helpers = callbacks.getHelpers() | |
callbacks.setExtensionName("Session CSRF Token Handling") | |
self.callbacks.registerSessionHandlingAction(self) | |
self.callbacks.registerHttpListener(self) |
from burp import (IBurpExtender, ISessionHandlingAction) | |
import re | |
class BurpExtender(IBurpExtender, ISessionHandlingAction): | |
def registerExtenderCallbacks(self, callbacks): | |
self.callbacks = callbacks | |
self.helpers = callbacks.getHelpers() | |
callbacks.setExtensionName("Path Parameter Session Handling Action") | |
self.callbacks.registerSessionHandlingAction(self) | |
self.out = callbacks.getStdout() |
set nocompatible | |
set rtp+=~/.vim/bundle/Vundle.vim | |
call vundle#begin() | |
Plugin 'gmarik/Vundle.vim' | |
Plugin 'tpope/vim-fugitive' | |
Plugin 'davidhalter/jedi-vim' | |
Plugin 'vim-latex/vim-latex' | |
Plugin 'vim-syntastic/syntastic' | |
Plugin 'scrooloose/nerdtree' |
grep javax.faces.ViewState POSTs.xml | perl -mURI::Escape -ne '/javax\.faces\.ViewState=(.*?)&/; print URI::Escape::uri_unescape($1); print "\n"' | sort -u |
find -type f -exec sha256sum {} \; | sort | perl -ne '($h, $f) = /^(\S+)\s+(.*)$/; if (defined $ph && $ph ne $h || !defined $ph) { print "$f\n" } $ph = $h; $pf = $f;' |
xmlstarlet sel -t -m '//items/item[contains(./request,"NavigationTarget")]' -v 'substring-before(substring-after(./request, "NavigationTarget="), "&")' -n Crawl-*.xml | perl -mURI::Escape -ne 'print URI::Escape::uri_unescape($_);' | sort -u |
I hereby claim:
To claim this, I am signing this object:
| hd | perl -ne 's/^\d+\s+//d; s/\s+\|.*?$//g; s/([\da-f]+)\s+/%$1/g; print;' |
#!/usr/bin/python3 | |
# mysapsso.py - Decoding MYSAPSSO2 cookies | |
import sys | |
import fileinput | |
import urllib.parse | |
import base64 | |
import binascii | |
import re | |
import struct |
#!/usr/bin/python3 | |
# openssl-heartbleed-server.py | |
# Check TLS clients for OpenSSL Heartbleed vulnerability. | |
import socketserver | |
import struct | |
import random | |
class HeartbleedServer(socketserver.BaseRequestHandler): |