Skip to content

Instantly share code, notes, and snippets.

View trietptm's full-sized avatar
💭
Information Security Consulting, Threat Hunting

Minh-Triet Pham Tran trietptm

💭
Information Security Consulting, Threat Hunting
View GitHub Profile
@giudinvx
giudinvx / slideshare-downloader.sh
Last active November 17, 2022 01:00
Slideshare Downloader
#!/bin/bash
#-----------------------------------------------
# Modify 4/08/2018 by giudinvx
# Email giudinvx[at]gmail[dot]com
#-----------------------------------------------
# Author: Andrea Lazzarotto
# http://andrealazzarotto.com
# andrea.lazzarotto@gmail.com
@veritech
veritech / gist:1224664
Created September 18, 2011 03:02
Brute force HTTP password cracker
#!usr/bin/python
#Linksys WRT54G router brute force
#http://www.darkc0de.com
#d3hydr8[at]gmail[dot]com
import threading, time, random, sys, urllib2, socket
if len(sys.argv) !=4:
print "Usage: ./linksysbrute.py <server> <user> <wordlist>"
sys.exit(1)
@Jaybles
Jaybles / UIDeviceHardware.h
Created October 28, 2011 19:33
UIDeviceHardware - Determine iOS device being used
//
// UIDeviceHardware.h
//
// Used to determine EXACT version of device software is running on.
#import <Foundation/Foundation.h>
@interface UIDeviceHardware : NSObject
- (NSString *) platform;
@cmlh
cmlh / DirBuster-proxy.sh
Created October 30, 2011 08:25
Simple shell script to replay URL(s) discovered by DirBuster over a local web proxy based on http://pauldotcom.com/2011/08/dirbuster-to-burp-the-missing.html
#!/bin/sh
# Simple shell script to replay URL(s) discovered by DirBuster over a local web proxy i.e. Burp Proxy, etc on TCP/8080
#
# Based on http://pauldotcom.com/2011/08/dirbuster-to-burp-the-missing.html
# REPOSITORY
# https://gist.github.com/1325706
# git://gist.github.com/1325706.git
@utensil
utensil / binary-debug-tools.md
Created November 17, 2011 02:56
二进制调试那些事
@scholzi
scholzi / 000.txt
Created December 21, 2011 21:28
000
* Each link group is the same download / ISO
http://hitfile.net/mCkD
http://hitfile.net/tEr9
http://hitfile.net/ehIN
http://hitfile.net/wNXu
http://turbobit.net/5h7dcg4x65jg.html
http://turbobit.net/ulq596ryiem1.html
http://turbobit.net/tz12ge7p30yr.html
@ofan
ofan / gist:1508676
Created December 22, 2011 02:41
csdn passwords
('123456789', 235039)
('12345678', 212761)
('11111111', 76348)
('dearbook', 46053)
('00000000', 34953)
('123123123', 20010)
('1234567890', 17794)
('88888888', 15033)
('111111111', 6995)
('147258369', 5966)
@todb-r7
todb-r7 / empty_checks.rb
Created December 27, 2011 15:31
All usages of :empty? in Metasploit: grep -r -A3 "\.empty?" .
--
./msfencode: if(ext and not ext.empty?)
./msfencode- fmt = ext
./msfencode- end
./msfencode-end
--
./plugins/nexpose.rb: if(args.length == 0 or args[0].empty? or args[0] == "-h")
./plugins/nexpose.rb- print_status("Usage: ")
./plugins/nexpose.rb- print_status(" nexpose_connect username:password@host[:port] <ssl-confirm>")
./plugins/nexpose.rb- print_status(" -OR- ")
@codito
codito / KernelMode.md
Created February 1, 2012 08:44
WinDBG Debug Snippets

Kernel driver debugging tips

Enable DbgPrint/KdPrint

kd> ed nt!Kd_DEFAULT_MASK 0xFFFFFFFF

reg add "HKLM\SYSTEM\ControlSet001\Control\Session Manager\Debug Print Filter" /v DEFAULT /t REG_DWORD /d 0xFFFFFFFF

@bcse
bcse / scrdec18-VC8.exe
Created February 15, 2012 10:13
Windows Script Decoder 1.8 (Decoding JScript.Encoded)