Skip to content

Instantly share code, notes, and snippets.

@v1m
v1m / Base64_CheatSheet.md
Created February 3, 2022 21:42 — forked from Neo23x0/Base64_CheatSheet.md
Learning Aid - Top Base64 Encodings Table

Learning Aid - Top Base64 Encodings Table

Base64 Code Mnemonic Aid Decoded* Description
JAB 🗣 Jabber $. Variable declaration (UTF-16)
TVq 📺 Television MZ MZ header
SUVY 🚙 SUV IEX PowerShell Invoke Expression
SQBFAF 🐣 Squab favorite I.E. PowerShell Invoke Expression (UTF-16)
SQBuAH 🐣 Squab uahhh I.n. PowerShell Invoke string (UTF-16) e.g. Invoke-Mimikatz
PAA 💪 "Pah!" <. Often used by Emotet (UTF-16)
@v1m
v1m / IAS-general-videos-1.md
Last active November 18, 2021 15:56
A list of some general videos produced by the Institute of Advanced Study (IAS)

Some Maths motivation....

Twitter @the_IAS

Web https://www.ias.edu/

Described in Wikipedia as

"The Institute for Advanced Study (IAS), located in Princeton, New Jersey, in the United States, 
is an independent center for theoretical research and intellectual inquiry. 
@v1m
v1m / WhatsApp-video-scams.md
Last active November 16, 2016 22:19
URLs of some of the scam websites seen

WhatsApp

WhatsApp is rolling out a new video calling feature. A lot of scam websites have come up which promise to enable the video calling feature on WhatsApp user phones.

November 16, 2016

Here are some of the URLs of the scam websites:

  • whatsappvideoactivate DOT com
  • whatappvideoenable DOT com
  • whatappvideoonline DOT com
@v1m
v1m / documentation-tips.md
Last active January 14, 2020 02:51
Document that 0-day vulnerability you are debugging

Hey vulnerability-researcher,

Here are some tips for documenting the reversing work you are doing.

` version 1 Jan 19, 2016.

version 2 Feb 23, 2016. `

@v1m
v1m / .curlrc
Last active March 29, 2024 13:11
sample .curlrc file
# this is a sample .curlrc file
# https://everything.curl.dev/ is a GREAT RESOURCE
# store the trace in curl_trace.txt file. beware that multiple executions of the curl command will overwrite this file
--trace curl_trace.txt
# store the header info in curl_headers.txt file. beware that multiple executions of the curl command will overwrite this file
--dump-header curl_headers.txt
#change the below referrer URL or comment it out entirely
@v1m
v1m / named_vulns.md
Last active September 22, 2015 17:04
Named Vulnerabilities/Exploits

Vulnerabilities:

  1. 2014:

  2. 2015:

  • Freak CVE-2015-0204
  • Ghost CVE-2015-0235
  • Venom CVE-2015-3456
@v1m
v1m / .vimrc
Created December 16, 2014 17:51
use this file
execute pathogen#infect()
syntax on
filetype plugin indent on
set incsearch
set hlsearch
"filetype on
color oceandeep
"set background=dark
" Replaces 'smarT' quotes
%s/[“”]/"/g
" Replaces 'smart sIngle' quotes and backtick sIngle quotes (also covers 'smart' apostrophe)
%s/[‘’`]/'/g
" Replaces 'smart' Hyphens
%s/ – \| — \|—/ - /g
" Replaces 'backticK' quotes and 'double apostrophe' endquotes
@v1m
v1m / gist:c1831ed58ce42486c852
Last active August 29, 2015 14:04
vim script - CVE
"deletes all instances of the following
" CVE-ID: CVE-2007-0719
" and appends them to the bottom of the file
while search('^\s\+ CVE-ID:.\+$')
"/\s\+CVE-ID:\sCVE-\d\d\d\d.\+ $/ yank
"+1 put
"delete the matched text and append it to register K