Skip to content

Instantly share code, notes, and snippets.

View Darksidesfear's full-sized avatar
🌴
On vacation

Murphy Michael Darksidesfear

🌴
On vacation
View GitHub Profile
@Darksidesfear
Darksidesfear / Surgeon.sh
Created March 31, 2024 14:44 — forked from yosignals/Surgeon.sh
Surgeon | DataBouncing Script for specific web requests, POST, GET, PUT, Whatever, where ever the hostname exists that get's processed
#!/bin/bash
# Function to check if a command exists
command_exists() {
type "$1" &> /dev/null
}
# Preflight check for necessary commands (curl and sed)
if ! command_exists curl; then
echo "Error: curl is not installed. Please install curl and try again."
@Darksidesfear
Darksidesfear / list-of-hacking-games.md
Created March 17, 2024 17:06 — forked from fakhrullah/list-of-hacking-games.md
List of hacking game, wargame or capture the flag (CTF) for some one who want to learn hacking.
@Darksidesfear
Darksidesfear / blaster.c
Created March 11, 2024 22:13 — forked from yorickdewid/blaster.c
Blaster worm source
/*
DECOMPILED SOURCE FOR MS RPC DCOM BLASTER WORM
<http://robertgraham.com/journal/030815-blaster.c>
This file contains source code for the "msblast.exe" worm
that was launched against the Internet on August 10, 2003.
This "source-code" was decompiled using "IDApro", an
"interactive disassembler". IDA is the most popular tool
ACRIDMINI - TAO computer hacking project
ADJUTANT VENTURE - Intrusion set?
ALOOFNESS - Cyber threat actor
ALTEREDCARBON - An IRATEMONK implant for Seagate drives
AMULETSTELLAR - Cyber threat actor sending malicious e-mails
ANGRYNEIGHBOR - Family of radar retro-reflector tools used by NSA's TAO division
APERTURESCIENCE - TAO computer hacking project
ARGYLEALIEN - Method to cause a loss of data by exploiting zeroization of hard-drives
ARKSTREAM - Implant used to reflash BIOS, installed by remote access or intercepted shipping
ARROWECLIPSE - Counter CNE tool
@Darksidesfear
Darksidesfear / osx-for-hackers.sh
Created March 8, 2022 11:09 — forked from brandonb927/osx-for-hackers.sh
OSX for Hackers: Yosemite/El Capitan Edition. This script tries not to be *too* opinionated and any major changes to your system require a prompt. You've been warned.
#!/bin/sh
###
# SOME COMMANDS WILL NOT WORK ON macOS (Sierra or newer)
# For Sierra or newer, see https://github.com/mathiasbynens/dotfiles/blob/master/.macos
###
# Alot of these configs have been taken from the various places
# on the web, most from here
# https://github.com/mathiasbynens/dotfiles/blob/5b3c8418ed42d93af2e647dc9d122f25cc034871/.osx
@Darksidesfear
Darksidesfear / vpn.md
Created December 15, 2021 12:18 — forked from joepie91/vpn.md
Don't use VPN services.

Don't use VPN services.

No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.

Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.

  • A Russian translation of this article can be found here, contributed by Timur Demin.
  • A Turkish translation can be found here, contributed by agyild.
  • There's also this article about VPN services, which is honestly better written (and has more cat pictures!) than my article.

Ethereum Attacks

Security for internet applications is a spectrum, and it would be safe to assume that any application might have unnoticed vulnerabilities waiting to be exploited. Cryptocurrencies are especially attractive targets for hackers: because the technology is so novel, it is more likely to be hiding bugs, and the code usually interacts with tokens that have real-world value. Ethereum is no exception.

Attackers have successfully stolen ether using a number of tactics, which tend to aim at Ethereum smart contracts (written in Solidity), the network itself, cryptocurrency exchanges, or end users.

Attacks on Smart Contracts

The DAO

@Darksidesfear
Darksidesfear / OBWS_2.md
Created September 12, 2021 15:38 — forked from seresistvanandras/OBWS_2.md
Hacking smart contracts for fun and profit

Hacking smart contracts for fun and profit

Description of the game

The goal of the game to break as many contracts as possible! Note: one of these contracts is a HONEYPOT! BE CAREFUL!!

Claim your Ropsten test ether here!

The contracts you need to break and their addresses: