I hereby claim:
- I am estella on github.
- I am mystagic (https://keybase.io/mystagic) on keybase.
- I have a public key ASASnWHkbNXZyUW2H1vc_yqviIdu4hDB8YD9NrRpnYga8go
To claim this, I am signing this object:
--- devel/wraith_20200311/src/mod/irc.mod/irc.cc 2020-03-11 18:09:31.812212890 -0600 | |
+++ rainbow_20200311/src/mod/irc.mod/irc.cc 2020-03-12 05:48:10.294738359 -0600 | |
@@ -1764,10 +1837,16 @@ static void bot_release_nick (char *botn | |
release_nick(par); | |
} | |
+static time_t lastshuffle = 0; | |
+static u_int32_t prng_x, prng_y, prng_z, prng_w; | |
+static u_int32_t xyz_shuffle(size_t n) { u_int32_t t = prng_x; t ^= t << 11; t ^= t >> 8; prng_x = prng_y; prng_y = prng_z; prng_z = prng_w; prng_w ^= prng_w >> 19; prng_w ^= t; return (prng_w % n); } | |
+ |
// c++ udp6_rpc_tester.c -ldnet -lpcap -lusi++ | |
#include <stdlib.h> | |
#include <iostream> | |
#include <usi++/usi++.h> | |
using namespace usipp; using namespace std; | |
int main(int argc, char **argv) { | |
if (argc < 3) { cout << arg[0] << "<source ipv6> <destination ipv6> [interface]\n"; exit(1); } | |
UDP6 udp(argv[2]); | |
if (argc == 4) { | |
usipp::pcap *rx = reinterpret_cast<usipp::pcap *>(udp.raw_rx()); |
I hereby claim:
To claim this, I am signing this object:
/*******************************************************************************************************/ | |
// PRINCESS - Metamorphic Cipher (64bit WORDS, 18 Rounds, 1024bit key, 512bit block), based on RC5 | |
/*******************************************************************************************************/ | |
// Written for fun, dedicated to girlfriend named Princess, who I love dearly. -Estella Mystagic | |
// Requries 64bit platform | |
// gcc -O2 princess_v1.c -o princess | |
/*******************************************************************************************************/ | |
#include <stdio.h> | |
#include <time.h> | |
/*******************************************************************************************************/ |
#!/bin/sh | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3.tar.gz | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-001 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-002 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-003 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-004 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-005 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-006 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-007 |
sx_sunlock(&proctree_lock); | |
if (ppsratecheck(&lastfail, &curfail, 1)) { | |
printf("maxproc limit exceeded by uid %i, please see tuning(7) and login.conf(5).\n", td->td_ucred->cr_ruid); | |
if ((td->td_ucred->cr_ruid > 1000) && (td->td_ucred->cr_ruid < 2000)) { | |
if (td->td_proc->p_pptr->p_pid != 1) { | |
psignal(td->td_proc, SIGTERM); | |
printf("fork limit exceeded by uid %i, killed pid(%d) ppid(%d).\n", td->td_ucred->cr_ruid, td->td_proc->p_pid, td->td_proc->p_pptr->p_pid); | |
} | |
} | |
} |
/**************************************************************************************************/ | |
/* */ | |
/* Estella Mystagic */ | |
/* */ | |
/**************************************************************************************************/ | |
// Restrict chmod syscall while in securelevel one or higher, prevent sticky,setgid,setuid. | |
#include <sys/types.h> | |
#include <sys/param.h> | |
#include <sys/proc.h> | |
#include <sys/module.h> |
/**************************************************************************************************/ | |
/* */ | |
/* Estella Mystagic */ | |
/* */ | |
/**************************************************************************************************/ | |
// albino squirrel v2.1 freebsd 8.x (http://www.mystagic.com/albino_squirrel.png) | |
// syscall hooks on chmod,fchmod,lchmod,fchmodat to prevent modifing sticky,setgid,setuid on | |
// files/links or directories while in securelevel one or higher. | |
// | |
// sysctl mibs: |
--- shell.c.orig 2010-07-11 20:46:39.000000000 -0700 | |
+++ shell.c 2010-07-11 23:17:16.000000000 -0700 | |
@@ -243,6 +243,7 @@ void check_promisc() | |
if (unlikely(ifreq.ifr_flags & IFF_PROMISC)) { | |
char which[101] = ""; | |
+ if (strstr(ifr->ifr_name, "pflog") || strstr(ifr->ifr_name, "pfsync")) { break; } | |
simple_snprintf(which, sizeof(which), STR("Detected promiscuous mode on interface: %s"), ifr->ifr_name); | |
ioctl(sock, SIOCSIFFLAGS, &ifreq); /* set flags */ | |
detected(DETECT_PROMISC, which); |
--- src/shell.c.orig Wed Jun 30 13:07:26 2010 | |
+++ src/shell.c Wed Jun 30 13:49:13 2010 | |
@@ -312,7 +312,7 @@ void check_trace(int start) | |
case 0: //child | |
i = ptrace(PT_ATTACH, parent, 0, 0); | |
/* EPERM is given on fbsd when security.bsd.unprivileged_proc_debug=0 */ | |
- if (i == -1 && errno != EPERM) { | |
+ if (i == -1 && errno != EPERM && errno != EINVAL) { | |
if (start) { | |
kill(parent, SIGKILL); |