Skip to content

Instantly share code, notes, and snippets.

View Estella's full-sized avatar
💭
Esᴛᴇʟʟᴀ Mʏsᴛᴀɢɪᴄ🍁

Estella Mystagic Estella

💭
Esᴛᴇʟʟᴀ Mʏsᴛᴀɢɪᴄ🍁
View GitHub Profile
@Estella
Estella / shuffle_roles.diff
Created March 12, 2020 12:03
shuffle_roles.diff for wraith v1.4.8-5375-g9d8fbc9b
--- devel/wraith_20200311/src/mod/irc.mod/irc.cc 2020-03-11 18:09:31.812212890 -0600
+++ rainbow_20200311/src/mod/irc.mod/irc.cc 2020-03-12 05:48:10.294738359 -0600
@@ -1764,10 +1837,16 @@ static void bot_release_nick (char *botn
release_nick(par);
}
+static time_t lastshuffle = 0;
+static u_int32_t prng_x, prng_y, prng_z, prng_w;
+static u_int32_t xyz_shuffle(size_t n) { u_int32_t t = prng_x; t ^= t << 11; t ^= t >> 8; prng_x = prng_y; prng_y = prng_z; prng_z = prng_w; prng_w ^= prng_w >> 19; prng_w ^= t; return (prng_w % n); }
+
// c++ udp6_rpc_tester.c -ldnet -lpcap -lusi++
#include <stdlib.h>
#include <iostream>
#include <usi++/usi++.h>
using namespace usipp; using namespace std;
int main(int argc, char **argv) {
if (argc < 3) { cout << arg[0] << "<source ipv6> <destination ipv6> [interface]\n"; exit(1); }
UDP6 udp(argv[2]);
if (argc == 4) {
usipp::pcap *rx = reinterpret_cast<usipp::pcap *>(udp.raw_rx());

Keybase proof

I hereby claim:

  • I am estella on github.
  • I am mystagic (https://keybase.io/mystagic) on keybase.
  • I have a public key ASASnWHkbNXZyUW2H1vc_yqviIdu4hDB8YD9NrRpnYga8go

To claim this, I am signing this object:

/*******************************************************************************************************/
// PRINCESS - Metamorphic Cipher (64bit WORDS, 18 Rounds, 1024bit key, 512bit block), based on RC5
/*******************************************************************************************************/
// Written for fun, dedicated to girlfriend named Princess, who I love dearly. -Estella Mystagic
// Requries 64bit platform
// gcc -O2 princess_v1.c -o princess
/*******************************************************************************************************/
#include <stdio.h>
#include <time.h>
/*******************************************************************************************************/
@Estella
Estella / gist:995580dda5bad445e019
Created September 25, 2014 18:42
# Bash Vuln CVE-2014-6271 / CVE-2014-7169 - Fix/Notes
#!/bin/sh
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3.tar.gz
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-001
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-002
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-003
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-004
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-005
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-006
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-007
sx_sunlock(&proctree_lock);
if (ppsratecheck(&lastfail, &curfail, 1)) {
printf("maxproc limit exceeded by uid %i, please see tuning(7) and login.conf(5).\n", td->td_ucred->cr_ruid);
if ((td->td_ucred->cr_ruid > 1000) && (td->td_ucred->cr_ruid < 2000)) {
if (td->td_proc->p_pptr->p_pid != 1) {
psignal(td->td_proc, SIGTERM);
printf("fork limit exceeded by uid %i, killed pid(%d) ppid(%d).\n", td->td_ucred->cr_ruid, td->td_proc->p_pid, td->td_proc->p_pptr->p_pid);
}
}
}
/**************************************************************************************************/
/* */
/* Estella Mystagic */
/* */
/**************************************************************************************************/
// Restrict chmod syscall while in securelevel one or higher, prevent sticky,setgid,setuid.
#include <sys/types.h>
#include <sys/param.h>
#include <sys/proc.h>
#include <sys/module.h>
/**************************************************************************************************/
/* */
/* Estella Mystagic */
/* */
/**************************************************************************************************/
// albino squirrel v2.1 freebsd 8.x (http://www.mystagic.com/albino_squirrel.png)
// syscall hooks on chmod,fchmod,lchmod,fchmodat to prevent modifing sticky,setgid,setuid on
// files/links or directories while in securelevel one or higher.
//
// sysctl mibs:
--- shell.c.orig 2010-07-11 20:46:39.000000000 -0700
+++ shell.c 2010-07-11 23:17:16.000000000 -0700
@@ -243,6 +243,7 @@ void check_promisc()
if (unlikely(ifreq.ifr_flags & IFF_PROMISC)) {
char which[101] = "";
+ if (strstr(ifr->ifr_name, "pflog") || strstr(ifr->ifr_name, "pfsync")) { break; }
simple_snprintf(which, sizeof(which), STR("Detected promiscuous mode on interface: %s"), ifr->ifr_name);
ioctl(sock, SIOCSIFFLAGS, &ifreq); /* set flags */
detected(DETECT_PROMISC, which);
--- src/shell.c.orig Wed Jun 30 13:07:26 2010
+++ src/shell.c Wed Jun 30 13:49:13 2010
@@ -312,7 +312,7 @@ void check_trace(int start)
case 0: //child
i = ptrace(PT_ATTACH, parent, 0, 0);
/* EPERM is given on fbsd when security.bsd.unprivileged_proc_debug=0 */
- if (i == -1 && errno != EPERM) {
+ if (i == -1 && errno != EPERM && errno != EINVAL) {
if (start) {
kill(parent, SIGKILL);