Skip to content

Instantly share code, notes, and snippets.

View JohnTroony's full-sized avatar
🐙
multitasking

Octo Leap JohnTroony

🐙
multitasking
View GitHub Profile
@JohnTroony
JohnTroony / hardening_usbarmory.md
Created November 19, 2015 15:16 — forked from yann2192/hardening_usbarmory.md
Hardening USB Armory

Hardening the USB Armory

As a good crypto nerd, I usually use an entirely encrypted linux FS: / but also /boot using grub LUKS support. It's a good setup but it's not perfect, the BIOS and the bootloader are not protected.

I recently got a USBArmory and I wanted to apply the same (or a better) setup.

I found some useful links but no clear howto. So this is my setup.

@JohnTroony
JohnTroony / hidden_service.py
Created November 9, 2015 07:01 — forked from PaulSec/hidden_service.py
Launches tor and creates a hidden service with port 80 accessible (Flask)
import sys, threading, time
from stem.control import Controller
from stem import SocketError, UnsatisfiableRequest
import stem.process
from stem.util import term
from flask import Flask
import socks
WEB_PORT = 8080

API Hack-a-thon

heroku

API Team

brandur mfine pedro sclasen geemus

#!/usr/bin/env python
# Troon Jay
import zipfile
from threading import Thread
from optparse import OptionParser
def crackfile(zipfile,password):
try:
zipfile.extractall(pwd=password)
@JohnTroony
JohnTroony / CTF2_AH_PassList.txt
Created May 18, 2015 09:08
Password list for the CTF2 AH Internal CTF solution
Insecure_admina
Insecure_adminb
Insecure_adminc
Insecure_admind
Insecure_admine
Insecure_adminf
Insecure_adming
Insecure_adminh
Insecure_admini
Insecure_adminj
#!/usr/bin/env python
# Troon Jay
from itertools import product
def allwords(chars, length):
for letters in product(chars, repeat=length):
yield ''.join(letters)
def main():
#!/usr/bin/python
"""
Exploit for Samba vulnerabilty (CVE-2015-0240) by sleepya
The exploit only targets vulnerable x86 smbd <3.6.24 which 'creds' is controlled by
ReferentID field of PrimaryName (ServerName). That means '_talloc_zero()'
in libtalloc does not write a value on 'creds' address.
Reference:
- https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/
#!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
This script will delete all of the tweets in the specified account.
You may need to hit the "more" button on the bottom of your twitter profile
page every now and then as the script runs, this is due to a bug in twitter.
You will need to get a consumer key and consumer secret token to use this
script, you can do so by registering a twitter application at https://dev.twitter.com/apps