Skip to content

Instantly share code, notes, and snippets.

View Liebmann5's full-sized avatar
🛹
Oh nooo! I've fallen and so have my trousers....

Nick Liebmann Liebmann5

🛹
Oh nooo! I've fallen and so have my trousers....
View GitHub Profile
@Mvcvalli
Mvcvalli / Useful Websites.md
Last active January 28, 2025 05:08
A long list of websites that I have kept bookmarked on my device for years now, I've finally decided to clear out my bookmarks. I am going to be adding links to all the websites that I either find useful or have found useful in the past. Something being on this list is not an endorsement.
@geekodour
geekodour / c.md
Last active January 13, 2025 04:04
security and privacy guides backup
@brainfucksec
brainfucksec / user.js
Last active April 2, 2025 16:19
user.js - brainfucksec
/*********************************************************************
*
* Name: user.js | brainfucksec
* Date: 2024-10-20
* Version: 0.23.0
* Descr.: Mozilla Firefox configuration file: `user.js`
* URL: https://gist.github.com/brainfucksec/68e79da1c965aeaa4782914afd8f7fa2
* Maintainer: brainf+ck
*
* INFO:
@LanceMcCarthy
LanceMcCarthy / UltimateListIds.md
Last active April 4, 2025 10:35
List of Package Ids
Name Package Id Version Source
7Zip 7zip.7zip 19.0.0 winget
Altap Salamander salamander choco
Alt-Tab Terminator alt-tab-terminator choco
AutoHotkey Lexikos.AutoHotkey 1.1.33.02 winget
AutoHotkey Store Edition HaukeGtze.AutoHotkeypoweredbyweatherlights.com Latest msstore (via winget)
Carnac
@sajjadium
sajjadium / iccaie2011botnet.md
Last active December 25, 2024 12:30
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches.

In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signatures, botnet C&C protocols, and C&C server addresses. We start from inherent characteristics of botnets. Bots connect to the C&C channel and execute the received commands. Bots belonging to the same botnet receive the same commands that causes them having similar netflows characteristics and performing same attacks. Our method clusters bots with similar netflows and attacks in different time windows and perform correlation to identify bot infected hosts. We have developed a prototype system and evaluated it with real-world traces including normal traffic and several real-world botnet traces. The results show that o

@Humbedooh
Humbedooh / asf-oauth-example.py
Created July 19, 2019 07:03
ASF Oauth Examples
#!/usr/bin/env python3
""" ASF OAuth example in Python 3"""
import cgi
import os
import requests
import urllib
import uuid
def init_oauth():
@sminez
sminez / get_ippsec_details.py
Last active June 5, 2024 12:10
Find examples of pen testing methods and tools in videos by Ippsec (as of 22nd January 2020)
#!/usr/bin/env python3
"""
Script used to pull down the current video descriptions from ippsec's youtube channel.
The raw output still has a few HTML tags that need to be manually removed and there
also seem to be multiple duplicates of videos that have been removed in the output
saved as ippsec-details.txt
"""
import re
import sys
@heywoodlh
heywoodlh / maderas.txt
Created June 19, 2019 15:47
Clone of the arsenal, armory & library by Maderas (@hackermaderas) -- https://pastebin.com/v8Mr2k95
The arsenal, armory & library by Maderas (@hackermaderas, #CyberpunkisNow) 6/8/2019
Original / 1st version here: https://pastebin.com/rMw4WbhX
___________________________________________________________________________________
# Basic knowledge requirements for Red Teaming, PenTesting, Hacking & Cybersecurity
# These are the basic competencies expected (and tested for during the in-person technical interview) by one of the largest, most visible InfoSec companies # on Earth.
@jhaddix
jhaddix / all.txt
Last active April 20, 2025 06:26
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎
0