Go to any directory and clone repo with sources.
cd ~
git clone https://github.com/certbot/certbot
import java.io.*; | |
import java.math.BigInteger; | |
import java.security.*; | |
import java.security.spec.*; | |
import java.security.cert.*; | |
import java.security.interfaces.*; | |
import java.util.Base64; | |
import javax.xml.parsers.DocumentBuilder; | |
import javax.xml.parsers.DocumentBuilderFactory; |
#include <string.h> | |
#include <stdio.h> | |
#include <hwcrypto/aes.h> | |
/* | |
For Encryption time: 1802.40us (9.09 MB/s) at 16kB blocks. | |
*/ | |
static inline int32_t _getCycleCount(void) { | |
int32_t ccount; |
I have tried this setup and although it works and may be good for ceratin circumstances I would advise using ubuntu as the base with docker, docker-compose, and portainer. https://gist.github.com/mow4cash/626275e095f7f90898944a85d66b3be6
Link to my docker run file https://gist.github.com/mow4cash/6a25343cdeb0cd115f263dea0a3b623d
Nginx can be configured to route to a backend, based on the server's domain name, which is included in the SSL/TLS handshake (Server Name Indication, SNI).
This works for http upstream servers, but also for other protocols, that can be secured with TLS.
nginx -V
for the following:
...
TLS SNI support enabled
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
The main point is to save the SSL/TLS keys those used by the web browser (SSLKEYLOGFILE=/tmp/tmp-google/.ssl-key.log
).
In the example below we run brand new instance of Google Chrome (--user-data-dir=/tmp/tmp-google
do the trick):
SSLKEYLOGFILE=/tmp/tmp-google/.ssl-key.log /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --user-data-dir=/tmp/tmp-google
Then run the Wireshark and open the Preferences -> Protocols -> SSL, where we put the path to the SSL keys log file into the (Pre)-Master-Secret log filename
field.
Now all SSL/TLS traffic from this browser instance will be decrypted.
Note: This gist may be outdated, thanks to all contributors in comments.
adb
is the Android CLI tool with which you can interact with your android device, from your PC
You must enable developer mode (tap 7 times on the build version in parameters) and install adb on your PC.
Don't hesitate to read comments, there is useful tips, thanks guys for this !
# SMA Speedwire interpreter | |
# | |
# This little script interprets SMA's speedwire as multicasted from the Sunny Home Manager 2 | |
# and will print out the energy flow total, and for each phase | |
import socket | |
import struct | |
MULTICAST_IP = "239.12.255.254" | |
MULTICAST_PORT = 9522 |