Skip to content

Instantly share code, notes, and snippets.

View bandrel's full-sized avatar

Justin Bollinger bandrel

View GitHub Profile
@bandrel
bandrel / gist:f5522442e8c20a1904eae8e6ea99f0ad
Created April 22, 2026 15:35
April2026 Nightly update causing segfault
#!/bin/bash
# Fix msfconsole segfault caused by bundled libpq ABI mismatch with OpenSSL 3
# in metasploit-framework 6.4.126+ (April 2026 nightly).
# Patches /usr/bin/msfconsole to preload the system libpq instead.
set -euo pipefail
SYSTEM_LIBPQ="/usr/lib/x86_64-linux-gnu/libpq.so.5"
MSF_WRAPPER="/usr/bin/msfconsole"
if [ ! -f "$SYSTEM_LIBPQ" ]; then
@bandrel
bandrel / gist:ba8251f1956f332b9356c218122845ba
Created February 23, 2026 14:43
ICMP Timestamp Request Check
#!/usr/bin/env python3
"""
ICMP Timestamp Request/Reply Checker
Sends ICMP Timestamp Request (Type 13) packets to target hosts and checks
for Timestamp Reply (Type 14) responses. Useful for reconnaissance and
verifying host ICMP timestamp behavior.
Uses raw sockets — requires root/sudo privileges.
Zero external dependencies.
#!/bin/bash
#
blob=$(cat <<EOF
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
#!/usr/local/bin/env python3
# /// script
# dependencies = [
# "flask",
# "requests",
# ]
# ///
#Signup for https://trigger.esp8266-server.de/ to enable webhooks within Alexa using the webhooks skill.
#!/bin/bash
#Find Jenkins generates a target list from the metasploit database.
#gowitness
sqlite3 gowitness.sqlite3 "SELECT url FROM results WHERE title LIKE '%Jenkins%';" > /tmp/urls.txt
#msf
#msfconsole -q -x 'services -s http -p 8090,9090,8080,443 -o /tmp/http_services.csv;exit'
cat /tmp/http_services.csv | grep ssl | cut -d ',' -f 1,2 | tr -d '"' | tr ',' ':' | sed 's/^/https:\/\//' >> /tmp/urls.txt
Param(
)
$VerbosePreference = "Continue"
# Ensure the script is running with elevated privileges
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) {
Write-Error "This script must be run as an Administrator"
exit
}
#!/bin/env python3
import openpyxl
import os
import sys
# Load the Excel file
file_path = sys.argv[1]
wb = openpyxl.load_workbook(file_path)
# Create a directory to save the text files
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
@bandrel
bandrel / gist:2289f6bcc19ba4027ba7d297811330e0
Created August 16, 2024 14:39
Download all of the wordlists from weakpass.com
#!/bin/bash
# Needs transmission-cli, parallel and wget
# brew install transmission-cli
# brew install parallel
# apt get install transmission-cli parallel wget -y
blob=$(cat <<EOF
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
#!/usr/bin/env python3
import re
import sys
def convert_hex_base64(input):
from base64 import b64encode, b64decode
# hex -> base64
b64 = b64encode(bytes.fromhex(input)).decode()
# base64 -> hex
s2 = b64decode(b64.encode()).hex()