Skip to content

Instantly share code, notes, and snippets.

@martin-grindr
martin-grindr / td_server.py
Created July 11, 2017 17:58
Treasure Data echo server
#!/usr/bin/env python3
import json
from http.server import BaseHTTPRequestHandler, HTTPServer
from optparse import OptionParser
class RequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
self.send_response(200)
@nukeador
nukeador / vpn-firewall.sh
Last active December 19, 2020 22:42
Connect to VPN and force all traffic to travel using it. Will monitor and reconnect if VPN drops.
#!/bin/bash
# Your VPN ip address, you can use: host yourvpnaddress.com
VPN_IP="X.X.X.X"
# Your VPN name on Network Manager, to list all connections you can use: nmcli con
VPN_NAME="your.vpn.name"
# Your network device, usually wlan0 for wifi and eth0 for cable, check with: ifconfig
NW_DEVICE="wlan0"
# Your local network range, change if different
LOCAL_NW="192.168.0.0/16"
@HarmJ0y
HarmJ0y / PowerView-3.0-tricks.ps1
Last active April 28, 2025 10:06
PowerView-3.0 tips and tricks
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit:
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1
# New function naming schema:
# Verbs:
# Get : retrieve full raw data sets
# Find : ‘find’ specific data entries in a data set
@rdegges
rdegges / abstract.md
Created June 1, 2017 06:25
Talk Abstract

JWTs Aren't So great

JSON Web Tokens (JWTs) are all the rage in the security world. They’re becoming more and more ubiquitous in web authentication libraries, and are commonly used to store a user’s identity information.

In this talk, Randall Degges, Developer Advocate at Okta, will walk you through web authentication from the ground up, explaining how it works both with and without JWTs. Along the way you’ll learn why JWTs aren’t as great as you might hear, and learn about better ways to speed up web authentication for your websites.

Through this talk, you’ll learn:

  • How web authentication works.
  • How HTTP sessions and cookies store information.
@varenc
varenc / pet-snippet.toml
Last active April 29, 2025 03:51
description
[[Snippets]]
Description = "my personal snippets. Relies on many of my own functions. If you're interested in pmset/disabling assertions, see: https://gist.github.com/varenc/627f6be2a5ec9d52dab3cf0d157be62f"
Output = ""
Tag = []
command = ""
[[Snippets]]
Description = "start dev file syncer. uses fswatch to know when to run rsync. does not sync .git file. Sort like a write-through cache network file system with only eventual consistency guarantees."
Output = ""
@fcolista
fcolista / configure-metasploit-alpine.sh
Last active February 14, 2024 10:01
AlpineLinux: metasploit configuration script to run as ordinary user and DB configuration (postgresql). Updated for Alpine 3.19.
#!/bin/sh
#
# (c) 2024 Francesco Colista
# [email protected]
#
# Configure metasploit to run as $USER
#
_yn() {
case $(echo $1 | tr '[A-Z]' '[a-z]') in
@jwalanta
jwalanta / OpenWrt detect new device and send text message.md
Last active April 21, 2025 08:59
Detect new network devices connecting to OpenWrt and send text message
@BlackVikingPro
BlackVikingPro / sms-bomber.py
Last active January 22, 2025 19:58
SMS Bombing (Spamming) Application! [Python]
#! /usr/bin/env python
import time, smtplib, sys, getpass
# need to define:
"""
e-prov (email-provider) [gmail]|[yahoo]|[custom]
from [attacker email]
from-spoof [spoof attacker email]
to [target email (syntax: [10-digit #]@mms|txt.[provider].com|net|org)]
c [count (# of txt's to send)]
@jae-jae
jae-jae / show-site-all-userjs.user.js
Last active February 20, 2024 03:08
显示当前网站的所有可用Tampermonkey脚本.user.js
// ==UserScript==
// @name Show Site All UserJS | 显示当前网站所有可用的UserJS脚本 Jaeger
// @namespace https://gist.github.com/jae-jae/39d526079cb2408389129caf98debc29
// @version 1.1
// @description 显示当前网站的所有可用UserJS(Tampermonkey)脚本,交流QQ群:104267383
// @author Jaeger <[email protected]>
// @icon https://greasyfork.org/assets/blacklogo16-b3c5358e47023ea84cbeac99a018eb28.png
// @include *
// @require https://cdn.bootcss.com/babel-core/5.6.15/browser-polyfill.min.js