Skip to content

Instantly share code, notes, and snippets.

View djeraseit's full-sized avatar
🎯
Focusing

Theodis Butler djeraseit

🎯
Focusing
View GitHub Profile
@0x48piraj
0x48piraj / bindshell-unstable.c
Last active May 18, 2021 00:23
Bind shell network backdoor for embedded devices (tested on OpenWrt 18.06 firmware)
#include <sys/socket.h>
#include <netinet/in.h>
#include <stdlib.h>
#define BACKDOOR_PORT 4444
/* Author: Piyush Raj (0x48piraj)
* Bind Shell for OpenWrt 18.06 firmware, handles one connection per execution
* Arch : i486
* ./i486-openwrt-linux-musl-gcc bindshell-unstable.c -o bindshell
*/
void inject_trusts(int pathc, const char *paths[])
{
printf("[+] injecting into trust cache...\n");
extern uint64_t g_kern_base;
static uint64_t tc = 0;
if (tc == 0) {
/* loaded_trust_caches
iPhone11,2-4-6: 0xFFFFFFF008F702C8
@Pandry
Pandry / Firewalld GeoIP firewall script
Last active December 8, 2024 03:55
Block countries IPs via Firewalld
#!/bin/bash
##
# Name: GeoIP Firewall script
# Author: Pandry
# Version: 0.1.1
# Description: This is a simple script that will set up a GeoIP firewall blocking all the zones excecpt the specified ones
# it is possible to add the whitelisted zones @ line 47
# Additional notes: Usage of [iprange](https://github.com/firehol/iprange) is suggested
# for best performances
@rraallvv
rraallvv / open-cloudflare_(firewalld).sh
Last active November 19, 2022 22:44
Open public ports to Cloudflare for Firewalld
#!/usr/bin/env bash
# Instructions:
#
# 1) Place this script in the /root/ directory, give it proper permissions.
# $ sudo chmod +x /root/open-cloudflare.sh
#
# 2) Open the cron job editor
# $ sudo crontab -e
#
@extremecoders-re
extremecoders-re / openwrt-qemu.md
Last active April 3, 2025 14:50
Running OpenWRT ARM under QEMU

Environment

The steps shown below are done on a Ubuntu VM using Qemu 3.0

$ qemu-system-arm -version
QEMU emulator version 3.0.0
Copyright (c) 2003-2017 Fabrice Bellard and the QEMU Project developers

To quit Qemu at any time press Ctrl+a x, i.e. Ctrl+a and then x

@XMB5
XMB5 / ipsw-extract.sh
Created September 28, 2018 23:52
extract ipsw root file system on linux
#!/bin/bash
USAGE=$'extract ipsw root file system on linux
usage: ipsw-extract.sh iPhone_Restore.ipsw
requires apfs-fuse - https://github.com/sgan81/apfs-fuse'
if [ -z "$1" ]; then
echo "$USAGE"
exit 1
fi
@ekrist1
ekrist1 / GenerateSitemap.php
Created September 11, 2018 13:29
Laravelium Sitemap Example
<?php
namespace App\Jobs;
use Illuminate\Bus\Queueable;
use Illuminate\Queue\SerializesModels;
use Illuminate\Queue\InteractsWithQueue;
use Illuminate\Contracts\Queue\ShouldQueue;
use Illuminate\Foundation\Bus\Dispatchable;
use App\Item;
@heiny
heiny / EncryptDecryptRDCMan.ps1
Last active February 18, 2025 06:52
Powershell: Encrypt/Decrypt Remote Desktop Connection Manager Credentials
# There is no facility to replace passwords in RDCMan once they are stored. The only way is to create a new custom credential.
# If you open your *.rdg file in a text editor, locate the stored <password>, you can then decrypt it using this script.
# This script can also encrypt a plain text password in rdg format which can be used to overwrite an existing one in the xml.
Add-Type -AssemblyName System.Security;
Function EncryptPassword {
[CmdletBinding()]
param([String]$PlainText = $null)
# convert to RDCMan format: (null terminated chars)
@plembo
plembo / RPIwithQEMU.md
Last active April 4, 2025 19:39
Emulating a Raspberry Pi with QEMU

Emulating a Raspberry Pi with QEMU

Goal: Emulate a Raspberry Pi with QEMU in order to run the Raspbian O/S (based on Debian Linux).

The current setup is not ideal. For one thing, the maximum RAM allowed using the "versatile-pb" firmware is 256 Mb. In addition, only the most basic peripherals, a keyboard and mouse, are supported.

A number of articles have been written on this topic. Most are outdated, and the few recent ones are missing key information.

@mort3za
mort3za / torrc
Last active September 28, 2024 13:40
Using tor with bridges, torrc example config (bit.ly/m3torrc)
# sudo apt-get install obfs4proxy obfsproxy tor
# sudo vi /etc/tor/torrc
UseBridges 1
ClientTransportPlugin obfs3 exec /usr/bin/obfsproxy managed
ClientTransportPlugin obfs4 exec /usr/bin/obfs4proxy managed
# send email to [email protected] with body `get transport obfs4` you can get new bridges.
bridge obfs4 195.154.49.15:44705 BACD07DACE996093DC7635F33A98C49... cert=xc/wtKNWADfJQf232xSXT0WpzsaINw6fgPvZBy5Rkw4.../ypaZPDug9L... iat-mode=0