Skip to content

Instantly share code, notes, and snippets.

View flabbergastedbd's full-sized avatar
🐢

BD flabbergastedbd

🐢
View GitHub Profile
@flabbergastedbd
flabbergastedbd / gencert.py
Last active June 29, 2017 21:41
A python script which generates certificates and signs them using a specified CA.
#!/usr/bin/env python
# -*- coding: utf-8 -*-
#
# gencert.py
#
# Copyright 2013 tunnelshade <blog.tunnelshade.in>
#
# * openssl genrsa -des3 -out ca.key 1024
#
# * openssl req -new -x509 -days 3650 -key ca.key -out ca.crt

Keybase proof

I hereby claim:

  • I am tunnelshade on github.
  • I am tunnelshade (https://keybase.io/tunnelshade) on keybase.
  • I have a public key whose fingerprint is 268A 4492 21BE DE47 C088 90D5 D9D9 360F 091F AB46

To claim this, I am signing this object:

@flabbergastedbd
flabbergastedbd / html_png_polyglot.py
Last active January 16, 2024 09:27
A simple fun python script written to hide actual payload in image pixels and adding the loader to a PNG file.
# Simple script to have fun with PNG+HTML polyglot
# WARNING: This script is not optimised and just written for fun
#
# Author : Bharadwaj Machiraju
#
# Requirements: Pillow
#
# http://blog.tunnelshade.in/2015/06/stegosploit-fun.html
import re
@flabbergastedbd
flabbergastedbd / escalate.py
Created March 16, 2018 22:10
Troopers18 Packetwars Part 2 - Exploiatation
# On a linux box, inside the home of a privileged user were some files.
#
# - run_exploit_server (had setuid bit set, executable by all and was compiled with PIC flag).
# - run_exploit_server.c
# - shellcode.bin with permissions (644).
#
# The task was to escalate privileges somehow using these three things
#
# * The server reads from a relative file i.e ./shellcode.bin and echos it to
# the clients connecting to it.