Skip to content

Instantly share code, notes, and snippets.

View hotelzululima's full-sized avatar

hotelzululima hotelzululima

View GitHub Profile
@hotelzululima
hotelzululima / hash-setup.sh
Last active August 29, 2015 14:26 — forked from benmanns/hash-setup.sh
This sets up an Amazon cluster GPU instance for hash cracking with oclHashcat (CUDA). You must use the Ubuntu 12.04.x AMI for HVM. The most recent is Ubuntu Server 12.04.3 LTS for HVM Instances - ami-b93264d0.
sudo apt-get update -y && sudo apt-get upgrade -y
wget http://developer.download.nvidia.com/compute/cuda/repos/ubuntu1204/x86_64/cuda-repo-ubuntu1204_5.5-0_amd64.deb
sudo dpkg -i cuda-repo-ubuntu1204_5.5-0_amd64.deb
sudo apt-get update -y && sudo apt-get install -y nvidia-settings nvidia-current-dev nvidia-modprobe cuda
cat >> ~/.profile <<END
export CUDA_HOME=/usr/local/cuda-5.5
export CUDA_ROOT=/usr/local/cuda-5.5
@hotelzululima
hotelzululima / _FridaCommonJSIntegration.md
Last active September 20, 2015 19:08 — forked from oleavr/_FridaCommonJSIntegration.md
How to consume npm modules from Frida agent scripts

Install Node.js 4.x, then:

npm install frida co uuid

and run:

node app.js
#!/usr/bin/python
import socket
import re
from capstone import *
from Pwn import *
import sys
# p = Pwn(mode=1,host='52.20.10.244',port=12351)
def disas(code):
asm = ''
@hotelzululima
hotelzululima / find_iam_user.py
Created September 25, 2015 08:24 — forked from OnlyInAmerica/find_iam_user.py
Find an AWS IAM user corresponding to an AWS Access Key
# Find the IAM username belonging to the TARGET_ACCESS_KEY
# Useful for finding IAM user corresponding to a compromised AWS credential
# Requirements:
#
# Environmental variables:
# AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
# python:
# boto
@hotelzululima
hotelzululima / scapy_wireshark_poc.py
Created October 4, 2015 01:43
Dead simple PoC of how scapy could be used to build a replacement Wireshark without C
#!/usr/bin/env python2
try:
import scapy.all as scapy
except ImportError:
import scapy
if __name__ == "__main__":
from argparse import ArgumentParser
parser = ArgumentParser(
@hotelzululima
hotelzululima / tracking.js
Created October 9, 2015 09:31
My botnet tracking panel converted to reference a static gist as a demonstration. I'm new to nodejs, so feel free to point out any glaring issues.
var blessed = require('blessed');
var contrib = require('blessed-contrib');
var screen = blessed.screen();
var request = require("request");
// You need to install dependencies:
// npm install blessed blessed-contrib
// Constants
@hotelzululima
hotelzululima / network_shellcode_detection.py
Created October 13, 2015 09:17
Proof of concept for detecting shellcode in either PCAPs or off the network
#!/usr/bin/env python2
import logging
logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
from multiprocessing.pool import ThreadPool
from multiprocessing import cpu_count
import libemu
from cachetools import LRUCache
from scapy.layers.all import TCP, UDP, Raw
from scapy.all import sniff
@hotelzululima
hotelzululima / gist:d9c20560ef345031cb26
Created November 10, 2015 18:57 — forked from david415/gist:120f157f62d20b11e39f
secret onion git http repo! fuck github. no masters. no sys admins. only the secret police know how cool i am.
# install txtorcon!
virtualenv virtenv-txtorcon
. ./virtenv-txtorcon/bin/activate
pip install txtorcon
export project=myproject
export secret=`pwgen 64`
mkdir -p public_html/$secret
cp -a $project public_html/$secret
@hotelzululima
hotelzululima / JSRat.ps1
Created January 25, 2016 03:54
Fileless JavaScript Reverse HTTP Shell
<#
Author: Casey Smith @subTee
License: BSD3-Clause
.SYNOPSIS
Simple Reverse Shell over HTTP. Execute Commands on Client.
@hotelzululima
hotelzululima / RSAGuts.ps1
Created March 10, 2016 20:08
RSA Algorithm in PowerShell. Just Cause
<#
Created By Casey Smith
@subTee
RSA in PowerShell.
Just Cause...
Reference notes for the curious
p = 61 <= first prime number (destroy this after computing e and d)
q = 53 <= second prime number (destroy this after computing e and d)