Traefik docker-compose with Trauth, Wildcard Certs & Metrics
Ref:
#!/usr/bin/env bash | |
# | |
# Dump headers for binaries in an extracted iOS applications' | |
# Payload folder using radare2. | |
dumpdir="headers/" | |
mkdir -p $dumpdir | |
find . -perm +111 -type f | grep -iv "libswift" | while read -r bin; do | |
echo "< Processing -> $bin" |
Hello world!
This was the internal @sensepost SenseCon 2021 announcement email (stripped), together with the supporting challenge.
Have phun!
# clone the certificate for SysInternals TCPView.exe and save | |
# it as cert.pfx | |
$o = Get-PfxCertificate -FilePath .\tcpview.exe | |
$cl = New-SelfSignedCertificate -CloneCert $o | |
$p = ConvertTo-SecureString -String "password" -Force -AsPlainText | |
Export-PfxCertificate -FilePath cert.pfx -Cert $cl -Password $p |
diff --git a/objection/console/cli.py b/objection/console/cli.py | |
index f9738d1..4814eff 100644 | |
--- a/objection/console/cli.py | |
+++ b/objection/console/cli.py | |
@@ -3,6 +3,8 @@ import time | |
from pathlib import Path | |
import click | |
+from prompt_toolkit import prompt | |
+from prompt_toolkit.completion import FuzzyCompleter, WordCompleter |
#!/bin/bash | |
# simple script to enable remote management via an ssh | |
set -e | |
if [ "$EUID" -ne 0 ] | |
then echo "please run as root (eg: sudo $0)" | |
exit | |
fi |
Forwards a remote iOS device, exposed via usbmuxd on Linux to a local macOS client.
The inverse (aka ssh -R) is left as an excercise to the reader, but shouldn't be too hard :)
This is basically a simple usbfluxd that only depends on socat.
Copy the bash script to a local file, say fwd_ios.sh
and make it executable with chmod +x fwd_ios.sh
.
#!/usr/bin/env python3 | |
# | |
# original: https://gist.github.com/joswr1ght/595d49d5a7914cf7305b73512f37186a | |
import sys | |
def countips(netblock): | |
v = netblock.split('/') | |
# nothing? |