Skip to content

Instantly share code, notes, and snippets.

@miketweaver
miketweaver / digitalocean-openvpn-guide.md
Last active February 12, 2018 13:50
Digital Ocean OpenVPN commands
@miketweaver
miketweaver / setup-nightshade.md
Last active January 22, 2018 20:34
Setup NightShade

Install NightShade

Get NightShade Files

git clone https://github.com/UnrealAkama/NightShade
cd NightShade

Setup Pip and Postgres

sudo apt update
@miketweaver
miketweaver / cleanup.bat
Last active December 20, 2018 14:02
Windows VM Cleanup before Snapshot
REM # -----------------------------------------------------------------
REM # This requires ultradefrag, and sdelete installed.
REM # cinst ultradefrag sysinternals -y
REM # run as Admin
REM # -----------------------------------------------------------------
net stop wuauserv
rmdir /S /Q C:\Windows\SoftwareDistribution\Download
mkdir C:\Windows\SoftwareDistribution\Download
net start wuauserv
@miketweaver
miketweaver / Learn_Security.md
Last active December 7, 2017 20:00
Guide to Learning Security

@miketweaver
miketweaver / PassswordCTF2017.md
Last active August 2, 2025 11:46
PCrack CTF Post-Mortem - 2017

PCrack CTF Post-Mortem - 2017

Thank you to everyone who played this year at @SAINTCON! We had an awesome time and loved seeing everyone heat up their rooms and test their skills. As far as I'm aware, there was only one graphics card killed in this endeavor (sorry about that @d4rkm4tter).

Scores

SAINTCON Players:

1st - 53,371,688 - leeroy

@miketweaver
miketweaver / mangler.py
Created October 16, 2017 21:53
PasswordCTF.com Mangler
import random
import os
import sys
import hashlib
import thread
leetrandomness = 1;
temppassword = ""
use = False
@miketweaver
miketweaver / SecondValidationMethod.md
Created October 13, 2017 16:15
Second Validation Method

So, for validation, here is my suggestion. Works for however people want to submit (separate hashes.txt, password.txt or combined "hash:pass" file).

  • grab a copy of mdxfind/mdsplit from http://hashes.org . Ensure you have the contest-orginal pcrack.master.hashed.txt file (it will be read-only).

  • If separate files:

     mdxfind -f pcrack.master.hashed.txt -h ^sha1$ plaintext.txt >result
     mdsplit -f result hashes.txt

You will be left with hashes.txt and hashes.SHA1x01. The hashes.SHA1x01 are the validated number of cracks (wc -l to get number), and any invalid hash submissions will be in hashes.txt. If this file is empty, all hashes validated.

#!/usr/bin/env python
import hashlib
import binascii
score = 0
hashfile = "newformat.txt"
# Notes:
# Chars 0-39 are the first 40 chars of the hash
#!/usr/bin/env python
import hashlib
score = 0
plaintext = "plaintext.txt"
hashes = "hashes.txt"
plainfile = open(plaintext)
hashfile = open(hashes)
@miketweaver
miketweaver / API.md
Last active October 12, 2017 17:38
API.md

Command:

curl -X POST   https://api.passwordctf.com/hashes   -d '{
"data": {
"user_name": "USERNAME GOES HERE",
"api_key": "API KEY GOES HERE",
"hashes": [
"a2477e96493f08578eac08f015ec74ead449cd04:73f1e0a2254a21f094652b8b82b2f586"
]
}