start new:
tmux
start new with session name:
tmux new -s myname
| # This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do | |
| # Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz | |
| # http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/ | |
| import string | |
| import zlib | |
| import sys | |
| import random | |
| charset = string.letters + string.digits + "%/+=" | 
| ''' | |
| Question 1 | |
| Many Time Pad | |
| Let us see what goes wrong when a stream cipher key is used more than once. Below are eleven | |
| hex-encoded ciphertexts that are the result of encrypting eleven plaintexts with a stream | |
| cipher, all with the same stream cipher key. Your goal is to decrypt the last ciphertext, | |
| and submit the secret message within it as solution. | |
| Hint: XOR the ciphertexts together, and consider what happens when a space is XORed with | 
| # Unofficial brew formula for proxychains 4 | |
| # Instruction: | |
| # $ git clone git://gist.github.com/3792521.git gist-3792521 | |
| # $ brew install --HEAD gist-3792521/proxychains4_formula.rb | |
| # | |
| # The default config file will be located in /usr/local/etc/proxychains.conf | |
| # | |
| require 'formula' | |
| class Proxychains < Formula | 
| <!DOCTYPE html> | |
| <html> | |
| <head> | |
| <title>QUnit Test Suite</title> | |
| <link rel="stylesheet" href="//code.jquery.com/qunit/qunit-git.css"> | |
| <script src="//code.jquery.com/qunit/qunit-git.js"></script> | |
| <!-- Your project file goes here --> | |
| <script src="myProject.js"></script> | |
| <!-- Your tests file goes here --> | |
| <script src="myTests.js"></script> | 
| Copyright (C) 2012 Yoshimasa Niwa | |
| Permission is hereby granted, free of charge, to any person obtaining | |
| a copy of this software and associated documentation files (the | |
| "Software"), to deal in the Software without restriction, including | |
| without limitation the rights to use, copy, modify, merge, publish, | |
| distribute, sublicense, and/or sell copies of the Software, and to | |
| permit persons to whom the Software is furnished to do so, subject to | |
| the following conditions: | 
| #!/usr/bin/python | |
| # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
| # The author disclaims copyright to this source code. | |
| # | |
| # Modified slightly by Andreas Thienemann <[email protected]> for clearer exploit code | |
| # and 64k reads | |
| # | |
| # This version of the exploit does write received data to a file called "dump" in the local directory | |
| # for analysis. | 
| #!/usr/bin/python | |
| # Modified by Travis Lee | |
| # Last Updated: 4/21/14 | |
| # Version 1.16 | |
| # | |
| # -changed output to display text only instead of hexdump and made it easier to read | |
| # -added option to specify number of times to connect to server (to get more data) | |
| # -added option to send STARTTLS command for use with SMTP/POP/IMAP/FTP/etc... | |
| # -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port) | 
| DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE | |
| Copyright (C) 2014 ADDY OSMANI <addyosmani.com> | |
| Everyone is permitted to copy and distribute verbatim or modified | |
| copies of this license document, and changing it is allowed as long | |
| as the name is changed. | |
| DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE | |
| TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION |