start new:
tmux
start new with session name:
tmux new -s myname
# This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do | |
# Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz | |
# http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/ | |
import string | |
import zlib | |
import sys | |
import random | |
charset = string.letters + string.digits + "%/+=" |
''' | |
Question 1 | |
Many Time Pad | |
Let us see what goes wrong when a stream cipher key is used more than once. Below are eleven | |
hex-encoded ciphertexts that are the result of encrypting eleven plaintexts with a stream | |
cipher, all with the same stream cipher key. Your goal is to decrypt the last ciphertext, | |
and submit the secret message within it as solution. | |
Hint: XOR the ciphertexts together, and consider what happens when a space is XORed with |
# Unofficial brew formula for proxychains 4 | |
# Instruction: | |
# $ git clone git://gist.github.com/3792521.git gist-3792521 | |
# $ brew install --HEAD gist-3792521/proxychains4_formula.rb | |
# | |
# The default config file will be located in /usr/local/etc/proxychains.conf | |
# | |
require 'formula' | |
class Proxychains < Formula |
<!DOCTYPE html> | |
<html> | |
<head> | |
<title>QUnit Test Suite</title> | |
<link rel="stylesheet" href="//code.jquery.com/qunit/qunit-git.css"> | |
<script src="//code.jquery.com/qunit/qunit-git.js"></script> | |
<!-- Your project file goes here --> | |
<script src="myProject.js"></script> | |
<!-- Your tests file goes here --> | |
<script src="myTests.js"></script> |
Copyright (C) 2012 Yoshimasa Niwa | |
Permission is hereby granted, free of charge, to any person obtaining | |
a copy of this software and associated documentation files (the | |
"Software"), to deal in the Software without restriction, including | |
without limitation the rights to use, copy, modify, merge, publish, | |
distribute, sublicense, and/or sell copies of the Software, and to | |
permit persons to whom the Software is furnished to do so, subject to | |
the following conditions: |
#!/usr/bin/python | |
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
# The author disclaims copyright to this source code. | |
# | |
# Modified slightly by Andreas Thienemann <[email protected]> for clearer exploit code | |
# and 64k reads | |
# | |
# This version of the exploit does write received data to a file called "dump" in the local directory | |
# for analysis. |
#!/usr/bin/python | |
# Modified by Travis Lee | |
# Last Updated: 4/21/14 | |
# Version 1.16 | |
# | |
# -changed output to display text only instead of hexdump and made it easier to read | |
# -added option to specify number of times to connect to server (to get more data) | |
# -added option to send STARTTLS command for use with SMTP/POP/IMAP/FTP/etc... | |
# -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port) |
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE | |
Copyright (C) 2014 ADDY OSMANI <addyosmani.com> | |
Everyone is permitted to copy and distribute verbatim or modified | |
copies of this license document, and changing it is allowed as long | |
as the name is changed. | |
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE | |
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION |