Skip to content

Instantly share code, notes, and snippets.

View pjstorm's full-sized avatar
💭
...derping

Pattern Juggled ie ðørkßöt pjstorm

💭
...derping
View GitHub Profile
@pjstorm
pjstorm / fb.js
Last active August 29, 2015 14:15
var a='';
for(var i=0;i<50000;i++){a+='=';}
var wait = setTimeout(function(){
alert('Logged in fb')
},15000)
var cb=function(){
clearTimeout(wait);
alert('Not logged in fb');
@pjstorm
pjstorm / fb.js
Last active August 29, 2015 14:15
var a='';
for(var i=0;i<50000;i++){a+='=';}
var wait = setTimeout(function(){
alert('Logged in fb')
},15000)
var cb=function(){
clearTimeout(wait);
alert('Not logged in fb');
Superfish uses an SDK from Komodia to do SSL MITM. That's probably known by now.
Superfish isn't the only product to use that sdk. there's others too.
Each product that uses the Komodia SDK to MITM, has its OWN CA cert and private
key pair. Seems a lot of people think they all use the superfish cert. That is
NOT the case.
First thing I checked was komodia's own parental control software,
Keep My Family Secure. (mentioned on komodia's own website).
<meta name="description" content="Easily calculate SHA-512 algorithms" />
<script type="text/javascript" src="assets/js/sha512.js">
</script>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<script type="text/javascript">
//<![CDATA[
function calcSHA()
{
calcHash("SHA-512");
#!/usr/bin/env bash
# check_freak.sh
# (c) 2015 Martin Seener
# Simple script which checks SSL/TLS services for the FREAK vulnerability (CVE 2015-0204)
# It will output if the checked host is vulnerable and returns the right exit code
# so it can also be used as a nagios check!
PROGNAME=$(basename $0)
@pjstorm
pjstorm / check_freak.sh
Last active August 29, 2015 14:16 — forked from martinseener/check_freak.sh
FREAKtest
#!/usr/bin/env bash
# check_freak.sh
# (c) 2015 Martin Seener
# Simple script which checks SSL/TLS services for the FREAK vulnerability (CVE 2015-0204)
# It will output if the checked host is vulnerable and returns the right exit code
# so it can also be used as a nagios check!
PROGNAME=$(basename $0)
package main
import (
"bufio"
"fmt"
"io"
"net"
"strings"
)