Skip to content

Instantly share code, notes, and snippets.

View ss23's full-sized avatar

☃ Stephen Shkardoon ☃ ss23

View GitHub Profile
#!/usr/bin/env nix-shell
#! nix-shell --pure -I nixpkgs=https://github.com/NixOS/nixpkgs/archive/c23193b943c6c689d70ee98ce3128239ed9e32d1.tar.gz -i python3 -p python3 -p python3Packages.requests -p php
import requests
import subprocess
import random
import sys
want = subprocess.check_output(["php", "-r", "echo gzdeflate(serialize(['user'=>'admin']));"])
for i in range(32000, 33000):
void *oldbuf = view->buf;
view->buf = realloc(oldbuf, 1000);
if (view->buf == NULL) {
if (oldbuf != NULL)
free(oldbuf);
ss23@well ~/sourcecode/rtorrent/libtorrent $ make
make all-recursive
make[1]: Entering directory '/home/ss23/sourcecode/rtorrent/libtorrent'
Making all in src
make[2]: Entering directory '/home/ss23/sourcecode/rtorrent/libtorrent/src'
cd .. && /bin/sh /home/ss23/sourcecode/rtorrent/libtorrent/missing automake-1.16 --foreign src/Makefile
cd .. && /bin/sh ./config.status src/Makefile depfiles
config.status: creating src/Makefile
config.status: executing depfiles commands
Making all in torrent
@ss23
ss23 / foo.md
Created January 25, 2023 02:20
@ss23
ss23 / gist:4f279c6a9b49766bea5ca22b0f310df3
Created May 13, 2022 10:19
teamviewer reverse optionspasswordhash info

Teamviewer Reversing

Options password: password

OptionsPasswordHash (from the registry directly)

01 03 01 40 00 00 00 87 93 78 ea 5c 91 7f ca 91 72 da 36 77 25 1c 60 19 a2 d2 8e a7 f3 e1 b9 a6 8d 1a 2c 6b 93 c0 03 f6 f0 23 d8 e5 9d b0 02 d9 ea f1 c6 43 00 2a bb eb 8c 94 6a 5f f1 f8 27 0a c3 f6 38 7b 30 32 6b 02 10 00 00 00 67 e6 ce 29 d9 51 ff c9 f4 bc f2 98 4f 61 a2 fc 03 04 00 00 00 10 27 00 00

First hash

0x40 length (64 bytes)

Hash: 879378ea5c917fca9172da3677251c6019a2d28ea7f3e1b9a68d1a2c6b93c003f6f023d8e59db002d9eaf1c643002abbeb8c946a5ff1f8270ac3f6387b30326b

<?php
$file = $_GET['file'] ?? '/tmp/file';
$data = $_GET['data'] ?? ':)';
file_put_contents($file, $data);
echo file_get_contents($file);
import socket
import time
import urllib.parse
import requests
HOST = '0.0.0.0' # Standard loopback interface address (localhost)
PORT = 65432
def serve_request(conn):
# Lets just wait until we can assume all the data was sent
<?php
$file = $_GET['file'] ?? '/tmp/file';
$data = $_GET['data'] ?? ':)';
file_put_contents($file, $data);
echo file_get_contents($file);
import requests
from urllib3.exceptions import InsecureRequestWarning
import random
import string
import sys
def id_generator(size=6, chars=string.ascii_lowercase + string.digits):
return ''.join(random.choice(chars) for _ in range(size))
$ sudo /opt/hashcat/latest/hashcat.bin --benchmark
hashcat (v6.1.1) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
CUDA API (CUDA 11.0)
====================