Skip to content

Instantly share code, notes, and snippets.

View tykkz's full-sized avatar

Salim S. tykkz

  • Right behind you. Always watching.
View GitHub Profile
@BigSully
BigSully / start mitmproxy in background programmatically
Last active March 30, 2024 21:33
start mitmproxy in background programmatically
from mitmproxy.options import Options
from mitmproxy.proxy.config import ProxyConfig
from mitmproxy.proxy.server import ProxyServer
from mitmproxy.tools.dump import DumpMaster
import threading
import asyncio
import time
class Addon(object):
<?php
//php gd-gif.php image.gif gd-image.gif
$gif = imagecreatefromgif($argv[1]);
imagegif($gif, $argv[2]);
imagedestroy($gif);
?>
@martip07
martip07 / ffmpeg_check.py
Last active February 8, 2021 23:10
monit-proc
def check_regexVolume(out_value):
for volume_i in out_value:
if "mean_volume" in volume_i:
print(volume_i)
return volume_i
def ffmpeg_checkaudio(station, audio_uri):
cmd = ["ffmpeg", "-t", "10", "-i", audio_uri, "-af", "'volumedetect'", "-f", 'null', "\/dev\/null"]
@akhil-reni
akhil-reni / main.py
Created July 14, 2018 05:48
MITM Proxy Dump Master
# -*- coding: utf-8 -*-
from mitmproxy.options import Options
from mitmproxy.proxy.config import ProxyConfig
from mitmproxy.proxy.server import ProxyServer
from mitmproxy.tools.dump import DumpMaster
class Addon(object):
def request(self, flow):
@herrfeder
herrfeder / dect_hacking.md
Last active December 24, 2024 13:25
Notes for DECT hacking

Theoretical on DECT

General Terms

  • Range: 1.88 - 1.9 GHz

  • Channel Spacing: 1.728 MHz

  • Number Carriers: 10

  • Speech codec: ADPCM with 32kbps speech rate

  • DMAP DECT Multimedia Access Profile

  • DPRS DECT Packet Radio Service

@Arinerron
Arinerron / root.sh
Last active June 10, 2024 17:35
"Root" via dirtyc0w privilege escalation exploit (automation script) / Android (32 bit)
#!/bin/bash
# Give the usual warning.
clear;
echo "[INFO] Automated Android root script started.\n\n[WARN] Exploit requires sdk module \"NDK\".\nFor more information, visit the installation guide @ https://goo.gl/E2nmLF\n[INFO] Press Ctrl+C to stop the script if you need to install the NDK module. Waiting 10 seconds...";
sleep 10;
clear;
# Download and extract exploit files.
echo "[INFO] Downloading exploit files from GitHub...";
@avimar
avimar / pcap2wav
Last active March 1, 2023 22:32
Convert raw PCAP files into a .wav file
#!/bin/bash
#
# pcap2wav
# Original Author: Michael Collins <[email protected]>
#Standard disclaimer: batteries not included, your mileage may vary...
# Updated by Avi Marcus <[email protected]>
#
# Accepts arg of pcap file w/only 2 RTP streams
# Creates a .<codec> file and a .wav file
# For codecs other than PCMA and PCMU the script calls fs_cli and does a little recording to create the wav file(s)
@anthonyeden
anthonyeden / icecast_config_sample.xml
Created August 9, 2016 02:04
Icecast Geoblocking Example
<mount>
<mount-name>/mountname</mount-name>
<password>hackme</password>
<!-- Geo-blocking can be added to any mount, but not relays -->
<authentication type="url">
<option name="listener_add" value="http://example.com/icecast_geoblock.php?mount=mountmame" />
<option name="auth_header" value="icecast-auth-user: 1" />
</authentication>
</mount>

Simple Security Guidelines

Using an iDevice? (Best option)

  • Use an iPod or an iPad without a SIM card
  • Use an iPhone
  • Do not jailbreak
  • Always upgrade to new iOS versions
  • Use Brave browser

Need Secure chat?

Intercepts HTTPs Traffic with Python & mitmproxy

Introduction

Modern applications usually make use of back-end API servers to provide their services. With a non-transparent HTTPs proxy, which intercepts the communication between clients and servers (aka the man-in-the-middle scheme), you can easily manipulate both API requests and responses.

This manual helps you create your own proxy with Python and mitmproxy/libmproxy. Mitmproxy ships with both a standalone command-line tool (mitmproxy) and a Python library (libmproxy).