Skip to content

Instantly share code, notes, and snippets.

View vijayanandrp's full-sized avatar
👑

Vijay Anand Pandian vijayanandrp

👑
View GitHub Profile
@vijayanandrp
vijayanandrp / pings_list.txt
Created July 22, 2017 05:44
[SEO] Blog Visiblity
http://1470.net/api/ping
http://api.feedster.com/ping
http://api.moreover.com/ping
http://api.moreover.com/rpc2
http://api.my.yahoo.com/rpc2
http://api.my.yahoo.com/rss/ping
http://bblog.com/ping.php
http://bitacoras.net/ping
http://blo.gs/ping.php
http://blog.goo.ne.jp/xmlrpc
@vijayanandrp
vijayanandrp / Installation Setup Windows.txt
Last active July 27, 2017 12:45
Node.js Installation
npm install npm --global
npm install html-to-text -g
@vijayanandrp
vijayanandrp / Wikipedia Scraper using Scrapy.py
Last active March 16, 2024 14:55
Wikipedia Scraper using Scrapy
# -*- coding: utf-8 -*-
import scrapy
import re
import unicodedata
from scrapy.crawler import CrawlerProcess
from urllib.parse import urlparse
class WikiSpider(scrapy.Spider):
name = 'wiki_company'
@vijayanandrp
vijayanandrp / How to do simple automation project using Python atomac in Mac OS X.py
Created June 15, 2017 23:07
How to do simple automation project using Python atomac in Mac OS X?
__author__ = 'vijay'
import os
import atomac
from atomac.AXKeyCodeConstants import *
import time
import commands
from atomac import AXKeyCodeConstants
@vijayanandrp
vijayanandrp / How to do Python Speech recognition project like Jarvis in Mac OS X.py
Created June 15, 2017 23:04
How to do Python Speech recognition project like Jarvis in Mac OS X?
"""Library for performing speech recognition with the Google Speech Recognition API."""
"""Library for performing speech recognition with the Google Speech Recognition API."""
__author__ = 'Anthony Zhang (Uberi)'
__version__ = '1.1.2'
__license__ = 'BSD'
import io, os, subprocess, wave
import math, audioop, collections
import json, platform, time
@vijayanandrp
vijayanandrp / Write up for InCTF 2014 - Stegnography 400 solved using python .py
Created June 15, 2017 22:53
Write up for InCTF 2014 - Stegnography 400 solved using python
import os,sys
import Image
modi_bin = Image.open("modi.png").convert('RGB')
bin = ''
R = open('r.txt','w')
G = open('g.txt','w')
B = open('b.txt','w')
@vijayanandrp
vijayanandrp / Write up for InCTF 2014 - Crypto 300 - Solved RSA-704 bit using known factors .sh
Created June 15, 2017 22:46
Write up for InCTF 2014 - Crypto 300 - Solved RSA-704 bit using known factors
root@Vijay:# cat c4.der
asn1=SEQUENCE:rsa_key
[rsa_key]
version=INTEGER:0
modulus=INTEGER:74037563479561712828046796097429573142593188889231289084936232638972765034028266276891996419625117843995894330502127585370118968098286733173273108930900552505116877063299072396380786710086096962537934650563796359
pubExp=INTEGER:65537
privExp=INTEGER:33307131606083860709359654688809620595435784183304180784765475180353602262817269247014766169336517530471801339770560112997370264392886185538231911908428012730752492181217073681726139624557304859252988692991966953
p=INTEGER:9091213529597818878440658302600437485892608310328358720428512168960411528640933367824950788367956756806141
@vijayanandrp
vijayanandrp / Write up for InCTF 2014 - Crypto 300 - Solved RSA-704 bit using known factors .txt
Created June 15, 2017 22:45
Write up for InCTF 2014 - Crypto 300 - Solved RSA-704 bit using known factors
I have just pasted it to save my time.
One way to do this is to generate a DER encoded key using
OpenSSL's asn1parse command's -genconf option.
You'll need to construct an input file for
asn1parse -genconf to produce an RSA key in the standard format (per RFC 3447).
The syntax for asn1parse -genconf is given here:
http://www.openssl.org/docs/crypto/ASN1_generate_nconf.html and indeed,
@vijayanandrp
vijayanandrp / Creating a public key using openssl.sh
Created June 15, 2017 22:43
Creating a public key using openssl
root@Vijay:# openssl rsa -inform PEM -text -pubin -in publickey.pem -modulus
Public-Key: (704 bit)
Modulus:
00:e1:34:18:93:fe:6e:68:16:ce:c8:a9:70:a3:9c:
00:fa:54:7c:7d:a2:cd:ed:ab:0a:62:b9:1c:46:51:
a8:3f:96:38:0b:cf:ae:e2:6f:7e:86:61:07:90:63:
89:42:1b:1e:68:d0:a1:7a:ad:c9:87:0b:98:58:e9:
56:28:6e:39:99:e9:8c:ec:98:81:53:4a:c7:72:ae:
@vijayanandrp
vijayanandrp / Write up for InCTF 2014 - Crypto 200 - Solved RSA 4096 bit using low public exponent attack.txt
Created June 15, 2017 22:38
Write up for InCTF 2014 - Crypto 200 - Solved RSA 4096 bit using low public exponent attack
11657667992152384389168970007935564620544078223989911116124095315088239681126594015781938080477630692915497593321366093615015306163688656393156198882654127506116466608834490674480387607410167266362059980939450825093071957288196553216860521023077321644076523737128658172831409622651074862
Never use a small public exponent in RSA keys. The recommended exponent is 65537. The key for this level is weakrsakey.
"""
ciphertext = pow(plaintext, 3) % modulus
# 'ciphertext' is the remainder, so all we need to know to take the cubic root is the quotient 'k'