I hereby claim:
- I am d4stiny on github.
- I am billdemirkapi (https://keybase.io/billdemirkapi) on keybase.
- I have a public key ASAaxyVyjWbAPJHsCoR1QSRqpR3MiLasx056OGP9LcNnpAo
To claim this, I am signing this object:
""" | |
COPYRIGHT Bill Demirkapi 2025 | |
Small utility I wrote with some help from Gemini Pro 2.5 to decrypt/encrypt BMC config backups from my ASUS ASMB11-iKVM AST2600 BMC. | |
Fed the model a bunch of decompiled code from BMC firmware libaries like libaes and libBackupConf. | |
Probably works with other Megarac-based BMCs too. | |
Expects an AESKey and AESIV file in script directory. This varies by OEM, often requires unpacking firmware/flash image. | |
For my ASUS BMC, however, the Key/IV for config are just NULL keys. AESKey file content is "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=", AESIV's is "AAAAAAAAAAAAAAAAAAAAAA==". | |
""" |
#!/usr/bin/env python3 | |
""" | |
plar_extract.py – Extract files from Geekbench *.plar* archives (Geekbench 6+) | |
========================================================================== | |
** Based on this 4 year old script: https://gist.github.com/HarukaMa/0772fc47311f6bbcb79ce3f84a7134d7 | |
Usage | |
----- | |
python plar_extract.py <archive.plar> [output_dir] |
5ed0490eab435cd36c9d78a37dade38fe22862ad537aea1ffe66913d96058965 | |
513fd6c864717f1abd78e72704597c730280d55c312423c5661ca544a41643eb | |
2c4785278cc50d8b683a5d2e28ebdf29c386bbbda284fc162917fb6688031341 |
f5229314179a5ff063b5ae32c9bd6bc14e831cc68089b2991ced784981483ac2 |
38fda53c4d91a2279a300e030f87bd9783d3640ba090bc3a74d049c2e3c5ae2b |
e5285d895cc1200237f9676985df471f4eba9d13f59541b8df774238a188382bc2c7ce6a75d7346f5b0fe940e2ca196b78edde78912e5bd3a4f0e88e8906c7c1 |
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta http-equiv="Expires" content="-1"> | |
<meta http-equiv="X-UA-Compatible" content="IE=11"> | |
</head> | |
<body> | |
<script> | |
var exploit_cab = "[CAB file URL]"; |
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta http-equiv="Expires" content="-1"> | |
<meta http-equiv="X-UA-Compatible" content="IE=11"> | |
</head> | |
<body> | |
<script> | |
var exploit_cab = "[CAB file URL]"; |
DDF218CF99DBF0F21A0C5480331BA07DF4FDB1A6E44E9622B30F0A5B650B9F0E |
I hereby claim:
To claim this, I am signing this object: