Skip to content

Instantly share code, notes, and snippets.

View e3prom's full-sized avatar

Nicolas Chabbey e3prom

View GitHub Profile
@c-bata
c-bata / bpf.c
Last active September 10, 2023 11:08
Capture packets from bpf devices on macOS.
#include <stdlib.h>
#include <stdio.h>
#include <fcntl.h>
#include <sys/uio.h>
#include <unistd.h>
#include <string.h>
#include <sys/errno.h>
#include <sys/types.h>
#include <sys/ioctl.h>
#include <net/bpf.h>
@jhaddix
jhaddix / content_discovery_all.txt
Created May 26, 2018 11:51
a masterlist of content discovery URLs and files (used most commonly with gobuster)
This file has been truncated, but you can view the full file.
`
~/
~
ים
___
__
_
@jasonadsit
jasonadsit / fix-kali-vnc.sh
Last active March 5, 2019 16:53
Enable VNC Server on Kali Remotely
#!/bin/sh
systemctl disable xrdp.service
mkdir /root/.config/autostart
touch /root/.config/autostart/vino-server.desktop
echo "[Desktop Entry]" >> /root/.config/autostart/vino-server.desktop
echo "Type=Application" >> /root/.config/autostart/vino-server.desktop
echo "Name=Vino VNC server" >> /root/.config/autostart/vino-server.desktop
echo "Exec=/usr/lib/vino/vino-server" >> /root/.config/autostart/vino-server.desktop
echo "NoDisplay=true" >> /root/.config/autostart/vino-server.desktop
dbus-launch gsettings set org.gnome.Vino require-encryption false
@mgeeky
mgeeky / ascii-shellcode-encoder.py
Last active September 12, 2024 06:52
ASCII Shellcode encoder for Exploit Development purposes, utilizing Jon Erickson's substract arguments finding algorithm.
#!/usr/bin/python
#
# Shellcode to ASCII encoder leveraging rebuilding on-the-stack technique,
# and using Jon Erickson's algorithm from Phiral Research Labs `Dissembler`
# utility (as described in: Hacking - The Art of Exploitation).
#
# Basically one gives to the program's output a binary encoded shellcode,
# and it yields on the output it's ASCII encoded form.
#
# This payload will at the beginning align the stack by firstly moving