Skip to content

Instantly share code, notes, and snippets.

View junquera's full-sized avatar
🐈‍⬛

Javier Junquera Sánchez junquera

🐈‍⬛
View GitHub Profile
@GhazanfarMir
GhazanfarMir / Instructions.sh
Last active December 22, 2024 01:12
Install PHP7.2 NGINX and PHP7.2-FPM on Ubuntu 16.04
########## Install NGINX ##############
# Install software-properties-common package to give us add-apt-repository package
sudo apt-get install -y software-properties-common
# Install latest nginx version from community maintained ppa
sudo add-apt-repository ppa:nginx/stable
# Update packages after adding ppa
@lucasg
lucasg / download_pdb_database.py
Created January 16, 2018 10:21
Download pdb and PE files from microsoft symbol store
import os
import re
import sys
import logging
import argparse
import subprocess
import requests
@mgeeky
mgeeky / word2017-0199.py
Created June 28, 2017 15:09
Microsoft Word (CVE-2017-0199) RCE through a HTA Handler, by Juan Sacco / <[email protected]>
# Exploit Author: Juan Sacco at KPN Red Team
# Developed using Exploit Pack - http://www.exploitpack.com <[email protected]>
#
# Description: Microsoft Word (CVE-2017-0199) is prone to a RCE trough a HTA Handler
# A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files.
# An attacker who successfully exploited this vulnerability could take control of an affected system.
#
# Impact: An attacker could exploit this vulnerability to execute arbitrary commands in the
# context of the application. Failed exploit attempts could result in a
# denial-of-service condition.
@suriyadeepan
suriyadeepan / scrape_hashtags.py
Created September 13, 2016 08:07
Selenium based Twitter Scrapper
from bs4 import BeautifulSoup
import requests
import time
import sys
import os
from selenium import webdriver
from selenium.webdriver.common.keys import Keys
@uwekamper
uwekamper / cowtest.sh
Last active May 29, 2018 07:29
Test all the cowsay characters
#!/bin/sh
for i in `cowsay -l | tail -n +2`
do
echo $i
cowsay -f $i "Ich bin die Kuh"
sleep 3
done
@atoponce
atoponce / gist:07d8d4c833873be2f68c34f9afc5a78a
Last active April 25, 2025 13:56 — forked from tqbf/gist:be58d2d39690c3b366ad
Cryptographic Best Practices

Cryptographic Best Practices

Putting cryptographic primitives together is a lot like putting a jigsaw puzzle together, where all the pieces are cut exactly the same way, but there is only one correct solution. Thankfully, there are some projects out there that are working hard to make sure developers are getting it right.

The following advice comes from years of research from leading security researchers, developers, and cryptographers. This Gist was [forked from Thomas Ptacek's Gist][1] to be more readable. Additions have been added from

@mauriciopoppe
mauriciopoppe / _README.md
Last active March 30, 2024 09:52
Generic Makefile example for a C++ project
@erral
erral / publish an atom package
Last active March 24, 2016 16:45
Publish an atom package
Commit your changes.
Inspect your package.json file to check your current version number, and decide (if your package.json shows version 2.1.0):
- Register your package on atom.io
> apm login
1- You want to make a patch version release
@DonnchaC
DonnchaC / fetch-hs-descriptor.py
Created December 17, 2015 15:49
A simple script which demonstrates how to retrieve hidden service descriptors via the HSFETCH Tor control port command
import sys
import argparse
import stem
from stem.control import Controller
def main():
parser = argparse.ArgumentParser(description="%s fetches a Tor hidden "
"service descriptor." % sys.argv[0])
@DonnchaC
DonnchaC / onion-address-calculate.py
Created August 25, 2015 14:24
Simple script to calculate the onion address from a Tor hidden service descriptor or public key
import hashlib
import base64
import argparse
import sys
from Crypto.PublicKey import RSA
def calculate_onion(pem_key):
key = RSA.importKey(pem_key)