Skip to content

Instantly share code, notes, and snippets.

View stillbigjosh's full-sized avatar
💭
Having a blast!

stillbigjosh stillbigjosh

💭
Having a blast!
View GitHub Profile
@stillbigjosh
stillbigjosh / make_oneliner.py
Created October 15, 2025 16:46 — forked from ropnop/make_oneliner.py
Python script to convert a file to a oneliner exec command
#!/usr/bin/env python2
# Author: @ropnop (Ronnie Flathers)
# Simple script to ingest a Python file (e.g. a shell) and return a oneliner command
# Useful with command injection vulns
# Based entirely off of Metasploit's "reverse_python.rb" payload
# Credit to Brendan Coles <bcoles[at]gmail.com>
#
# Example:
# $ python make_oneliner.py pty_shell.py
@stillbigjosh
stillbigjosh / cups-browsed.md
Created September 26, 2024 21:03 — forked from stong/cups-browsed.md
CUPS disclosure leaked online. Not my report. The original author is @evilsocket

Original report

  • Affected Vendor: OpenPrinting
  • Affected Product: Several components of the CUPS printing system: cups-browsed, libppd, libcupsfilters and cups-filters.
  • Affected Version: All versions <= 2.0.1 (latest release) and master.
  • Significant ICS/OT impact? no
  • Reporter: Simone Margaritelli [[email protected]]
  • Vendor contacted? yes The vendor has been notified trough Github Advisories and all bugs have been confirmed:
<?php
//Email sender spoofing
//For spearphshing purposes
//With tracking pixels enabled
$message = "Hello,";
$message .= "<html><p>first paragraph.</p></html>";
$message .= "<html><p>second paragraph.</p></html>";
#pip3 install dnspython3
import dns.resolver
import sys
import re
file = open(sys.argv[1],'r')
log = open('mxlog.txt', 'w')
for line in file.readlines():
domain = re.search('@((\w|\w[\w\-]*?\w)\.\w+)', line).group(1)

Keybase proof

I hereby claim:

  • I am 0xskywalker on github.
  • I am 0xskywalker (https://keybase.io/0xskywalker) on keybase.
  • I have a public key whose fingerprint is 3CAF A001 6ADF 2143 338D 20BE 207D D968 1912 BA98

To claim this, I am signing this object:

#modifications of https://stackoverflow.com/questions/45478536/python-getting-common-name-from-url-using-ssl-getpeercert
import socket
import ssl
import sys
import OpenSSL.crypto as crypto
file = open(sys.argv[1], "r")
log = open("cnlog.txt", "w")
@stillbigjosh
stillbigjosh / pulseversion.py
Last active January 9, 2020 19:04 — forked from rxwx/pulseversion.py
Pulse Secure Version Scanner
import requests
import sys
import re
import tqdm
import os
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
HEADERS = {"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) Gecko/20100101 Firefox/67.0"}
import tweepy
class ScrapeTweets():
def __init__(self, apikey, apisec, tokn, toknsec):
self.apikey = apikey
self.apisec = apisec
self.tokn = tokn
self.toknsec = toknsec
model = OneClassSVM(kernel='rbf')
model.fit(X_train)
#model.fit(X_test)
y_train = model.predict(X_train)
y_test = model.predict(X_test)
y_ndata = model.predict(X_data)
#number of anomalies
train = y_train[y_train == 1].size
test = y_test[y_train == 1].size
#load dataset
data = "tweets.csv"
read_data = pd.read_csv(data)
read_tweets = read_data['text'].values
#remove bad chars
def cleantext(text):
#return ' '.join(re.sub("(@[A-Za-z0-9]+)|([^0-9A-Za-z \t])|(\w+:\/\/\S+)", " ", text).split())
return ' '.join(re.sub(r"(@[A-Za-z0-9]+)|([^0-9A-Za-z \t])|(\w+:\/\/\S+)|^RT|http.+?", "", text).split())