Skip to content

Instantly share code, notes, and snippets.

using System;
using System.IO;
using System.Security.Cryptography;
using System.Runtime.Serialization.Formatters.Binary;
namespace hawktracewsus
{
class Program
{
static void Main()
@hdub-tech
hdub-tech / git-ing-started.md
Last active August 2, 2025 19:45
Git/Github cheatsheet

Git'ing started with git and Github

This is just a BASIC cheatsheet for a PR based workflow using git and GitHub, geared towards new users of git and GitHub. If you are a new user, I HIGHLY recommend you skip to the end and review the Recommended Resources, which includes a sample GitHub repo you can clone and which will guide you through using GitHub.

@garrettfoster13
garrettfoster13 / dpapi.py
Last active September 27, 2025 13:01
Manually decrypt dpapi blobs
import sys
import argparse
from impacket.dpapi import MasterKeyFile, MasterKey, DPAPI_BLOB
from impacket.uuid import bin_to_string
from binascii import unhexlify, hexlify
def decrypt_masterkey(mk_blob, dpapikey):
"""Decrypt masterkey blob with dpapikey pulled from secretsdump"""
try:
@MEhrn00
MEhrn00 / CMakeLists.txt
Created March 6, 2025 23:40
Building Stardust with CMake
cmake_minimum_required(VERSION 3.24)
project(Stardust
LANGUAGES CXX
)
# Build option for generating the final shellcode.bin file
option(STARDUST_BUILD_SHELLCODE "Build the final shellcode.bin file" OFF)
# Add nasm for the Stardust.asm source if building shellcode
if(${STARDUST_BUILD_SHELLCODE})
@hackermondev
hackermondev / research.md
Last active March 18, 2026 08:31
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform

hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.

3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.

I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:

Cloudflare

By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k

@zenfosec
zenfosec / disable_firefox_autoconenctions.md
Last active December 5, 2024 03:02
Disable Automated Connections from Firefox

Disable Telemetry and Data Collection

  1. Access Firefox Configuration:

    • Open Firefox and type about:config in the address bar, then press Enter.
    • Accept the warning message by clicking on "Accept the Risk and Continue."
  2. Modify Preferences:

    • Search for each of the following preferences and set them to the specified values:

| Preference | Value |

import random
import argparse
import tempfile
import ipaddress
from time import sleep
from shlex import split
from os import path, remove
from scapy.all import sniff
from threading import Thread
from subprocess import Popen, PIPE
@stong
stong / cups-browsed.md
Last active November 17, 2025 00:24
CUPS disclosure leaked online. Not my report. The original author is @evilsocket

Original report

  • Affected Vendor: OpenPrinting
  • Affected Product: Several components of the CUPS printing system: cups-browsed, libppd, libcupsfilters and cups-filters.
  • Affected Version: All versions <= 2.0.1 (latest release) and master.
  • Significant ICS/OT impact? no
  • Reporter: Simone Margaritelli [evilsocket@gmail.com]
  • Vendor contacted? yes The vendor has been notified trough Github Advisories and all bugs have been confirmed:
javascript:(function(){var scripts=document.getElementsByTagName("script"),regex=/(?<=(\"|\%27|\`))\/[a-zA-Z0-9_?&=\/\-\#\.]*(?=(\"|\'|\%60))/g,jsRegex=/(?<=(\"|\'|\%60))(?:\/|https?:\/\/)[a-zA-Z0-9_?&=\/\-\#\.]+\.js(?:\?[^"'%60]*)?(?=(\"|\'|\%60))/g;const results=new Set;const paramMap=new Map();const jsFiles=new Set();function processContent(t,src){var e=t.matchAll(regex);for(let r of e){results.add(r[0]);var params=r[0].split('?')[1];if(params){params.split('&').forEach(param=>{var [key,]=param.split('=');if(key){if(!paramMap.has(key)){paramMap.set(key,[]);}paramMap.get(key).push(src||'Inline script or HTML');}});}}var j=t.matchAll(jsRegex);for(let r of j){jsFiles.add(r[0]);}}for(var i=0;i<scripts.length;i++){var t=scripts[i].src;if(t){jsFiles.add(t);fetch(t).then(function(t){return t.text()}).then(text=>processContent(text,t)).catch(function(t){console.log("An error occurred: ",t)});}else{processContent(scripts[i].textContent);}}var pageContent=document.documentElement.outerHTML;processContent(pageContent
@testanull
testanull / SharePwn_public.py
Created December 15, 2023 07:31
SharePoint Pre-Auth Code Injection RCE chain CVE-2023-29357 & CVE-2023-24955 PoC
# -*- coding: utf-8 -*-
import hashlib
import base64
import requests, string, struct, uuid, random, re
import sys
from collections import OrderedDict
from sys import version
from urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
# too lazy to deal with string <-> bytes confusion in python3 so forget it ¯\_(ツ)_/¯