| #!/usr/bin/env python3 | |
| import usb.core | |
| import struct | |
| from collections import namedtuple | |
| APPLE_VID = 0x05ac | |
| Target = namedtuple("Target", ["vid", "pid", "name", "model", "total_size"]) |
| #include <stdio.h> | |
| #include <stdint.h> | |
| // Philips Sonicare NFC Head Password calculation by @atc1441 Video manual: https://www.youtube.com/watch?v=EPytrn8i8sc | |
| uint16_t CRC16(uint16_t crc, uint8_t *buffer, int len) // Default CRC16 Algo | |
| { | |
| while(len--) | |
| { | |
| crc ^= *buffer++ << 8; | |
| int bits = 0; | |
| do |
| #!/bin/bash | |
| RAW_STATUS=$(python3 ~/src/starlink-grpc-tools/dish_grpc_text.py -s 2 status) | |
| STARLINK_CONNECTED=$(echo "$RAW_STATUS" | cut -f 5 -d',') | |
| if [[ "${STARLINK_CONNECTED}" == "CONNECTED" ]]; then | |
| STARLINK_CONNECTED='${color green}'"CONNECTED"'${color}' | |
| elif [[ "${STARLINK_CONNECTED}" == "OFFLINE" ]]; then | |
| STARLINK_CONNECTED='${color red}'"OFFLINE"'${color}' | |
| else | |
| STARLINK_CONNECTED='${color yellow}'"${STARLINK_CONNECTED}"'${color}' |
| title: Suspicious msdt.exe execution - Office Exploit | |
| id: 97a80ed7-1f3f-4d05-9ef4-65760e634f6b | |
| status: experimental | |
| description: This rule will monitor suspicious arguments passed to the msdt.exe process. These arguments are an indicator of recent Office/Msdt exploitation. | |
| references: | |
| - https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e | |
| - https://twitter.com/MalwareJake/status/1531019243411623939 | |
| author: 'Matthew Brennan' | |
| tags: | |
| - attack.execution |
| # Edit and rename this file and then place it in /etc/wyzecam-to-rtmp | |
| WYZE_EMAIL="joeblow@example.com" | |
| WYZE_PASSWORD="wyzepasshere" | |
| WYZE_CAMERA_NAME="Doorbell" | |
| RTMP_URL="rtmp://127.0.0.1/live/doorbell" |