Skip to content

Instantly share code, notes, and snippets.

View maxdavid's full-sized avatar

Max David maxdavid

View GitHub Profile

Stealing WiFi

/etc/hosts

This will let you access any google owned site. This includes: youtube, google cache, google translate, google search, gmail, google news, etc.

  • Install the HTTPS Everywhere extension
  • Add these rules to your /etc/hosts file
@epixoip
epixoip / cloudflare_challenge
Last active December 2, 2023 11:53
How I obtained the private key for www.cloudflarechallenge.com
I wasn't first to get the key. Nor was I second, third, or even fourth. I'm probably not even the
10th to get it (ok, looks like I was the 8th.) But I'm happy that I was able to prove to myself
that I too could do it.
First, I have to admit I was a skeptic. Like the handful of other dissenters, I had initially
believed that it would be highly improbable under normal conditions to obtain the private key
through exploiting Heartbleed. So this was my motivation for participating in Cloudflare's
challenge. I had extracted a lot of other things with Heartbleed, but I hadn't actually set out to
extract private keys. So I wanted to see first-hand if it was possible or not.
@numberten
numberten / gist.pl
Created October 17, 2013 06:16
A compact perl script for gisting files from the command line.
#!/usr/bin/perl
use Getopt::Long;
#Parse flags using Getopt::Long.
my $desc = '';
my $public = 0;
my $user = '';
my $verbose = 0;
GetOptions ('desc:s' => \$desc,
'public' => \$public,
@maxdavid
maxdavid / xkcd-hasher.py
Last active December 15, 2015 17:20
A quick and sloppy attempt to win http://almamater.xkcd.com/ for evergreen.edu
#!/usr/bin/env python3
# xkcd-hasher.py
# for the motherland!! http://almamater.xkcd.com/
# forked from arthurdent's 1193.py. thx buddy
#
# usage: ./xkcd-hasher.py <num hashes> <randword length> <goal number>
from skein import skein1024
from datetime import *