I hereby claim:
- I am tunnelshade on github.
- I am tunnelshade (https://keybase.io/tunnelshade) on keybase.
- I have a public key whose fingerprint is 268A 4492 21BE DE47 C088 90D5 D9D9 360F 091F AB46
To claim this, I am signing this object:
| # On a linux box, inside the home of a privileged user were some files. | |
| # | |
| # - run_exploit_server (had setuid bit set, executable by all and was compiled with PIC flag). | |
| # - run_exploit_server.c | |
| # - shellcode.bin with permissions (644). | |
| # | |
| # The task was to escalate privileges somehow using these three things | |
| # | |
| # * The server reads from a relative file i.e ./shellcode.bin and echos it to | |
| # the clients connecting to it. |
| # Simple script to have fun with PNG+HTML polyglot | |
| # WARNING: This script is not optimised and just written for fun | |
| # | |
| # Author : Bharadwaj Machiraju | |
| # | |
| # Requirements: Pillow | |
| # | |
| # http://blog.tunnelshade.in/2015/06/stegosploit-fun.html | |
| import re |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| # | |
| # gencert.py | |
| # | |
| # Copyright 2013 tunnelshade <blog.tunnelshade.in> | |
| # | |
| # * openssl genrsa -des3 -out ca.key 1024 | |
| # | |
| # * openssl req -new -x509 -days 3650 -key ca.key -out ca.crt |