Skip to content

Instantly share code, notes, and snippets.

View michele-tn's full-sized avatar
🎯
Focusing

michele-tn

🎯
Focusing
View GitHub Profile

πŸš€ v2rayN + Shadowsocks + TUN (Sing-box) β€” Windows Setup Guide

Platform Core Mode Protocol

Full system VPN-style tunneling using v2rayN, Shadowsocks, and Sing-box TUN mode.

XZ9-COMPRESSOR

XZ9-COMPRESSOR is a Bash utility designed for maximum compression and cryptographic integrity verification using XZ and SHA-256.


Features

  • Ultra compression using xz -9e
  • Keeps original file intact

IONOS VPS DNS Hardening Script v3

This project provides a hardened Bash script to enforce persistent, secure DNS configuration on Ubuntu VPS systems hosted on IONOS.

Key improvement vs v2: DHCP is still used for IP/gateway, but DHCP-provided DNS (IONOS 212.227.x.x) is ignored β€” see technical discussion.


Features

@michele-tn
michele-tn / Sublist3r Installation.md
Last active November 23, 2025 11:37
Sublist3r is a Python tool designed to enumerate subdomains of websites using OSINT.

Sublist3r Installation and Usage Guide (Ubuntu 22.04.5 LTS)

Sublist3r is a Python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask. Sublist3r also enumerates subdomains using Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and ReverseDNS.

subbrute was integrated with Sublist3r to increase the possibility of finding more subdomains using bruteforce with an improved wordlist. The credit goes to TheRook who is the author of the subbrute.

image

This document explains how to install, run, and clean up Sublist3r when it is installed directly from the official GitHub repository.

RustDesk Portable Auto Downloader & Configurator (Windows x64)

This repository provides a PowerShell script that automatically downloads, configures, and launches the RustDesk Windows x64 portable client, using only your self-hosted ID server and public key.

It is ideal for:

  • πŸ”§ Mass deployment (RMM, GPO, Intune, etc.)
  • 🧰 Technicians who need a ready-to-use portable RustDesk client
  • πŸ’Ό Environments where software installation is restricted

Note

<#
RustDesk Portable (x64) Auto Downloader & Configurator
-----------------------------------------------------
β€’ Downloads the latest available RustDesk Windows x64 portable client from GitHub
β€’ No installation (single .exe)
β€’ Automatically sets:
- ID server
- Key
(Relay e API non impostati)
β€’ Creates and updates a download log
@michele-tn
michele-tn / Secure Guest SSH user creation.md
Last active October 4, 2025 21:41
Secure Guest SFTP User on Ubuntu 22.04 - test on Ubuntu 22.04.5 LTS (GNU/Linux 5.15.0-156-generic x86_64)

Secure Guest SFTP User on Ubuntu 22.04.5

Abstract

In multi-user environments, providing controlled access to file transfer services is a recurring requirement. This document describes a structured procedure for configuring a non-privileged user account on Ubuntu 22.04.5 with access restricted exclusively to SFTP. Additionally, it outlines the optional configuration of reverse TCP tunneling over SSH, intended for controlled administrative or connectivity use cases. The configuration ensures compliance with security best practices by removing administrative privileges,

1. Introduction and scope

Hash functions are ubiquitous in information security: they are used for integrity checks, content-addressed storage, digital signatures, password verification, and more. This document treats three families of constructions that have received the most attention in practice and in the literature: MD5 (an historical design of the MD family), SHA-2 (notably SHA-256, standardized in FIPS 180), and SHA-3 (the Keccak-based family standardized in FIPS 202). Where necessary we contrast the design principles (MerkleDamgrd vs. sponge) and explain the consequences for security. Key primary sources are cited: the MD5 specification (RFC 1321), the SHA standards (FIPS 180-4), the SHA-3 standard (FIPS 202), and major cryptanalytic work on MD5 and related constructions. citeturn0search0turn0search7turn3search2


2. Formal definitions and basic security notions

Let (H:{0,1}^* o{0,1}^n) be a deterministic function mapping binary strings of arbitrary length to fixed-length (n)-bit o

Database Normalization: From 1NF to 6NF

Database normalization is a fundamental methodology in relational database design. Its main objectives are:

  • Reduce redundancy
  • Prevent anomalies
  • Maintain data integrity

This document provides an overview of the six normal forms, including BCNF, with practical examples.


DNS Speed Test Script

A simple Bash script to measure and compare DNS query response times from popular public DNS servers.
Outputs aligned ASCII tables showing raw and sorted results by speed.


Tested Environment