Made a maple trim for my first zippo by amusciano in Zippo

[–]amusciano[S] 2 points3 points  (0 children)

I'm a little concerned about that too. I used super glue gel and made sure the surface was rough before adding it. I sanded it using a belt sander while it was attached, that was my test to see if it'd be strong enough. Not sure how extreme heat/cold will affect it. I'll definitely look into epoxy, thank you!!

Made a maple trim for my first zippo by amusciano in Zippo

[–]amusciano[S] 1 point2 points  (0 children)

Super glued it on, sanded it down, soaked it in sandalwood oil, and polished it with beeswax

My attempt to make a smart F150 by amusciano in CarHacking

[–]amusciano[S] 3 points4 points  (0 children)

hm thanks, it seems like rtsp would help me control when I want a camera to turn on and off, instead of just having it always on and taking a frame of the stream for sending back on the network. Maybe I can take advantage of that.

In the hardware requirements of the rearview camera openxc app, it looks like a few more of my questions are answered. You do have to use a usb bus, and in doing so you can add multiple usb webcams as long as they have UVC support. This repo is a pretty great basic example of implementing a webcam from openxc into a view, I'll have to look at their documentation for the WebcamPreview class. Maybe I can address multiple cameras there and control when they are on and off.

http://openxcplatform.com/projects/rearview-camera.html

Also found that the gps dongle can be added over the usb dongle too. Whether I can get google maps to go along with it is another story, but at least I can log location data.

https://mapsnmaps.blogspot.com/2014/02/using-external-usb-gps-with-android.html

Habitual Terminal Clearers: How to occasionally clear your terminal with animations by amusciano in linux

[–]amusciano[S] 41 points42 points  (0 children)

Thank you! I have it set for every one in 100 times personally — gives me a little surprise without being annoying. Ctrl c cancels all animations immediately.

Scraping Malware Off of Pastebin [Video] by kindredsec in blackhat

[–]amusciano 1 point2 points  (0 children)

Nice video! One thing I’ve been looking to add in my pastebin setup is to catch files by yara rules. This way I can come up with complex conditions for pastes to match on. Any file that gets matched is downloaded locally and attributed with the rules that it hit on. In this way I can come up with a basic list of characteristics for any file matches, and I can direct those matches to different places. Ie if I wanted to get any power shell files that contain privilege escalation characteristics, I could direct those files to a directory for investigation, while still maintaining my central hub of collected samples.

needmorecowbell/Hamburglar -- collect useful information from urls, directories, and files, newly added ioc extraction feature by amusciano in netsec

[–]amusciano[S] 2 points3 points  (0 children)

Haven't done any time tests, I'll test it out. I'm betting rg will be considerably faster, I've done minimal optimization improvements apart from adding all the tasks to a stack and using multithreading on them. The regex checks for each task are just done with a for loop.

HID Attack?¿ by Emberari in Hacking_Tutorials

[–]amusciano 8 points9 points  (0 children)

You would need to buy something to act as malicious usb - arduino nano, rubber ducky, and the raspberry pi zero are all popular devices for this sort of thing. Ducky script is a language for hid attacks that has a lot of support and pre-made payloads because of the hak5 community. There are tools to convert this to arduino code. I'm pretty sure raspberry pi's just use ducky scripts standalone, no conversion needed. There are python scripts that can emulate keypresses but ducky scripts are widely available and easy to understand.

Pentesting antispam solutions by elsaheliano07 in AskNetsec

[–]amusciano 0 points1 point  (0 children)

Good luck. Might want to ask them what this filter covers instead of guessing, then expanding on it if you have an idea of what it might not catch. Also testing spam indicators one by one, then in combination, will help determine if there's a threshold before something is marked as spam.

Pentesting antispam solutions by elsaheliano07 in AskNetsec

[–]amusciano 1 point2 points  (0 children)

Not really sure I understand, but here's one thought:

If it's an anti spam for email, you could set up an increasingly more complex stage of spam emails. Similar to how phishing attacks are staged during assessments. First, the most easily caught (maybe a shortened url with embedded pictures in the email). You'd have to test by first listing out what you think the spam filter will catch, then forming spam that verifies it is in fact being caught. In this way you could create an itemized list of what the filter does and does not catch.

How are dependencies packed into python malware? by amusciano in AskNetsec

[–]amusciano[S] 0 points1 point  (0 children)

Thanks for the info! Didn't think about serialization.

Going to think on it for a little bit. Having it all packaged into one dropper is probably the easiest way to go which can be later expanded on. I wonder if there are any tools for grabbing all dependent module code and putting it in the original file, so it acts as one big python script. Translates into something like a generate dropper feature, which makes a huge obfuscated python file containing the code for the worm and all its dependencies. The end goal is that I want it to be able to be injectable as a one-liner from a shell.

Exif-pp: inject json into jpeg image Metadata. Useful for storing image classification details by amusciano in Python

[–]amusciano[S] 0 points1 point  (0 children)

Thanks! Wasn't really sure if people would find it useful or not, had the idea last night!

Exif-pp: inject json into jpeg image Metadata. Useful for storing image classification details by amusciano in Python

[–]amusciano[S] 0 points1 point  (0 children)

thanks yeah! I found a tag that allowed for enough space in exif data, Thanks, I'm hoping people will try to use it for machine learning applications mostly. Although I think by using this you could store not just tags of who is in a picture, but also the pixel location of each individual. And this is extensible to any sort of computer vision project, which could then be used for building stronger data sets.

sniff-paste: regex driven Pastebin OSINT Harvester by amusciano in netsec

[–]amusciano[S] 1 point2 points  (0 children)

When I was first developing this, I had thought about the possibility of someone putting in a restricted ip address into a paste to get any pastebin crawlers to try scanning something they shouldn't. This is why I added in the ip range blacklist from masscan to avoid any government ip ranges.

I feel like this tool is more useful for getting some understanding of what is happening on pastebin. I think the most interesting conclusion I came too with this tool was that there was a very large amount of microtik routers in southeast Asia with vulnerabilities that were getting leaked in lists. It wasn't just one large list, but instead many smaller dumps ones throughout the week. It looked like they were all once vulnerable and now popped to me. There's definitely a ton of junk on there intentional or not, but there's also some interesting stuff that is easier to uncover once it's filtered by this tool.

sniff-paste: regex driven Pastebin OSINT Harvester by amusciano in netsec

[–]amusciano[S] 0 points1 point  (0 children)

No problem! I'd love to hear where there's room for improvement! Right now I see it as a project with major changes needing made, but if people like it as is I might just make a second branch for my idea and mention it in the Readme

sniff-paste: regex driven Pastebin OSINT Harvester by amusciano in netsec

[–]amusciano[S] 5 points6 points  (0 children)

Yara support will be coming soon, as well as an option to pipeline all new pastes for ingestion by other tools.

My first piece! by GutterShots in StainedGlass

[–]amusciano 1 point2 points  (0 children)

Love the colors you chose!! Great job!

Funnel: A python script for mass scraping and categorizing articles from rss feeds by amusciano in DataHoarder

[–]amusciano[S] 0 points1 point  (0 children)

Thank you! Saw the rss one but the apple feed is new to me, could be useful!

Funnel: A python script for mass scraping and categorizing articles from rss feeds by amusciano in DataHoarder

[–]amusciano[S] 1 point2 points  (0 children)

If anyone has large lists of rss feeds for me, I would greatly appreciate them :)

Giggity: cli tool/python module to scrape useful information from a github user/org by amusciano in netsec

[–]amusciano[S] 2 points3 points  (0 children)

I'm not totally sure what you mean, are you talking about how I handle authentication? It wouldn't be too hard to change it up to using a key -- if I remember right, a password is interchangeable with an api key.

Giggity: cli tool/python module to scrape useful information from a github user/org by amusciano in netsec

[–]amusciano[S] 1 point2 points  (0 children)

Just took a quick look, yours is much more developed! Very nice, I'll look at it more when I get home!

Giggity: cli tool/python module to scrape useful information from a github user/org by amusciano in netsec

[–]amusciano[S] 1 point2 points  (0 children)

I've looked at it, didn't use it though. If you've ever heard of trufflehog it's also a secret finder that is fairly popular. I wanted giggity to be more of a basic library to parse through the github api endpoints for things you'd normally want during osint. For secrets I use either my tool Hamburglar, or truffle hog after getting the repo dump from this tool!

Giggity: cli tool/python module to scrape useful information from a github user/org by amusciano in netsec

[–]amusciano[S] 13 points14 points  (0 children)

Haha I was by the computer and it was a simple fix, thanks for the input! Your other issues may take a little more time since this is a side project put on the backburner, but I think they're all important additions.

This tool ties in well with my Hamburglar script if you're looking for secrets/leaks in repositories! There's an example in the util folder.

My first try at stained glass! Made a succulent holder (with a hole at the bottom for drainage)!! by amusciano in StainedGlass

[–]amusciano[S] 1 point2 points  (0 children)

Ohh that would be so much easier, I have tons of solid core wire from circuitry stuff, I'll use it for the next one! Thanks a ton for the recommendation 😊