Skip to content
View gerry's full-sized avatar

Block or report gerry

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. pyevilgrade pyevilgrade Public

    Basic mitmproxy inline script to implement some evilgrade functionality.

    JavaScript 2 3

  2. django-jqgrid django-jqgrid Public

    django utilities allowing easy handling and configuration of jqGrids

    Python 56 29

  3. telecat telecat Public

    A telegram bot to control and get status from hashcat.

    Python 1 1

  4. elasticonion elasticonion Public

    Onionscan backed by elasticsearch.

    Python

  5. A quick hack to extract and decrypt ... A quick hack to extract and decrypt credentials from DbVisualizer config files.
    1
    #!/usr/bin/env python
    2
    # decrypt_dbvis.py ~ gerry@twitter.com
    3
    # DbVisualizer uses PBEWithMD5AndDES with a static key to store passwords.
    4
    # This is a quick hack to extract and decrypt credentials from DbVisualizer config files.
    5
    # Tested against DbVisualizer Free 9.0.9 and 9.1.6
  6. Exploit for CVE-2011-0364 Exploit for CVE-2011-0364
    1
    #!/usr/bin/env python
    2
    # Thu 24 Jun 2010 04:20:52 AM EDT
    3
    import httplib
    4
    import mimetools
    5
    import StringIO