Skip to content

Instantly share code, notes, and snippets.

@3lpsy
3lpsy / techheader.json
Created June 8, 2020 15:36
GF Pattern for Interesting Headers
{
"flags": "-HnriE",
"patterns": [
"server: ",
"via: ",
"x-aspnet-Version: ",
"X-Aspnetwebpages-Version: ",
"x-powered-by: ",
"x-forwarded-server: ",
"x-wap-profile: ",
@3lpsy
3lpsy / windows_hardening.cmd
Created May 11, 2020 15:25 — forked from mackwage/windows_hardening.cmd
Script to perform some hardening of Windows OS
:: Windows 10 Hardening Script
:: This is based mostly on my own personal research and testing. My objective is to secure/harden Windows 10 as much as possible while not impacting usability at all. (Think being able to run on this computer's of family members so secure them but not increase the chances of them having to call you to troubleshoot something related to it later on). References for virtually all settings can be found at the bottom. Just before the references section, you will always find several security settings commented out as they could lead to compatibility issues in common consumer setups but they're worth considering.
:: Obligatory 'views are my own'. :)
:: Thank you @jaredhaight for the Win Firewall config recommendations!
:: Thank you @ricardojba for the DLL Safe Order Search reg key!
:: Thank you @jessicaknotts for the help on testing Exploit Guard configs and checking privacy settings!
:: Best script I've found for Debloating Windows 10: https://github.com/Sycnex/Windows10Debloater
:
@3lpsy
3lpsy / 2004_1561.c
Last active May 9, 2020 21:29
Modified exploit for 2004-1561
/*
Original Exploit by Luigi Auriemma
Shellcode add-on by Delikon
www.Delikon.de
Original Exploit: https://www.exploit-db.com/exploits/568
Modifications made by @3lpsy
Modified version only compiles for linux.
Shellcode created with:
@3lpsy
3lpsy / weakpasswords.txt
Created March 19, 2020 20:01
Weak Passwords (Taken from weakpasswords.net, @nyxgeek, TrustedSec)
Christmas1
Christmas123
Christmas19
Christmas19!
Christmas2019
Christmas2019!
Christmas@19
Christmas@2019
December1
December123
using System;
using System.Diagnostics;
using System.Net;
using System.Runtime.InteropServices;
using System.IO;
using System.Threading;
namespace ProcessInjection
{
class Program
@3lpsy
3lpsy / fileserver.py
Last active February 7, 2020 22:45
Simple Flask File Server For Simple Exfil (Read Comments Before Running)
#!/usr/bin/env python3
# Before running, generate certs:
# $ openssl req -x509 -newkey rsa:4096 -nodes -out cert.pem -keyout key.pem -days 365
#
# Install dependencies:
# $ python3 -m venv venv
# $ source venv/bin/activate
# $ pip install pyopenssl flask
# $ python3 fileserver.py
@3lpsy
3lpsy / flare.medium.json
Last active February 7, 2020 23:37
A Slightly Stripped Down FlareVM profile.json
{
"env": {
"TOOL_LIST_DIR": "%ProgramData%\\Microsoft\\Windows\\Start Menu\\Programs\\FLARE",
"TOOL_LIST_SHORTCUT": "%UserProfile%\\Desktop\\FLARE.lnk",
"RAW_TOOLS_DIR": "%SystemDrive%\\FLARE",
"TEMPLATE_DIR": "flarevm.installer.flare"
},
"packages": [
{"name": "dotnet4.6.2"},
{"name": "dotnet4.7.1"},
@3lpsy
3lpsy / xmlmimes.txt
Created January 23, 2020 20:55
XML Mime Types
application/3gpdash-qoe-report+xml
application/3gpp-ims+xml
application/CSTAdata+xml
application/EmergencyCallData.Comment+xml
application/EmergencyCallData.Control+xml
application/EmergencyCallData.DeviceInfo+xml
application/EmergencyCallData.ProviderInfo+xml
application/EmergencyCallData.ServiceInfo+xml
application/EmergencyCallData.SubscriberInfo+xml
application/EmergencyCallData.VEDS+xml
@3lpsy
3lpsy / allmimes.txt
Created January 23, 2020 20:54
All MimeTypes
application/1d-interleaved-parityfec
application/3gpdash-qoe-report+xml
application/3gpp-ims+xml
application/A2L
application/AML
application/ATF
application/ATFX
application/ATXML
application/CALS-1840
application/CDFX+XML
@3lpsy
3lpsy / wg0.conf
Last active November 22, 2019 02:25
Working Wireguard Config
# ---- Install ----
sudo add-apt-repository ppa:wireguard/wireguard
sudo apt-get update
sudo apt-get install wireguard-dkms wireguard-tools
echo 'net.ipv4.ip_forward=1' | sudo tee -a /etc/sysctl.conf
# optional
echo 'net.ipv6.conf.all.forwarding=1' | sudo tee -a /etc/sysctl.conf
sudo sysctl -p
# ---- Server ----