You may use t3.medium AWS EC2 instance to run this stack.
$ sudo curl -fsSL https://get.docker.com -o get-docker.sh
$ sudo sh get-docker.sh
$ sudo usermod -a -G docker $USER| function Add-GraphConfig { | |
| <# | |
| .SYNOPSIS | |
| Create the encrypted file needed to connect to Microsoft Graph using: Connect-Graph | |
| .DESCRIPTION | |
| Create the encrypted file needed to connect to Microsoft Graph using: Connect-Graph | |
| .PARAMETER Tenant | |
| use NameOfTenant if the tenant domain is NameOfTenant.onmicrosoft.com |
| class CidrInfo { | |
| [string] $Cidr | |
| [IPAddress] $Address | |
| [int] $Mask | |
| [IPAddress] $Start | |
| [IPAddress] $End | |
| [IPAddress] $SubnetMask | |
| [IPAddress] $HostMask |
| <# | |
| .SYNOPSIS | |
| Request and install a publicly signed certificate from Let's Encrypt for your Milestone XProtect Mobile Server. | |
| .DESCRIPTION | |
| This script is an all(most)-in-one tool to register a publicly signed certificate from Let's Encrypt | |
| based on a DDNS domain name registered at Dynu.com. Before you run this script, please visit | |
| Dynu.com, register, add a DDNS domain name to your account, and visit your Dynu.com control panel | |
| to generate and take note of your OAuth2 ClientID and Secret. |
For my Pluralsight PowerShell courses, you are welcome to use any lab environment you wish. It should include an Active Directory domain with at least a domain controller, a Windows 10 client, and a Windows Server 2016 or 2019 member server. You will need to modify the course files to fit your environment. At this point in time, Windows Server 2022 remains untested for my labs.
However, I am going to recommend that you use a free PowerShell module called PSAutoLab. I encourag you to look at the README document on the project's Github repository before proceeding. If you need help with the module or its commands, you will use the repository's Issue section.
Please refer to this document to assist in installing and setting up the PSAutolab module on your computer. Run all commands from an elevated Windows PowerShell
| # MINIMAL USB gadget setup using CONFIGFS for simulating Razer Gaming HID | |
| # devices for triggering the vulnerable Windows Driver installer | |
| # credits for the Windows Driver install vuln: @j0nh4t | |
| # | |
| # https://twitter.com/j0nh4t/status/1429049506021138437 | |
| # https://twitter.com/an0n_r0/status/1429263450748895236 | |
| # | |
| # the script was developed & tested on Android LineageOS 18.1 |
| function Show-Camera { | |
| [CmdletBinding()] | |
| param ( | |
| # Specifies the Id of the camera you wish to view. Omit this parameter and you can select a camera from an item selection dialog. | |
| [Parameter(ValueFromPipelineByPropertyName)] | |
| [guid[]] | |
| $Id, | |
| # Specifies the diagnostic overview level to show overlayed onto the image | |
| [Parameter()] |
| function Test-PrintNightmareVulnerability { | |
| <# | |
| .SYNOPSIS | |
| Tests whether the target system is vulnerable to the PrintNightmare vulnerability. | |
| .DESCRIPTION | |
| Tests whether the target system is vulnerable to the PrintNightmare vulnerability. | |
| Uses PowerShell remoting. | |
| This checks whether vulnerable GPO/registry settings are applied. |
Install a working (and compiled) version of virt-viewer. You may view the homebrew package's upstream source on GitHub.
brew tap jeffreywildman/homebrew-virt-manager
brew install virt-viewerOnce that's installed should be able make a call remote-viewer with a pve-spice.vv file downloaded from proxmox web interface