Skip to content

Instantly share code, notes, and snippets.

View BertMueller18's full-sized avatar

Bert Mueller BertMueller18

  • Leipzig, Germany
View GitHub Profile
function Add-GraphConfig {
<#
.SYNOPSIS
Create the encrypted file needed to connect to Microsoft Graph using: Connect-Graph
.DESCRIPTION
Create the encrypted file needed to connect to Microsoft Graph using: Connect-Graph
.PARAMETER Tenant
use NameOfTenant if the tenant domain is NameOfTenant.onmicrosoft.com
@avoidik
avoidik / README.md
Last active December 9, 2022 10:07
Minimal Elastic monitoring stack with enabled xpack-security

Minimal Elastic monitoring stack

You may use t3.medium AWS EC2 instance to run this stack.

Install docker runtime

$ sudo curl -fsSL https://get.docker.com -o get-docker.sh
$ sudo sh get-docker.sh
$ sudo usermod -a -G docker $USER
@joshooaj
joshooaj / Expand-IPRange.ps1
Last active September 28, 2021 12:28
Expands a start and end IP address into an array of IP addresses within the given range.
class CidrInfo {
[string] $Cidr
[IPAddress] $Address
[int] $Mask
[IPAddress] $Start
[IPAddress] $End
[IPAddress] $SubnetMask
[IPAddress] $HostMask
@joshooaj
joshooaj / New-VmsLECertificate.ps1
Last active October 10, 2025 15:03
Automate Let's Encrypt certificate management for Milestone XProtect Mobile Server using Posh-ACME with Dynu DNS.
<#
.SYNOPSIS
Request and install a publicly signed certificate from Let's Encrypt for your Milestone XProtect Mobile Server.
.DESCRIPTION
This script is an all(most)-in-one tool to register a publicly signed certificate from Let's Encrypt
based on a DDNS domain name registered at Dynu.com. Before you run this script, please visit
Dynu.com, register, add a DDNS domain name to your account, and visit your Dynu.com control panel
to generate and take note of your OAuth2 ClientID and Secret.
@jdhitsolutions
jdhitsolutions / PowerShellLab_Setup.md
Last active April 17, 2025 14:23
Detailed instructions for setting up the PowerShellLab for my Pluralsight courses.

PowerShell Lab Detailed Setup Instructions

For my Pluralsight PowerShell courses, you are welcome to use any lab environment you wish. It should include an Active Directory domain with at least a domain controller, a Windows 10 client, and a Windows Server 2016 or 2019 member server. You will need to modify the course files to fit your environment. At this point in time, Windows Server 2022 remains untested for my labs.

However, I am going to recommend that you use a free PowerShell module called PSAutoLab. I encourag you to look at the README document on the project's Github repository before proceeding. If you need help with the module or its commands, you will use the repository's Issue section.

PSAutolab

Please refer to this document to assist in installing and setting up the PSAutolab module on your computer. Run all commands from an elevated Windows PowerShell

@tothi
tothi / usbgadget_razer.sh
Created August 22, 2021 09:52
Razer USB gadget on Android for Local Privilege Escalation on Windows
# MINIMAL USB gadget setup using CONFIGFS for simulating Razer Gaming HID
# devices for triggering the vulnerable Windows Driver installer
# credits for the Windows Driver install vuln: @j0nh4t
#
# https://twitter.com/j0nh4t/status/1429049506021138437
# https://twitter.com/an0n_r0/status/1429263450748895236
#
# the script was developed & tested on Android LineageOS 18.1
@joshooaj
joshooaj / Show-Camera.ps1
Last active March 14, 2024 18:17
Launches a Windows WPF UI providing live video and playback for one or more cameras using the Milestone Systems MIP SDK components.
function Show-Camera {
[CmdletBinding()]
param (
# Specifies the Id of the camera you wish to view. Omit this parameter and you can select a camera from an item selection dialog.
[Parameter(ValueFromPipelineByPropertyName)]
[guid[]]
$Id,
# Specifies the diagnostic overview level to show overlayed onto the image
[Parameter()]
function Test-PrintNightmareVulnerability {
<#
.SYNOPSIS
Tests whether the target system is vulnerable to the PrintNightmare vulnerability.
.DESCRIPTION
Tests whether the target system is vulnerable to the PrintNightmare vulnerability.
Uses PowerShell remoting.
This checks whether vulnerable GPO/registry settings are applied.
@tomdaley92
tomdaley92 / README.md
Last active March 26, 2026 06:12
Proxmox - SPICE Client setup for MacOS

Proxmox - SPICE client setup for MacOS

  1. Install a working (and compiled) version of virt-viewer. You may view the homebrew package's upstream source on GitHub.

    brew tap jeffreywildman/homebrew-virt-manager
    brew install virt-viewer
  2. Once that's installed should be able make a call remote-viewer with a pve-spice.vv file downloaded from proxmox web interface