Skip to content

Instantly share code, notes, and snippets.

View Geofferey's full-sized avatar
🤓
OnePlus 8T time

Geofferey Eakins Geofferey

🤓
OnePlus 8T time
  • NETLABWORK
  • USA
View GitHub Profile
#!/bin/sh
PATH=/bin:/sbin:/usr/bin:/usr/sbin:/opt/nvtl/bin:/opt/nvtl/data/branding/bin
## PoC Exploit payload for the Open VPN implementation RCE on Inseego M2000 (Novatel)
# Append the following to .opvn to be uploaded to the Inseego m2000, full paths must be used
#
# tls-verify "/path/to/bin/executable"
#
# ^ That's 5 spaces or a <TAB> ^
@Geofferey
Geofferey / and-wireguard.sh
Created April 29, 2025 00:29
A script to setup wireguard tunnel on Android
#!/system/bin/sh
if [ -z ${INTERACTIVE} ]; then
until [[ $(getprop sys.boot_completed) = 1 ]] && [[ $(getprop dev.bootcomplete) = 1 ]] && [[ $(getprop service.bootanim.exit) = 1 ]] && [[ $(getprop init.svc.bootanim) = stopped ]]; do
sleep 5
done
@Geofferey
Geofferey / and-sharenet.sh
Created April 28, 2025 11:20
Script for sharing internet on Android and bypassing tethering data capa
#!/system/bin/sh
PATH=$PATH:/system/bin:/system/xbin:/vendor/bin:/vendor/xbin
TUN_INTF=tun_vpn0
WLAN_INTF=wlan0
AP_INTF=wlan1
ETH_INTF=eth0
RMNET_INTFS=rmnet_data+
WG_INTF=tun_vpn0
@Geofferey
Geofferey / tailscale-debugging.ps1
Created December 18, 2024 12:50
A custom script for debugging tailscale when running in unattended mode without GUI (WIP)
$host.ui.RawUI.WindowTitle = "NTAUTHORITY\SYSTEM - Tailscale Debugging"
$ErrorActionPreference = "Continue"
$host.ui.RawUI.BackgroundColor = "Black"
$host.ui.RawUI.ForegroundColor = "Red"
$RootPath = $PWD.Path
cd ".\"
$UserName = (whoami)
@Geofferey
Geofferey / tailscale-ad-login.ps1
Last active December 18, 2024 12:45
A Script for logging into Tailscale via preauth key stored in Active Direcotry
## I am a custom Script for logging TailScale in on boot using tsPreAuthKey attribute stored in AD Schema
# This requires permanent modification to the schema for storing the PreAuthKey:
# https://www.rebeladmin.com/step-step-guide-create-custom-active-directory-attributes/
# https://legacy.support.exclaimer.com/hc/en-gb/articles/360028648572-How-to-create-new-custom-AD-attributes-for-use-in-a-signature-template
# Do NOT issue re-useable PreAuthTokens and store in AD, that would be foolish, storing them period might be ;))
# Execute me as a Computer policy based powershell startup script
# Schduled task is also an option, may not work on first run
#
$env:Path = 'C:\Program Files\Tailscale;' + $env:Path
@Geofferey
Geofferey / tailscale-preauth.ps1
Created December 18, 2024 12:39
A script that gets executed by a custom installer for tailscale
## I am a custom Script for logging TailScale in on boot using tsPreAuthKey attribute stored in AD Schema
# Now I double as an executable via ps12exe that gets installed via an inno setup wizard
# This requires permanent modification to the schema for storing the PreAuthKey:
# https://www.rebeladmin.com/step-step-guide-create-custom-active-directory-attributes/
# https://legacy.support.exclaimer.com/hc/en-gb/articles/360028648572-How-to-create-new-custom-AD-attributes-for-use-in-a-signature-template
# Do NOT issue re-useable PreAuthTokens and store in AD, that would be foolish, storing them period might be ;))
# Execute me as a Computer policy based powershell startup script
# Schduled task is also an option, may not work on first run
#
$ErrorActionPreference = "SilentlyContinue"
@echo off
REM Tailscale setup script by Progent Engineer:
REM Geofferey Eakins
SET tsversion = 1.78.1
echo TailScale Pre-Authentication Deployment Script
echo.
echo Developed By:
@Geofferey
Geofferey / Get-CAttr.ps1
Last active December 10, 2024 16:10
Get Computer Attributes from Active Directory Without RSAT
## Gets Computer Attributes from Active Directory without RSAT
# https://www.reddit.com/r/PowerShell/s/Kani1GV3lD
# Converted to .exe using ps12exe for use outside powershell
$ErrorActionPreference = "SilentlyContinue"
function Get-Attributes ($arg1) {
$searcher = New-Object system.directoryservices.directorysearcher
$searcher.PropertiesToLoad.AddRange(@($arg1))
@Geofferey
Geofferey / hschip.sh
Last active December 28, 2025 16:59
A script for changing IPs of nodes in headscale v0.23.0
#!/bin/bash
## Put me in your PATH to quickly change headscale node IPs
## Written by:
### Engineer: Geofferey
TESTED_VER="v0.23.0"
TS_CIDR="100.64.0.0/10"
if [ -z ${HEADSCALE_DB} ]; then
@Geofferey
Geofferey / report.html
Last active November 13, 2024 11:52
TailScale Login - Group Policy
<html dir="ltr" xmlns:svg="http://www.w3.org/2000/svg" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" gpmc_reportInitialized="false">
<head>
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
<meta http-equiv="Content-Type" content="text/html; charset=UTF-16" />
<title>TailScale Login</title>
<!-- Styles -->
<style type="text/css">
body { background-color:#FFFFFF; border:1px solid #666666; color:#000000; font-size:68%; font-family:MS Shell Dlg; margin:0,0,10px,0; word-break:normal; word-wrap:break-word; }
table { font-size:100%; table-layout:fixed; width:100%; }