This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
for LISTA in $(tmutil listlocalsnapshots / | cut -d'.' -f 4); | |
do | |
sudo tmutil deletelocalsnapshots $LISTA | |
done |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# Pivoting with three hops between networks with triple tunnelling | |
# | |
# Map : | |
# Local machine -> Machine 1 -> Machine 2 -> Machine 3 | |
# (Local) (Internet) (Intranet 1) (Intranet 2) | |
# :9999 <- :1111 <- :2222 <- :3333 | |
# Local data port |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# Basic MacPorts maintenance | |
sudo port selfupdate ; \ | |
sudo port upgrade outdated ; \ | |
sudo port uninstall inactive ; \ | |
sudo port uninstall leaves |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# Machine 1 - Pivoting machine with root access | |
IP_MACHINE_1=$1 | |
# Machine 2 - Machine for nmap scanning using proxy | |
IP_MACHINE_2=$2 | |
# 1. Create socks4 proxy with ssh on the first machine port 9000 | |
ssh -D 9000 root@${IP_MACHINE_1} | |
# 2. Add the proxy to the proxychains conf |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
IP_RANGE=192.168.1. | |
for i in $(seq 1 254); do (ping ${IP_RANGE}$i -c 1 -w 5 >/dev/null && echo "${IP_RANGE}$i" &) ;done |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/env python | |
############################################################################################################### | |
## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script | |
## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift | |
##------------------------------------------------------------------------------------------------------------- | |
## [Details]: | |
## This script is intended to be executed locally on a Linux box to enumerate basic system info and | |
## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text | |
## passwords and applicable exploits. |
NewerOlder