This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#requires wget(brew install wget) or replace wget with curl -I | |
wget http://libdnet.googlecode.com/files/libdnet-1.12.tgz | |
tar xfz libdnet-1.12.tgz | |
cd libdnet-1.12 | |
./configure | |
make | |
sudo make install | |
cd python | |
sudo python setup.py install |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#note: This is a pretty sloppy script in someplaces so use at your own risk. | |
######################################## | |
# Configuration | |
######################################## | |
InstallPath=/home/static/Tools | |
######################################## | |
mkdir -p $InstallPath/{temp,Scripts/Recon} | |
echo -e "\e[92m[*] Starting Install... [*]" |
This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
//Credits to Casey Smith for his initial research here "https://gist.github.com/subTee/ca477b4d19c885bec05ce238cbad6371" | |
//Based on Jared Haight work (https://github.com/jaredhaight/PSAttack) | |
//1. Compile "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:PSA64.exe PSA64.cs" | |
using System; | |
using System.Reflection; | |
namespace PSA64 | |
{ | |
class Program | |
{ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
""" | |
Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance. | |
Based on: https://github.com/thalpius/Microsoft-Defender-for-Identity-Check-Instance. | |
Usage: ./check_mdi.py -d <domain> | |
""" | |
import argparse | |
import dns.resolver |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ | |
"name": "ADMIN_PASSWORD", | |
"value": "(admin).+(secret|token|key|password).+" | |
}, | |
{ | |
"name": "AWS API Gateway", | |
"value": "[0-9a-z]+.execute-api.[0-9a-z.-_]+.amazonaws.com" | |
}, | |
{ |