Skip to content

Instantly share code, notes, and snippets.

View TheRealXaiL's full-sized avatar

XaiL TheRealXaiL

View GitHub Profile
#!/usr/bin/env python3
"""
AudioSocket Server - Optimized Audio Quality Version
"""
import asyncio
import struct
import logging
import sys
import json
emails:
You are performing OSINT for an upcoming penetration test. For the target domain [TARGET_DOMAIN], identify all known employee email addresses by:
1. Searching the web and X for publicly listed emails @TARGET_DOMAIN.
2. Searching LinkedIn for current and former employees of the company associated with TARGET_DOMAIN.
3. Scraping the target website for metadata in documents like PDFs and Microsoft suite files (e.g., using browse_page on document URLs to extract author names, etc.), and add any identified names.
4. For each identified employee name, guess email formats as firstname.lastname@TARGET_DOMAIN; handle common nicknames by including variants (e.g., mike/michael, bill/william, rob/robert, nick/nicholas, etc.).
5. Search deeper across multiple pages/sources for more employees.
6. Compile a unique list of all found/guessed emails in CSV format (column: email), including inline citations for sources using .
esphome:
name: bme280-node
friendly_name: BME280_Node
esp32:
board: esp32-c6-devkitm-1
framework:
type: esp-idf
logger:
interface TenantInfo {
tenant_id: string;
tenant_name: string;
tenant_region: string;
cloud_instance: string;
sso_enabled: string;
domain_count: number;
federated_domains?: string[]; // Optional field
}
@TheRealXaiL
TheRealXaiL / hulksmashemailfilter.py
Last active April 14, 2023 21:19
hulk smash email filtering
import sys
import lxml.etree as etree
from urllib import request
import dns.resolver
def main(domain):
get_expensive_solution(domain)
get_federation_info(domain)
def get_expensive_solution(domain):
@TheRealXaiL
TheRealXaiL / azure_enum.py
Created February 9, 2023 18:13
azure_enum
#!/usr/bin/env python3
import csv
import base64
import logging
import argparse
import traceback
import lxml.etree as etree
import sys
from io import StringIO
from urllib import request
import ldap3
import sys
def get_domain_admin_usernames(server_name, domain_name):
domain_parts = domain_name.split(".")
if len(domain_parts) < 2:
print("Error: Invalid domain name")
sys.exit(1)
tld = ".".join(domain_parts[1:])
base_dn = "DC={},DC={}".format(domain_parts[0], tld)
@TheRealXaiL
TheRealXaiL / VPN_Killswitch.scpt
Last active December 29, 2018 19:31
VPN Killswitch to quit apps when VPN connection drops / Applescript
set apps to {"Transmission", "Keybase", "Signal"}
set notificationBox to "Your apps have been killed as the VPN connection was terminated at " & (current date) & "."
repeat with targetApp in apps
tell application targetApp to quit
end repeat
display dialog notificationBox

Keybase proof

I hereby claim:

  • I am josephgregg on github.
  • I am josephgregg (https://keybase.io/josephgregg) on keybase.
  • I have a public key ASDRAes4Xb-Rkvyh0Gt8CprfN9W9t0jNIajusZa0K1X0_wo

To claim this, I am signing this object:

@TheRealXaiL
TheRealXaiL / mike's ssh ninja shiz
Created April 24, 2018 02:16
ssh brute ...nah, son
-A SSH-IN -i enp4s0 -p tcp -m hashlimit --hashlimit-upto 2/min --hashlimit-burst 5 --hashlimit-mode srcip,dstport --hashlimit-name SSH_IN -m state --state NEW -m tcp --dport 22 -m comment --comment "Allow 2 new SSH connections per minute based on SRC IP and DST PORT" -j ACCEPT
-A SSH-IN -p tcp -m state --state NEW -m tcp --dport 22 -j LOG --log-prefix "IPTABLES SSH:"
-A SSH-IN -p tcp -m state --state NEW -m tcp --dport 22 -j DROP