This is a small tool using Tinyscript and pypdf or pikepdf to bruteforce the password of a PDF given an alphabet (defaults to printables) and a length (default is 8).
$ pip install pypdf tinyscript
$ tsm pdf-password-bruteforcer
This is a small tool using Tinyscript and pypdf or pikepdf to bruteforce the password of a PDF given an alphabet (defaults to printables) and a length (default is 8).
$ pip install pypdf tinyscript
$ tsm pdf-password-bruteforcer
| deb http://deb.debian.org/debian buster main contrib non-free | |
| deb-src http://deb.debian.org/debian buster main contrib non-free | |
| deb http://deb.debian.org/debian buster-updates main contrib non-free | |
| deb-src http://deb.debian.org/debian buster-updates main contrib non-free | |
| deb http://security.debian.org/debian-security/ buster/updates main contrib non-free | |
| deb-src http://security.debian.org/debian-security/ buster/updates main contrib non-free |
apt install nginx
apt install libnginx-mod-rtmp
apt install ffmpeg
apt install stunnel4vim /etc/nginx/nginx.conf
This uses Linux kernel dyamic debug features
https://www.kernel.org/doc/html/latest/admin-guide/dynamic-debug-howto.html
This asumes that debugfs is mounted under /sys/kernel/debug
echo 'module wireguard +p' | sudo tee /sys/kernel/debug/dynamic_debug/control
Use your service account's key JSON file to get an access token to call Google APIs.
Good for seeing how things work, including the creation of JWT token.
To create a JWT token, you can replace create-jwt-token.sh script with tools like step.
If you just want to get an access token for a service account,
| #!/usr/bin/python3 | |
| import asyncio | |
| import time | |
| import socket | |
| import argparse | |
| import aiohttp | |
| class MyConnector(aiohttp.TCPConnector): |
| #!/bin/bash | |
| # This file is designed to spin up a Wireguard VPN quickly and easily, | |
| # including configuring a recursive local DNS server using Unbound | |
| # | |
| # Make sure to change the public/private keys before running the script | |
| # Also change the IPs, IP ranges, and listening port if desired | |
| # iptables-persistent currently requires user input | |
| # add wireguard repo | |
| sudo add-apt-repository ppa:wireguard/wireguard -y |
~/.bash_aliases file.function gdrive_download () {
CONFIRM=$(wget --quiet --save-cookies /tmp/cookies.txt --keep-session-cookies --no-check-certificate "https://docs.google.com/uc?export=download&id=$1" -O- | sed -rn 's/.*confirm=([0-9A-Za-z_]+).*/\1\n/p')
wget --load-cookies /tmp/cookies.txt "https://docs.google.com/uc?export=download&confirm=$CONFIRM&id=$1" -O $2
rm -rf /tmp/cookies.txt
}With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| ######################################################################### | |
| # ================================================== # | |
| # $ Mikrotik RouterOS update script for CloudFlare $ # | |
| # ================================================== # | |
| # # | |
| # - You need a CloudFlare account & api key (look under settings), # | |
| # a zone and A record in it # | |
| # - All variables in first section are obvious, except CFid, # | |
| # To obtain CFzoneid use following command in any unix shell: # | |
| # curl -X GET "https://api.cloudflare.com/client/v4/accounts" -H "X-Auth-Email: YOUR_EMAIL" -H "X-Auth-Key: YOUR_API_KEY" -H "Content-Type: application/json" | python -mjson.tool |