Written for fairly adept technical users, preferably of Debian GNU/Linux, not for absolute beginners.
You'll probably be working with a single smartcard, so you'll want only one primary key ( |
#requires -Version 2.0 | |
function Invoke-ADSyncDeltaCycle | |
{ | |
<# | |
.SYNOPSIS | |
Trigger an AAD Connect Sync | |
.DESCRIPTION | |
Trigger an AAD Connect Sync on a remote computer |
function Get-InjectedThread | |
{ | |
<# | |
.SYNOPSIS | |
Looks for threads that were created as a result of code injection. | |
.DESCRIPTION | |
Steps to install Metasploit on Windows 10 using the Windows Subsystem for Linux | |
1.) Enable Developer Mode | |
C:\> reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1" | |
2.) Enable Windows Subsystem for Linux | |
C:\> DISM /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux | |
3.) Reboot |
# Mac setup script | |
# By Sam Lester | |
# Originally based on https://gist.github.com/codeinthehole/26b37efa67041e1307db | |
# Usage: | |
# - Add email address and any additional apps to this file | |
# - Run sh ./mac-setup.sh | |
# - Run installers for apps that have them (Adobe Creative Cloud, Microsoft Office) | |
# - Install apps that aren't on cask (Magnet, Mactracker, iA Writer, Hand Mirror) |
# The name of the Azure subscription to install the Key Vault into | |
$subscriptionName = 'MySubscription' | |
# The resource group that will contain the Key Vault to create to contain the Key Vault | |
$resourceGroupName = 'MyKeyVaultRG' | |
# The name of the Key Vault to install | |
$keyVaultName = 'MyKeyVault' | |
# The Azure data center to install the Key Vault to |
Get-AzureKeyVaultSecret -VaultName $keyVaultName -Name 'MyAdminPassword' -IncludeVersions |
sed -i -- 's/hello/moto/g' **/*(D.) | |
sed -i 's/hello/moto/g' file.txt | |
find /home/bruno/old-friends -type f -exec sed -i 's/ugly/beautiful/g' {} \; |
# PowerShell 2.0 | |
# Name: EDR_Killer.ps1 | |
# Version: 1.0 | |
# Author: @mgreen27 | |
# Description: Powershell WMI Event Consumer Proof of Concept to disable EDR tools when installed. | |
# Original Template (Eventlog Consumer) attributed to @mattifestation: https://gist.github.com/mattifestation/aff0cb8bf66c7f6ef44a | |
# Set Variables | |
$Name = 'EDR_Killer' | |
$Query = 'SELECT * FROM __InstanceCreationEvent WITHIN 30 WHERE TargetInstance ISA "Win32_Service" AND (TargetInstance.Name = "Sysmon" OR TargetInstance.Name = "Service name 2" OR TargetInstance.Name = "Service Name ..." OR TargetInstance.Name = "Service name N")' |
#!/bin/bash | |
#credits to https://github.com/madmantm/fedora-pentest-tools thanks :D | |
echo "[*]preliminary questions regarding user-rights" | |
clear | |
read -p "[*]Please enter your username, this will help me fix permissions:" myname | |
clear | |
echo "[*]what would be your prefered directory name for the tools? no slashes pls" |
You'll probably be working with a single smartcard, so you'll want only one primary key ( |