I hereby claim:
- I am averagesecurityguy on github.
- I am avgsecguy (https://keybase.io/avgsecguy) on keybase.
- I have a public key ASCjg5tFrtp6al20MtWXbXWD63c3Q-UQ4VzDKjaxI5XR-Ao
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| [email protected]:Password1 |
| #!/usr/bin/env python3 | |
| import sys | |
| import re | |
| # Define regular expressions for the nessusd.messages format. | |
| # | |
| # Launching | |
| # [Wed Mar 31 09:19:34 2021][5372.0][user=nessususer][name= scan name FULL DEBUG][JOB_UUID=94613384-4ad4-655a-6f52-00e87dc0f9a8a640e3918796fe3d][target=10.210.1.10][plugin=vmware_multiple_vmsa_2008_0008.nasl][plugin_id=32503] : Launching |
| #!/bin/bash | |
| # | |
| # Extract the creation date from an image and add the date to the filename. | |
| # Only works on Mac. | |
| # | |
| DUMP_DIR="/Users/family/pics/dump" | |
| CP_DIR="/Users/family/pics/dated" | |
| cd "$DUMP_DIR" |
| use std::sync::mpsc; | |
| use std::sync; | |
| pub struct Spmc<T> { | |
| count: usize, | |
| chans: Vec::<mpsc::Sender::<Option<T>>>, | |
| } | |
| impl<T> Spmc<T> { | |
| pub fn send(&mut self, item: T) { |
| use std::fs::File; | |
| use std::io::{self, BufRead}; | |
| use std::sync::mpsc; | |
| use std::sync; | |
| pub struct MultiReader { | |
| fname: String, | |
| count: sync::Arc<sync::Mutex<usize>>, | |
| chans: sync::Arc<sync::Mutex<Vec::<mpsc::Sender::<Option<String>>>>>, | |
| } |
| /* | |
| Copyright (c) 2018, AverageSecurityGuy | |
| # All rights reserved. | |
| Created: 2018-11-08 | |
| Modified: 2018-11-08 | |
| Author: Stephen Haywood | |
| Sources: http://blog.davidsingleton.org/parsing-huge-xml-files-with-go/ | |
| */ |
| package main | |
| import ( | |
| "context" | |
| "flag" | |
| "fmt" | |
| "io/ioutil" | |
| "net" | |
| "os" | |
| "strings" |
| function Invoke-Mimikatz | |
| { | |
| <# | |
| .SYNOPSIS | |
| This script leverages Mimikatz 2.0 and Invoke-ReflectivePEInjection to reflectively load Mimikatz completely in memory. This allows you to do things such as | |
| dump credentials without ever writing the mimikatz binary to disk. | |
| The script has a ComputerName parameter which allows it to be executed against multiple computers. | |
| This script should be able to dump credentials from any version of Windows through Windows 8.1 that has PowerShell v2 or higher installed. |
| #!/usr/bin/env python | |
| import requests | |
| requests.packages.urllib3.disable_warnings() | |
| passwords = ['Spring2018', 'Password1'] | |
| url = 'https://<server_ip>/p/u/doAuthentication.do' | |
| users = [] | |
| with open('usernames.txt') as f: |