Pull docker image
docker pull mcr.microsoft.com/powershell:latest
Run container
docker run -it --rm mcr.microsoft.com/powershell:latest
Install WSMan-Module
Install-Module -Name PSWSMan
Import-Module PSWSMan
<Sysmon schemaversion="4.82"> | |
<EventFiltering> | |
<RuleGroup name="" groupRelation="or"> | |
<FileBlockExecutable onmatch="include"> | |
<!-- List used: https://github.com/0x706972686f/RMM-Catalogue/tree/main --> | |
<TargetFilename name="RMM Software" condition="end with">rpcgrab.exe</TargetFilename> | |
<TargetFilename name="RMM Software" condition="end with">rpcsetup.exe</TargetFilename> | |
<TargetFilename name="RMM Software" condition="end with">action1_agent.exe</TargetFilename> | |
<TargetFilename name="RMM Software" condition="end with">aeroadmin.exe</TargetFilename> | |
<TargetFilename name="RMM Software" condition="end with">alitask.exe</TargetFilename> |
Pull docker image
docker pull mcr.microsoft.com/powershell:latest
Run container
docker run -it --rm mcr.microsoft.com/powershell:latest
Install WSMan-Module
Install-Module -Name PSWSMan
Import-Module PSWSMan
# rtkit for pipewire
security.rtkit.enable = true;
# enable pipewire with wlr support
services.pipewire.enable = true;
xdg = {
portal = {
enable = true;
extraPortals = with pkgs; [
// https://security.microsoft.com/apiproxy/mtp/huntingService/queries/encode
Advanced hunting encodes the query for sharing purposes.
You can now send the encoded query through https://security.microsoft.com/v2/advanced-hunting?query={add query here}&timeRangeId=week
= Title: Subtitle | |
Firstname Lastname <[email protected]> | |
:doctype: pdf | |
:author: firstname lastname | |
:subtitle: subtitle | |
:ntitle: title: {subtitle} | |
:imagesdir: ./images | |
:class: classname | |
:pdf-stylesdir: /template/resources/themes | |
:pdf-fontsdir: /template/resources/fonts |
FROM node:boron | |
VOLUME /var/hackadoc | |
RUN apt update && apt install -y \ | |
git \ | |
sqlite3 | |
RUN git clone https://github.com/hackergarten/hackadoc.git /var/hackadoc | |
WORKDIR /var/hackadoc |
FROM debian:latest | |
ADD https://archive.aachen.ccc.de/junior.34c3ctf.ccc.ac/uploads/billboard-56c33efc813379c674ea0d0a64258b5fa835f8d4.tar.gz /srv | |
RUN tar xvf /srv/billboard-56c33efc813379c674ea0d0a64258b5fa835f8d4.tar.gz -C /srv \ | |
&& rm -f /srv/billboard-56c33efc813379c674ea0d0a64258b5fa835f8d4.tar.gz \ | |
&& useradd -g 0 -M -o -u 0 challenge | |
USER challenge | |
WORKDIR /srv |