Skip to content

Instantly share code, notes, and snippets.

View bandrel's full-sized avatar

Justin Bollinger bandrel

View GitHub Profile
Param(
)
$VerbosePreference = "Continue"
# Ensure the script is running with elevated privileges
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) {
Write-Error "This script must be run as an Administrator"
exit
}
#!/bin/env python3
import openpyxl
import os
import sys
# Load the Excel file
file_path = sys.argv[1]
wb = openpyxl.load_workbook(file_path)
# Create a directory to save the text files
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
@bandrel
bandrel / gist:2289f6bcc19ba4027ba7d297811330e0
Created August 16, 2024 14:39
Download all of the wordlists from weakpass.com
#!/bin/bash
# Needs transmission-cli, parallel and wget
# brew install transmission-cli
# brew install parallel
# apt get install transmission-cli parallel wget -y
blob=$(cat <<EOF
aHR0cHM6Ly9kb3dubG9hZC53ZWFrcGFzcy5jb20vd29yZGxpc3RzLzEvNTAwLXdvcnN0LXBhc3N3b3Jkcy50eHQuZ3oudG9ycmVudApodHRwczovL2Rvd25sb2FkLndlYWtwYXNzLmNvbS93b3JkbGlzdHMvMTAvZmFjZWJvb2stbmFtZXMtdW5pcXVlLnR4dC5nei50b3JyZW50Cmh0dHBzOi8vZG93bmxvYWQud2Vha3Bhc3MuY29tL3dvcmRsaXN0cy8xMDAwL05vcndlZ2lhbi51ZGljLmd6LnRvcnJlbnQKaHR0cHM6Ly9kb3dubG9hZC53ZWFrcGFzcy5jb20vd29yZGxpc3RzLzEwMDEvU29tYWxpLnVkaWMuZ3oudG9ycmVudApodHRwczovL2Rvd25sb2FkLndlYWtwYXNzLmNvbS93b3JkbGlzdHMvMTAwMi9Sb21hbmlhbi51ZGljLmd6LnRvcnJlbnQKaHR0cHM6Ly9kb3dubG9hZC53ZWFrcGFzcy5jb20vd29yZGxpc3RzLzEwMDMvT3NzZXRpYW4udWRpYy5nei50b3JyZW50Cmh0dHBzOi8vZG93bmxvYWQud2Vha3Bhc3MuY29tL3dvcmRsaXN0cy8xMDA0L1Nsb3ZlbmUudWRpYy5nei50b3JyZW50Cmh0dHBzOi8vZG93bmxvYWQud2Vha3Bhc3MuY29tL3dvcmRsaXN0cy8xMDA1L1N3YXRpLnVkaWMuZ3oudG9ycmVudApodHRwczovL2Rvd25sb2FkLndlYWtwYXNzLmNvbS93b3JkbGlzdHMvMTAwNi9VemJlay51ZGljLmd6Ln
#!/usr/bin/env python3
import re
import sys
def convert_hex_base64(input):
from base64 import b64encode, b64decode
# hex -> base64
b64 = b64encode(bytes.fromhex(input)).decode()
# base64 -> hex
s2 = b64decode(b64.encode()).hex()
#!/usr/bin/env python3
import os
import caracara
import sys
hosts = caracara.HostsToolbox(key=os.environ["FALCON_CLIENT_ID"],secret=os.environ["FALCON_CLIENT_SECRET"],verbose=True)
with open(sys.argv[1]) as doc:
for _hostname in doc.readlines():
target_aid = hosts.host.find_host_aid(hostname=_hostname.strip())
#!/usr/bin/env python3
import argparse
import binascii
parser = argparse.ArgumentParser(description='Encoding and Decoding F5 URL Rewrites')
parser.add_argument('mode', type=str, help='text to encode or decode')
parser.add_argument('input_text', type=str, help='text to encode or decode')
parser.add_argument('--host', type=str, help='original F5 baseurl')
#!/usr/bin/env python3
'''
Script to expand CIDR notation to a list of IP addresses.
'''
import ipaddress
import sys
hosts = set()
subnets = str(sys.argv[1]).split(',')
@bandrel
bandrel / check_hashes.py
Last active November 5, 2024 06:12
To check for and reveal AD user accounts that share passwords using a hashdump from a Domain Controller
#!/usr/bin/env python3
#Purpose: To check for and reveal AD user accounts that share passwords using a hashdump from a Domain Controller
#Script requires a command line argument of a file containing usernames/hashes in the format of user:sid:LMHASH:NTLMHASH:::
# ./check_hashes.py <hash_dump>
import argparse
import re
parser = argparse.ArgumentParser(description="Check user hashes against each other to find users that share passwords")
#!/usr/bin/env python3
from __future__ import print_function
import socket
import argparse
import requests
import re
parser = argparse.ArgumentParser(description='Enumerate subdomains via certificate transparency logs')
parser.add_argument('domain', type=str, help='Target domain name')