With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| # Not secure by any means, just a PoC for XOR'ing data using powershell | |
| # Credit to http://stackoverflow.com/questions/3478954/code-golf-xor-encryption | |
| $enc = [System.Text.Encoding]::UTF8 | |
| function xor { | |
| param($string, $method) | |
| $xorkey = $enc.GetBytes("secretkey") | |
| if ($method -eq "decrypt"){ |
| [DllImport("shell32.dll", SetLastError = true)] | |
| static extern IntPtr CommandLineToArgvW([MarshalAs(UnmanagedType.LPWStr)] string lpCmdLine, out int pNumArgs); | |
| public static string[] CommandLineToArgs(string commandLine) | |
| { | |
| int argc; | |
| var argv = CommandLineToArgvW(commandLine, out argc); | |
| if (argv == IntPtr.Zero) | |
| throw new System.ComponentModel.Win32Exception(); | |
| try |
| /* | |
| ================================ Compile as a .Net DLL ============================== | |
| C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /target:library /out:TestAssembly.dll TestAssembly.cs | |
| */ | |
| using System.Windows.Forms; | |
| namespace TestNamespace |
| ΰ² _ΰ² | |
| ( Ν‘Β° ΝΚ Ν‘Β°) | |
| Β―\_(γ)_/Β― | |
| (β―Β°β‘Β°)β―οΈ΅ β»ββ» | |
| http://www.fileformat.info/convert/text/upside-down.htm | |
| WRTTN http://wrttn.me/30dbfd/ | |
| Unicode Emoticons |
Security for internet applications is a spectrum, and it would be safe to assume that any application might have unnoticed vulnerabilities waiting to be exploited. Cryptocurrencies are especially attractive targets for hackers: because the technology is so novel, it is more likely to be hiding bugs, and the code usually interacts with tokens that have real-world value. Ethereum is no exception.
Attackers have successfully stolen ether using a number of tactics, which tend to aim at Ethereum smart contracts (written in Solidity), the network itself, cryptocurrency exchanges, or end users.
| #include <stdlib.h> | |
| #include <unistd.h> | |
| #include <stdbool.h> | |
| #include <stdio.h> | |
| #include <signal.h> | |
| #include <err.h> | |
| #include <string.h> | |
| #include <alloca.h> | |
| #include <limits.h> | |
| #include <sys/inotify.h> |
This is a nifty little device for under Β£100 suitable for a home router.
I am using one running OpenBSD 6.8 for my AAISP PPPoE connection (avoiding the supplied VMG1312-B10A which has a number of issues).
I bought a SanDisk 16GB USB stick as there were reports the supplied USB stick isn't particularly reliable, plus it's nice to keep it separate in case of backup or selling the device in the future.
Download the OpenBSD miniroot68.img file system and dd(1) it, for example on macOS (assuming /dev/disk2):
| gcloud beta logging read "resource.type=\"dataflow_step\" resource.labels.job_id=\"2018-11-13_09_13_59-6912497806535022683\" OR \"timestamp>=\\\"2018-11-12T00:00:00Z\" OR \"timing:\" timestamp<=\"2200-01-01T00:00:00.000000000Z\" timestamp<\"2018-11-20T20:20:01.065Z\"" --format=json --limit 100000 | jq -rnc --stream 'fromstream(1|truncate_stream(inputs)) | .jsonPayload.message' >> gcs.txt |
| import argparse | |
| # import data2tabshop | |
| # from data2tabshop import __version__ | |
| __version__ = '0.1.0' | |
| __author__ = u'Steffen Exler' | |
| def get_parser(): |