Skip to content

Instantly share code, notes, and snippets.

General

tmux new -s NAME      Create new session
tmux ls               List sessions
tmux attach -t NAME   Attach to session

Shortcuts

Ctrl+b(default) Prefix Key
@castexyz
castexyz / vim_cheatsheet.md
Created August 21, 2018 07:49 — forked from awidegreen/vim_cheatsheet.md
Vim shortcuts

Introduction

  • C-a == Ctrl-a
  • M-a == Alt-a

General

:q        close
:w        write/saves
:wa[!]    write/save all windows [force]
:wq       write/save and close
@castexyz
castexyz / .tmux.conf
Last active May 14, 2020 18:12
my tmux conf file
# remap prefix from 'C-b' to 'C-a'
unbind C-b
set-option -g prefix C-a
bind-key C-a send-prefix
#QOL
set -g history-limit 10000
set-option -g allow-rename off
#JOIN WINDOWS
@castexyz
castexyz / kali_setup.md
Last active November 12, 2019 13:26
Kali first install

Change to zsh + ohmyzsh

chsh -s $(which zsh)
reboot
sh -c "$(curl -fsSL https://raw.githubusercontent.com/robbyrussell/oh-my-zsh/master/tools/install.sh)"

Install chromium

apt-get install chromium
@castexyz
castexyz / fix empire
Created January 30, 2019 15:12
Fix Empire Installation in KALI
1) apt install pyinstaller
2) follow instructions here http://www.powershellempire.com/?page_id=110
@castexyz
castexyz / android-burp-cert
Last active November 23, 2023 10:26 — forked from vavkamil/android-burp-cert.sh
Android cert
on rooted devices we have to install burp certificate as SYSTEM like this:
1. Export burp certificate and convert it to pem
a. openssl x509 -inform DER -in cacert.der -out cacert.pem
2. output the subject_hash_old and rename the file:
a. openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1
b. mv cacert.pem <hash>.0
3. Copy the certificate to the device
a. adb push <hash>.0 /sdcard/
b. Adb shell
@castexyz
castexyz / frida.txt
Last active October 15, 2019 07:45
Frida install & use
wget https://github.com/frida/frida/releases/download/12.7.0/frida-server-12.7.0-android-arm64.xz
unxz frida-server-12.7.0-android-arm64.xz
mv frida-server-12.7.0-android-arm64 frida-server
adb push frida-server /data/local/tmp/
adb shell "chmod 755 /data/local/tmp/frida-server
adb shell "/data/local/tmp/frida-server &
frida -U -f packagename
@castexyz
castexyz / ipa_ssh_install
Last active September 8, 2024 14:50
Install .ipa via ssh
extract the ipa
copy the AppName.app into the device /Applications/
cd /Applications/AppName.app
chmod +x AppName
uicache --all
@castexyz
castexyz / drozer.md
Last active March 1, 2026 07:37
Drozer commands
  • Drozer - Drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS.
    • Starting a session
      • adb forward tcp:31415 tcp:31415
      • drozer console connect
      • drozer console connect --server <ip>
    • List modules
      • ls
      • ls activity
    • Retrieving package information
  • run app.package.list -f
@castexyz
castexyz / string
Last active November 14, 2019 14:06
find strings
Windows
find string ignoring case (/i) on current folder and subfolders (/S) with specific file extension
findstr /i "<string>" *.<file extension>
dir /s /b >all-files.txt
findstr "\.db \.sqlitedb \.sqlite3 \.sqlite \.storedata \.store \.sql \.kcr" all-files.txt > all-databases.txt