Last updated: August 16, 2023
| Endpoint Name | path |
|---|
| import subprocess | |
| import itertools | |
| import argparse | |
| from concurrent.futures import ThreadPoolExecutor | |
| # Function to generate bucket name variations | |
| def generate_bucket_names(keyword, fuzz_words): | |
| variations = [] | |
| for fuzz_word in fuzz_words: | |
| variations.append(f"{keyword}{fuzz_word}") |
| function Invoke-SubscriptionEnum{ | |
| param( | |
| [string]$outputDirectory = "." | |
| ) | |
| $context = Get-AzContext | |
| $subid = $context.Subscription.Id | |
| Write-Host -ForegroundColor Yellow ("[***] Enumerating Subscription " + $subid) | |
| $publicresources = @() |
Last updated: August 16, 2023
| Endpoint Name | path |
|---|
| 00b41c95-dab0-4487-9791-b9d2c32c80f2 - Office 365 Management | |
| 04b07795-8ddb-461a-bbee-02f9e1bf7b46 - Microsoft Azure CLI | |
| 0ec893e0-5785-4de6-99da-4ed124e5296c - Office UWP PWA | |
| 18fbca16-2224-45f6-85b0-f7bf2b39b3f3 - Microsoft Docs | |
| 1950a258-227b-4e31-a9cf-717495945fc2 - Microsoft Azure PowerShell | |
| 1b3c667f-cde3-4090-b60b-3d2abd0117f0 - Windows Spotlight | |
| 1b730954-1685-4b74-9bfd-dac224a7b894 - Azure Active Directory PowerShell | |
| 1fec8e78-bce4-4aaf-ab1b-5451cc387264 - Microsoft Teams | |
| 22098786-6e16-43cc-a27d-191a01a1e3b5 - Microsoft To-Do client | |
| 268761a2-03f3-40df-8a8b-c3db24145b6b - Universal Store Native Client |
| function Invoke-AzPublicStorageEnum{ | |
| # First create a list of storage accounts and containers from ScoutSuite results | |
| # tail scoutsuite_results*.js -n +2 | jq -r '.services.storageaccounts.subscriptions[].storage_accounts[] | .blob_containers_count,.name,.blob_containers[].id' > /root/Desktop/storage-array.txt | |
| [string[]]$arrayFromFile = Get-Content -Path '.\storage-array.txt' | |
| $FullList = @() | |
| $PossiblePublicContainers = @() |
| from brownie import * | |
| from itertools import count | |
| from click import style | |
| from eth_utils import decode_hex | |
| from time import sleep | |
| start_block = 13004800 | |
| hacker = '0xC8a65Fadf0e0dDAf421F28FEAb69Bf6E2E589963' | |
| poly = '0x0E860F44d73F9FDbaF5E9B19aFC554Bf3C8E8A57' |
| ## A few tools for working with Azure OAuth2 Authentication Codes and access_tokens | |
| ## By Beau Bullock @dafthack | |
| Function Get-AzureAccessToken{ | |
| Param | |
| ( | |
| [Parameter(Position = 0, Mandatory = $false)] | |
| [string] |
| #!/bin/bash | |
| # This script attempts to locate potential dangling domains on AWS. You need AWS CLI installed and your keys configured | |
| # Make sure you insert your Bing API key below as well. | |
| # All the sleeps were necessary to not allocate the same IP address multiple times | |
| while true | |
| do | |
| unset IP |
| #! /bin/bash | |
| ## You need to install grepcidr and jq first | |
| ## sudo apt-get install grepcidr jq | |
| ## | |
| ## AWS and GCP ranges will be created automatically | |
| ## | |
| ## Because of the way Microsoft hosts the ranges go manually download the public range | |
| ## from here: https://www.microsoft.com/en-us/download/details.aspx?id=56519 | |
| ## |
| $users = Get-NetUser; $props=@(); $users | Get-Member | foreach-object{if($_.Name -notlike "badpassword*"){$props+=$_.Name}}; foreach($user in $users){ foreach($prop in $props){ if($user.$prop -like "*password*" -and $user.$prop -notlike "*dont_expire_password" -and $user.$prop -notlike "*RODC Password*"){Write-Output ($user.samAccountName + "[" + $prop + "]" + " : " + $user.$prop) } } } |