Last updated: August 16, 2023
Endpoint Name | path |
---|
function Invoke-SubscriptionEnum{ | |
param( | |
[string]$outputDirectory = "." | |
) | |
$context = Get-AzContext | |
$subid = $context.Subscription.Id | |
Write-Host -ForegroundColor Yellow ("[***] Enumerating Subscription " + $subid) | |
$publicresources = @() |
Last updated: August 16, 2023
Endpoint Name | path |
---|
00b41c95-dab0-4487-9791-b9d2c32c80f2 - Office 365 Management | |
04b07795-8ddb-461a-bbee-02f9e1bf7b46 - Microsoft Azure CLI | |
0ec893e0-5785-4de6-99da-4ed124e5296c - Office UWP PWA | |
18fbca16-2224-45f6-85b0-f7bf2b39b3f3 - Microsoft Docs | |
1950a258-227b-4e31-a9cf-717495945fc2 - Microsoft Azure PowerShell | |
1b3c667f-cde3-4090-b60b-3d2abd0117f0 - Windows Spotlight | |
1b730954-1685-4b74-9bfd-dac224a7b894 - Azure Active Directory PowerShell | |
1fec8e78-bce4-4aaf-ab1b-5451cc387264 - Microsoft Teams | |
22098786-6e16-43cc-a27d-191a01a1e3b5 - Microsoft To-Do client | |
268761a2-03f3-40df-8a8b-c3db24145b6b - Universal Store Native Client |
function Invoke-AzPublicStorageEnum{ | |
# First create a list of storage accounts and containers from ScoutSuite results | |
# tail scoutsuite_results*.js -n +2 | jq -r '.services.storageaccounts.subscriptions[].storage_accounts[] | .blob_containers_count,.name,.blob_containers[].id' > /root/Desktop/storage-array.txt | |
[string[]]$arrayFromFile = Get-Content -Path '.\storage-array.txt' | |
$FullList = @() | |
$PossiblePublicContainers = @() |
from brownie import * | |
from itertools import count | |
from click import style | |
from eth_utils import decode_hex | |
from time import sleep | |
start_block = 13004800 | |
hacker = '0xC8a65Fadf0e0dDAf421F28FEAb69Bf6E2E589963' | |
poly = '0x0E860F44d73F9FDbaF5E9B19aFC554Bf3C8E8A57' |
## A few tools for working with Azure OAuth2 Authentication Codes and access_tokens | |
## By Beau Bullock @dafthack | |
Function Get-AzureAccessToken{ | |
Param | |
( | |
[Parameter(Position = 0, Mandatory = $false)] | |
[string] |
#!/bin/bash | |
# This script attempts to locate potential dangling domains on AWS. You need AWS CLI installed and your keys configured | |
# Make sure you insert your Bing API key below as well. | |
# All the sleeps were necessary to not allocate the same IP address multiple times | |
while true | |
do | |
unset IP |
#! /bin/bash | |
## You need to install grepcidr and jq first | |
## sudo apt-get install grepcidr jq | |
## | |
## AWS and GCP ranges will be created automatically | |
## | |
## Because of the way Microsoft hosts the ranges go manually download the public range | |
## from here: https://www.microsoft.com/en-us/download/details.aspx?id=56519 | |
## |
$users = Get-NetUser; $props=@(); $users | Get-Member | foreach-object{if($_.Name -notlike "badpassword*"){$props+=$_.Name}}; foreach($user in $users){ foreach($prop in $props){ if($user.$prop -like "*password*" -and $user.$prop -notlike "*dont_expire_password" -and $user.$prop -notlike "*RODC Password*"){Write-Output ($user.samAccountName + "[" + $prop + "]" + " : " + $user.$prop) } } } |
### Keybase proof | |
I hereby claim: | |
* I am dafthack on github. | |
* I am dafthack (https://keybase.io/dafthack) on keybase. | |
* I have a public key ASDGzEEMBM166GnDWkJ7Ctv6X89ClE6iMIFqaOsGiFobLwo | |
To claim this, I am signing this object: |