Skip to content

Instantly share code, notes, and snippets.

View dreizehnutters's full-sized avatar

dreizehnutters

View GitHub Profile
@dreizehnutters
dreizehnutters / templade.pde
Last active February 5, 2020 14:31
processing template made by @beesandbombs
//template by @beesandbombs edited by @13utters
int[][] result;
float t, c;
float ease(float p) {
return 3*p*p - 2*p*p*p;
}
float ease(float p, float g) {
if (p < 0.5)
@kozmer
kozmer / ldapsearch_parser.py
Last active January 29, 2025 13:37
linux ldapsearch parser for bofhound
# linux ldapsearch parser for bofhound, useful for environments that have ldap signing/binding and require kerberos auth.
# add support for msDS-KeyCredentialLink
"""
$ ldapsearch -LLL -o ldif-wrap=no -E '!1.2.840.113556.1.4.801=::MAMCAQc=' -H ldap://dc.fake.com -Y GSSAPI -N -b "DC=fake,DC=com" "(&(objectClass=*))" > ldapsearch_out.txt
SASL/GSSAPI authentication started
SASL username: [email protected]
SASL SSF: 256
SASL data security layer installed.

How Automation Transforms the Initial Phase of Internal Vulnerability Assessments

In this post, I'll walk you through how I’ve automated the crucial first tasks of an internal vulnerability assessment using a collection of custom scripts I’ve developed over the years. These scripts are designed to streamline the initial phase of the assessment process, demonstrating how powerful automation can be in reducing manual effort, accelerating scans, and improving overall efficiency right from the start.

The Need for Automation

Internal vulnerability assessments are crucial for identifying weaknesses within network infrastructure before they can be exploited by malicious actors. However, the manual effort required to initiate scans, gather results, and perform preliminary analysis can be time-consuming, resource-intensive and are mostly repetitive. Automation offers a solution to this challenge, allowing me to kickstart the assessment process and focus my attention on critical analysis and remediation tasks